TY - GEN
T1 - Security and insurance management in networks with heterogeneous agents
AU - Grossklags, Jens
AU - Christin, Nicolas
AU - Chuang, John
PY - 2008
Y1 - 2008
N2 - Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and widespread and highly damaging. Next to attackers' increased sophistication, a root cause for the harm inflicted is that users often fail to optimally protect their resources or to recover gracefully from a security breach. We argue that users often underestimate the strong mutual dependence between their security strategies and the economic environment (e.g., threat model) in which these choices are made and evaluated. This misunderstanding weakens the effectiveness of users' security investments, and is compounded by heterogeneity within the user population, in some cases further reducing incentives for cooperation and coordination. We study how economic agents invest into security in five different economic environments, that are characteristic of different threat models. We consider generalized models of traditional public goods games (e.g., total effort and weakest link) and two recently proposed games (e.g., weakest target game). Agents may split their contributions between a public good (protection) and a private good (self-insurance). Our analysis centers on how agents respond to incentives when important parameters of the game (i.e., loss probability, loss magnitude, and cost of technology) are heterogeneous in the agent population. We also highlight key differences to the case of homogeneous decision makers. For example, security investments may become substantially more sensitive to the size of the network. We extend our results to discuss important modes of intervention.
AB - Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and widespread and highly damaging. Next to attackers' increased sophistication, a root cause for the harm inflicted is that users often fail to optimally protect their resources or to recover gracefully from a security breach. We argue that users often underestimate the strong mutual dependence between their security strategies and the economic environment (e.g., threat model) in which these choices are made and evaluated. This misunderstanding weakens the effectiveness of users' security investments, and is compounded by heterogeneity within the user population, in some cases further reducing incentives for cooperation and coordination. We study how economic agents invest into security in five different economic environments, that are characteristic of different threat models. We consider generalized models of traditional public goods games (e.g., total effort and weakest link) and two recently proposed games (e.g., weakest target game). Agents may split their contributions between a public good (protection) and a private good (self-insurance). Our analysis centers on how agents respond to incentives when important parameters of the game (i.e., loss probability, loss magnitude, and cost of technology) are heterogeneous in the agent population. We also highlight key differences to the case of homogeneous decision makers. For example, security investments may become substantially more sensitive to the size of the network. We extend our results to discuss important modes of intervention.
KW - Economics of the internet
KW - Game theory
KW - Incentive-centered design and engineering
KW - Protection
KW - Security
KW - Self-insurance
UR - http://www.scopus.com/inward/record.url?scp=67249156597&partnerID=8YFLogxK
U2 - 10.1145/1386790.1386818
DO - 10.1145/1386790.1386818
M3 - Conference contribution
AN - SCOPUS:67249156597
SN - 9781605581699
T3 - Proceedings of the ACM Conference on Electronic Commerce
SP - 160
EP - 169
BT - EC'08 - Proceedings of the 2008 ACM Conference on Electronic Commerce
T2 - 2008 ACM Conference on Electronic Commerce, EC'08
Y2 - 8 July 2008 through 12 July 2008
ER -