Abstract
In this paper, we consider a recently introduced cybersecurity investment supply chain game theory model consisting of retailers and consumers at demand markets with the retailers being faced with nonlinear budget constraints on their cybersecurity investments. We construct a novel reformulation of the derived variational inequality formulation of the governing Nash equilibrium conditions. The reformulation then allows us to exploit and analyze the Lagrange multipliers associated with the bounds on the product transactions and the cybersecurity levels associated with the retailers to gain insights into the economic market forces. We provide an analysis of the marginal expected transaction utilities and of the marginal expected cybersecurity investment utilities. We then establish some stability results for the financial damages associated with a cyberattack faced by the retailers. The theoretical framework is subsequently applied to numerical examples to illustrate its applicability.
Keywords
- Cybersecurity
- Investments
- Supply chains
- Game theory
- Nash equilibrium
- Variational inequalities
- Lagrange multipliers
- Stability
MSC 2010:
- 49K40
- 65K10
- 65K15
- 90C33
- 90C46.
This is a preview of subscription content, access via your institution.
Buying options


References
A. Barbagallo, P. Daniele, S. Giuffré, A. Maugeri, Variational approach for a general financial equilibrium problem: the deficit formula, the balance law and the liability formula. A path to the economy recovery. Eur. J. Oper. Res. 237 (1), 231–244 (2014)
P. Daniele, S. Giuffré, Random variational inequalities and the random traffic equilibrium problem. J. Optim. Theory Appl. 167 (1), 363–381 (2015)
P. Daniele, S. Giuffré, M Lorino, Functional inequalities, regularity and computation of the deficit and surplus variables in the financial equilibrium problem. J. Global Optim. 65 (3), 575–596 (2016)
P. Daniele, S. Giuffré, A. Maugeri, F. Raciti, Duality theory and applications to unilateral problems. J. Optim. Theory Appl. 162, 718–734 (2014)
P. Daniele, S. Giuffré, M. Lorino, A. Maugeri, C. Mirabella, Functional inequalities and analysis of contagion in the financial networks, in Handbook of Functional Equations. Springer Optimization and its Applications, vol. 95 (Springer, New York, 2014), pp. 129–146
N.J. Daras, M.T. Rassias, Computation, Cryptography, and Network Security (Springer International Publishing, Switzerland, 2015)
S. Giuffré, A. Maugeri, A measure-type lagrange multiplier for the elastic-plastic torsion. Nonlinear Anal. 102, 23–29 (2014)
S. Giuffré, A. Maugeri, D. Puglisi, Lagrange multipliers in elastic-plastic torsion problem for nonlinear monotone operators. J. Differ. Equ. 259 (3), 817–837 (2015)
L.A. Gordon, M.P. Loeb, M.P.W. Lucyshyn, L. Zhou, Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. J. Inf. Secur. 6, 24–30 (2015)
J. Jahn, Introduction to the Theory of Nonlinear Optimization (Springer, Berlin, 1994)
M.H. Manshaei, T. Alpcan, T. Basar, J.P. Hubaux, Game theory meets network security and privacy. ACM Comput. Surv. 45 (3), Article No. 25 (2013)
S. Morgan, Cybersecurity Market Reaches $75 Billon in 2015; Expected to Reach $170 Billion by 2020, Forbes, 20 December (2015)
A. Nagurney, A multiproduct network economic model of cybercrime in financial services. Serv. Sci. 7 (1), 70–81 (2015)
A. Nagurney, L.S. Nagurney, A game theory model of cybersecurity investments with information asymmetry. Netnomics 16 (1–2), 127–148 (2015)
A. Nagurney, P. Daniele, S. Shukla, A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints, Ann. Oper. Res. 248 (1), 405–427 (2017)
A. Nagurney, L.S. Nagurney, S. Shukla, A supply chain game theory framework for cybersecurity investments under network vulnerability, in Computation, Cryptography, and Network Security, ed. by N.J. Daras, M.T. Rassias (Springer International Publishing, Switzerland, 2015), pp. 381–398
J.F. Nash, Equilibrium points in n-person games. Proc. Natl. Acad. Sci. U. S. A. 36, 48–49 (1950)
J.F. Nash, Noncooperative games. Ann. Math. 54, 286–298 (1951)
R. Ostvold, B. Walker, Business Resilience in the Face of Cyber Risk https://www.accenture.com/t20150726T222401_w_/us-en/_acnmedia/Accenture/Conversion-Assets/DotCom/ Documents/Global/PDF/Strategy_7/Accenture-Business-Resilience-in-the-face-of-cyber-risk.pdf
N. Shetty, G. Schwartz, M. Felegehazy, J. Walrand, Competitive cyber-insurance and internet security, in Proceedings of the Eighth Workshop on the Economics of Information Security (WEIS 2009), University College London, England, 24–25 June (2009)
F. Toyasaki, P. Daniele, T. Wakolbinger, A variational inequality formulation of equilibrium models for end-of-life products with nonlinear constraints. Eur. J. Oper. Res. 236 (1), 340–350 (2014)
W. Yakowicz, in Companies Lose $400 Billion to Hackers Each Year. Inc., 8 September (2015)
Acknowledgements
The research of the first author was partially supported by Istituto Nazionale di Alta Matematica Francesco Severi (Progetto di Ricerca GNAMPA 2015: Nuove frontiere dei problemi di equlibrio su rete: dallo sviluppo sostenibile alla dinamica dei disastri ambientali ai crimini informatici). The research of the third author was supported, in part, by the National Science Foundation under Grant No. 1551444. This support is gratefully acknowledged.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Daniele, P., Maugeri, A., Nagurney, A. (2017). Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities. In: Daras, N., Rassias, T. (eds) Operations Research, Engineering, and Cyber Security. Springer Optimization and Its Applications, vol 113. Springer, Cham. https://doi.org/10.1007/978-3-319-51500-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-51500-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51498-7
Online ISBN: 978-3-319-51500-7
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)