In this paper, we propose a new cybersecurity investment supply chain game theory model, assuming that the demands for the product are known and fixed and, hence, the conservation law of each demand market is fulfilled. The model is a generalized Nash equilibrium model with nonlinear budget constraints for which we define the variational equilibrium, which provides us with a variational inequality formulation. We construct an equivalent formulation, enabling the analysis of the influence of the conservation laws and the importance of the associated Lagrange multipliers. We find that the marginal expected transaction utility of each retailer depends on this Lagrange multiplier and its sign. Finally, numerical examples with reported equilibrium product flows, cybersecurity investment levels, and Lagrange multipliers, along with individual firm vulnerability and network vulnerability, illustrate the obtained results.

Cybersecurity Investments with Nonlinear Budget Constraints and Conservation Laws: Variational Equilibrium, Marginal Expected Utilities, and Lagrange Multipliers / Colajanni, G; Daniele, P; Giuffre', Sofia; Nagurney, A. - In: INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH. - ISSN 1475-3995. - 25:5(2018), pp. 1443-1464. [10.1111/itor.12502]

Cybersecurity Investments with Nonlinear Budget Constraints and Conservation Laws: Variational Equilibrium, Marginal Expected Utilities, and Lagrange Multipliers

GIUFFRE', Sofia;
2018-01-01

Abstract

In this paper, we propose a new cybersecurity investment supply chain game theory model, assuming that the demands for the product are known and fixed and, hence, the conservation law of each demand market is fulfilled. The model is a generalized Nash equilibrium model with nonlinear budget constraints for which we define the variational equilibrium, which provides us with a variational inequality formulation. We construct an equivalent formulation, enabling the analysis of the influence of the conservation laws and the importance of the associated Lagrange multipliers. We find that the marginal expected transaction utility of each retailer depends on this Lagrange multiplier and its sign. Finally, numerical examples with reported equilibrium product flows, cybersecurity investment levels, and Lagrange multipliers, along with individual firm vulnerability and network vulnerability, illustrate the obtained results.
2018
cybersecurity, investments, supply chains, conservation laws, game theory, generalized Nash equilibrium, variational inequalities, Lagrange multipliers
File in questo prodotto:
File Dimensione Formato  
Daniele_2018_ITOR_Cybersecurity_editor.pdf

non disponibili

Descrizione: versione editoriale
Tipologia: Versione Editoriale (PDF)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 425.98 kB
Formato Adobe PDF
425.98 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12318/3060
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 33
  • ???jsp.display-item.citation.isi??? 24
social impact