In this paper, we propose a new cybersecurity investment supply chain game theory model, assuming that the demands for the product are known and fixed and, hence, the conservation law of each demand market is fulfilled. The model is a generalized Nash equilibrium model with nonlinear budget constraints for which we define the variational equilibrium, which provides us with a variational inequality formulation. We construct an equivalent formulation, enabling the analysis of the influence of the conservation laws and the importance of the associated Lagrange multipliers. We find that the marginal expected transaction utility of each retailer depends on this Lagrange multiplier and its sign. Finally, numerical examples with reported equilibrium product flows, cybersecurity investment levels, and Lagrange multipliers, along with individual firm vulnerability and network vulnerability, illustrate the obtained results.
Cybersecurity Investments with Nonlinear Budget Constraints and Conservation Laws: Variational Equilibrium, Marginal Expected Utilities, and Lagrange Multipliers / Colajanni, G; Daniele, P; Giuffre', Sofia; Nagurney, A. - In: INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH. - ISSN 1475-3995. - 25:5(2018), pp. 1443-1464. [10.1111/itor.12502]
Cybersecurity Investments with Nonlinear Budget Constraints and Conservation Laws: Variational Equilibrium, Marginal Expected Utilities, and Lagrange Multipliers
GIUFFRE', Sofia;
2018-01-01
Abstract
In this paper, we propose a new cybersecurity investment supply chain game theory model, assuming that the demands for the product are known and fixed and, hence, the conservation law of each demand market is fulfilled. The model is a generalized Nash equilibrium model with nonlinear budget constraints for which we define the variational equilibrium, which provides us with a variational inequality formulation. We construct an equivalent formulation, enabling the analysis of the influence of the conservation laws and the importance of the associated Lagrange multipliers. We find that the marginal expected transaction utility of each retailer depends on this Lagrange multiplier and its sign. Finally, numerical examples with reported equilibrium product flows, cybersecurity investment levels, and Lagrange multipliers, along with individual firm vulnerability and network vulnerability, illustrate the obtained results.File | Dimensione | Formato | |
---|---|---|---|
Daniele_2018_ITOR_Cybersecurity_editor.pdf
non disponibili
Descrizione: versione editoriale
Tipologia:
Versione Editoriale (PDF)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
425.98 kB
Formato
Adobe PDF
|
425.98 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.