Skip to main content

Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities

  • Chapter
  • First Online:

Part of the book series: Springer Optimization and Its Applications ((SOIA,volume 113))

Abstract

In this paper, we consider a recently introduced cybersecurity investment supply chain game theory model consisting of retailers and consumers at demand markets with the retailers being faced with nonlinear budget constraints on their cybersecurity investments. We construct a novel reformulation of the derived variational inequality formulation of the governing Nash equilibrium conditions. The reformulation then allows us to exploit and analyze the Lagrange multipliers associated with the bounds on the product transactions and the cybersecurity levels associated with the retailers to gain insights into the economic market forces. We provide an analysis of the marginal expected transaction utilities and of the marginal expected cybersecurity investment utilities. We then establish some stability results for the financial damages associated with a cyberattack faced by the retailers. The theoretical framework is subsequently applied to numerical examples to illustrate its applicability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. A. Barbagallo, P. Daniele, S. Giuffré, A. Maugeri, Variational approach for a general financial equilibrium problem: the deficit formula, the balance law and the liability formula. A path to the economy recovery. Eur. J. Oper. Res. 237 (1), 231–244 (2014)

    Article  MATH  Google Scholar 

  2. P. Daniele, S. Giuffré, Random variational inequalities and the random traffic equilibrium problem. J. Optim. Theory Appl. 167 (1), 363–381 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  3. P. Daniele, S. Giuffré, M Lorino, Functional inequalities, regularity and computation of the deficit and surplus variables in the financial equilibrium problem. J. Global Optim. 65 (3), 575–596 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  4. P. Daniele, S. Giuffré, A. Maugeri, F. Raciti, Duality theory and applications to unilateral problems. J. Optim. Theory Appl. 162, 718–734 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  5. P. Daniele, S. Giuffré, M. Lorino, A. Maugeri, C. Mirabella, Functional inequalities and analysis of contagion in the financial networks, in Handbook of Functional Equations. Springer Optimization and its Applications, vol. 95 (Springer, New York, 2014), pp. 129–146

    Google Scholar 

  6. N.J. Daras, M.T. Rassias, Computation, Cryptography, and Network Security (Springer International Publishing, Switzerland, 2015)

    Book  MATH  Google Scholar 

  7. S. Giuffré, A. Maugeri, A measure-type lagrange multiplier for the elastic-plastic torsion. Nonlinear Anal. 102, 23–29 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  8. S. Giuffré, A. Maugeri, D. Puglisi, Lagrange multipliers in elastic-plastic torsion problem for nonlinear monotone operators. J. Differ. Equ. 259 (3), 817–837 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  9. L.A. Gordon, M.P. Loeb, M.P.W. Lucyshyn, L. Zhou, Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. J. Inf. Secur. 6, 24–30 (2015)

    Google Scholar 

  10. J. Jahn, Introduction to the Theory of Nonlinear Optimization (Springer, Berlin, 1994)

    Book  MATH  Google Scholar 

  11. M.H. Manshaei, T. Alpcan, T. Basar, J.P. Hubaux, Game theory meets network security and privacy. ACM Comput. Surv. 45 (3), Article No. 25 (2013)

    Google Scholar 

  12. S. Morgan, Cybersecurity Market Reaches $75 Billon in 2015; Expected to Reach $170 Billion by 2020, Forbes, 20 December (2015)

    Google Scholar 

  13. A. Nagurney, A multiproduct network economic model of cybercrime in financial services. Serv. Sci. 7 (1), 70–81 (2015)

    Article  Google Scholar 

  14. A. Nagurney, L.S. Nagurney, A game theory model of cybersecurity investments with information asymmetry. Netnomics 16 (1–2), 127–148 (2015)

    Article  MATH  Google Scholar 

  15. A. Nagurney, P. Daniele, S. Shukla, A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints, Ann. Oper. Res. 248 (1), 405–427 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  16. A. Nagurney, L.S. Nagurney, S. Shukla, A supply chain game theory framework for cybersecurity investments under network vulnerability, in Computation, Cryptography, and Network Security, ed. by N.J. Daras, M.T. Rassias (Springer International Publishing, Switzerland, 2015), pp. 381–398

    Chapter  Google Scholar 

  17. J.F. Nash, Equilibrium points in n-person games. Proc. Natl. Acad. Sci. U. S. A. 36, 48–49 (1950)

    Article  MathSciNet  MATH  Google Scholar 

  18. J.F. Nash, Noncooperative games. Ann. Math. 54, 286–298 (1951)

    Article  MathSciNet  MATH  Google Scholar 

  19. R. Ostvold, B. Walker, Business Resilience in the Face of Cyber Risk https://www.accenture.com/t20150726T222401_w_/us-en/_acnmedia/Accenture/Conversion-Assets/DotCom/ Documents/Global/PDF/Strategy_7/Accenture-Business-Resilience-in-the-face-of-cyber-risk.pdf

  20. N. Shetty, G. Schwartz, M. Felegehazy, J. Walrand, Competitive cyber-insurance and internet security, in Proceedings of the Eighth Workshop on the Economics of Information Security (WEIS 2009), University College London, England, 24–25 June (2009)

    Google Scholar 

  21. F. Toyasaki, P. Daniele, T. Wakolbinger, A variational inequality formulation of equilibrium models for end-of-life products with nonlinear constraints. Eur. J. Oper. Res. 236 (1), 340–350 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  22. W. Yakowicz, in Companies Lose $400 Billion to Hackers Each Year. Inc., 8 September (2015)

    Google Scholar 

Download references

Acknowledgements

The research of the first author was partially supported by Istituto Nazionale di Alta Matematica Francesco Severi (Progetto di Ricerca GNAMPA 2015: Nuove frontiere dei problemi di equlibrio su rete: dallo sviluppo sostenibile alla dinamica dei disastri ambientali ai crimini informatici). The research of the third author was supported, in part, by the National Science Foundation under Grant No. 1551444. This support is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrizia Daniele .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Daniele, P., Maugeri, A., Nagurney, A. (2017). Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities. In: Daras, N., Rassias, T. (eds) Operations Research, Engineering, and Cyber Security. Springer Optimization and Its Applications, vol 113. Springer, Cham. https://doi.org/10.1007/978-3-319-51500-7_6

Download citation

Publish with us

Policies and ethics