File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Cybersecurity investments and cyber insurance purchases in a non-cooperative game

TitleCybersecurity investments and cyber insurance purchases in a non-cooperative game
Authors
Keywordscyber insurance
cybersecurity
Nash equilibrium
network
Risk management
Issue Date1-Jan-2025
PublisherCambridge University Press
Citation
ASTIN Bulletin: The Journal of the IAA, 2025, v. 55, n. 2, p. 426-448 How to Cite?
AbstractThe growing concern over cyber risk has become a pivotal issue in the business world. Firms can mitigate this risk through two primary strategies: investing in cybersecurity practices and purchasing cyber insurance. Cybersecurity investments reduce the compromise probability, while cyber insurance transfers potential losses to insurers. This study employs a network model for the spread of infection among interconnected firms and investigates how each firm's decisions impact each other. We analyze a non-cooperative game in which each firm aims to optimize its objective function through choices of cybersecurity level and insurance coverage ratio. We find that each firm's cybersecurity investment and insurance purchase are strategic complements. Within this game, we derive sufficient conditions for the existence and uniqueness of Nash equilibrium and demonstrate its inefficiency. These theoretical results form the foundation for our numerical studies, allowing us compute firms' equilibrium decisions on cybersecurity investments and insurance purchases across various network structures. The numerical results shed light on the impact of network structure on equilibrium decisions and explore how varying insurance premiums influence firms' cybersecurity investments.
Persistent Identifierhttp://hdl.handle.net/10722/362573
ISSN
2023 Impact Factor: 1.7
2023 SCImago Journal Rankings: 0.979

 

DC FieldValueLanguage
dc.contributor.authorBoonen, Tim J.-
dc.contributor.authorFeng, Yang-
dc.contributor.authorTong, Zhiwei-
dc.date.accessioned2025-09-26T00:36:13Z-
dc.date.available2025-09-26T00:36:13Z-
dc.date.issued2025-01-01-
dc.identifier.citationASTIN Bulletin: The Journal of the IAA, 2025, v. 55, n. 2, p. 426-448-
dc.identifier.issn0515-0361-
dc.identifier.urihttp://hdl.handle.net/10722/362573-
dc.description.abstractThe growing concern over cyber risk has become a pivotal issue in the business world. Firms can mitigate this risk through two primary strategies: investing in cybersecurity practices and purchasing cyber insurance. Cybersecurity investments reduce the compromise probability, while cyber insurance transfers potential losses to insurers. This study employs a network model for the spread of infection among interconnected firms and investigates how each firm's decisions impact each other. We analyze a non-cooperative game in which each firm aims to optimize its objective function through choices of cybersecurity level and insurance coverage ratio. We find that each firm's cybersecurity investment and insurance purchase are strategic complements. Within this game, we derive sufficient conditions for the existence and uniqueness of Nash equilibrium and demonstrate its inefficiency. These theoretical results form the foundation for our numerical studies, allowing us compute firms' equilibrium decisions on cybersecurity investments and insurance purchases across various network structures. The numerical results shed light on the impact of network structure on equilibrium decisions and explore how varying insurance premiums influence firms' cybersecurity investments.-
dc.languageeng-
dc.publisherCambridge University Press-
dc.relation.ispartofASTIN Bulletin: The Journal of the IAA-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.subjectcyber insurance-
dc.subjectcybersecurity-
dc.subjectNash equilibrium-
dc.subjectnetwork-
dc.subjectRisk management-
dc.titleCybersecurity investments and cyber insurance purchases in a non-cooperative game-
dc.typeArticle-
dc.identifier.doi10.1017/asb.2024.40-
dc.identifier.scopuseid_2-s2.0-85215408672-
dc.identifier.volume55-
dc.identifier.issue2-
dc.identifier.spage426-
dc.identifier.epage448-
dc.identifier.eissn1783-1350-
dc.identifier.issnl0515-0361-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats