Data Security in the Digital Age Reputation and Strategic - - PowerPoint PPT Presentation

data security in the digital age
SMART_READER_LITE
LIVE PREVIEW

Data Security in the Digital Age Reputation and Strategic - - PowerPoint PPT Presentation

Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Data Security in the Digital Age Reputation and Strategic Interactions in Security Investment Ying Lei Toh Toulouse School of Economics March 31, 2016


slide-1
SLIDE 1

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Data Security in the Digital Age

Reputation and Strategic Interactions in Security Investment Ying Lei Toh

Toulouse School of Economics

March 31, 2016

slide-2
SLIDE 2

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Motivation

Data security: A quick look... 1

  • 1,540 data breaches in 2014
  • Over 1 billion records compromised
  • 55% of breaches occurred due to malicious attacks
  • Prominent breaches: Target, Home Depot, Ebay, Sony, Ashley

Madison . . .

1Source: http://www.creditcards.com/credit-card-news/credit-card-security-id-theft-fraud-statistics-1276.php

slide-3
SLIDE 3

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Motivation

  • Data breaches can lead to adverse consequences for consumers
  • Rampant data breaches may be indicative that firms

underinvest in security

  • More firms going digital + growing sophiscation of

cybercriminals → more data breaches

  • What can be done to incentivise firms to invest more?
slide-4
SLIDE 4

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Overview & Main Results

Model Overview

  • Players
  • Baseline: Website and unit mass of consumers (het.

valuation)

  • Extended: Website, representative consumer and bank
  • Two periods
  • Unobserved (one-time) security investment by website at the

start

  • Consumer learning via imperfect breach detection → customer

turnover (reputation cost)

slide-5
SLIDE 5

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Overview & Main Results

Main Results

  • Underinvestment in data security from perspective of

consumer protection

  • Mandatory breach notification

◮ May not always lead to a higher level of investment/overall

level of security

◮ May result in full crowding out of website’s investment ◮ Effect on consumer surplus may be ambiguous

slide-6
SLIDE 6

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Baseline Model

  • Website and unit mass of consumer with het. valuation, v
  • Two states of security: good (ρ = 0) and bad (ρ = ρB > 0)

Hackers Website Consumer

  • Cust. info,

prob ρ Attacks Product valued at v ∼ U[0, 1]

  • Cust. info & rev., r

Losses, l

slide-7
SLIDE 7

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Timing

  • t=0: Website invests c(q) in security
  • t=1: Consumers decide whether to use website, breach may occur and

may be detected

  • t=2: Consumers decide whether to use website
slide-8
SLIDE 8

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Timing

  • t=0: Website invests c(q) in security
  • t=1: Consumers decide whether to use website, breach may occur and

may be detected. Users update their beliefs.

  • t=2: Consumers decide whether to use website...
slide-9
SLIDE 9

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Timing

  • t=0: Website invests c(q) in security.
  • t=1: Consumers decide whether to use website, breach may occur and

may be detected. Users update their beliefs.

  • t=2: Consumers decide whether to use website...
slide-10
SLIDE 10

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Strategies

Consumers:

  • Decide whether to use the website given beliefs:

E(U) = v − E(ρ)l vs. 0

◮ t=1: Use if v ≥ ˆ

v – t=2: Use if v ≥ ˆ vND when no breach detected and v ≥ ˆ vD when breach detected (ˆ vND > ˆ v > ˆ vD)

slide-11
SLIDE 11

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Strategies

Consumers:

  • Decide whether to use the website given beliefs:

E(U) = v − E(ρ)l vs. 0

◮ t=1: Use if v ≥ ˆ

v

◮ t=2: Use if v ≥ ˆ

vND when no breach detected and v ≥ ˆ vD when breach detected (ˆ vND > ˆ v > ˆ vD)

slide-12
SLIDE 12

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Strategies

Consumers:

  • Decide whether to use the website given beliefs:

E(U) = v − E(ρ)l vs. 0

◮ t=1: Use if v ≥ ˆ

v

◮ t=2: Use if v ≥ ˆ

vND when no breach detected and v ≥ ˆ vD when breach detected (ˆ vND > ˆ v > ˆ vD)

slide-13
SLIDE 13

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Strategies

Website:

  • Set level of security, qf , to max profit:

Website’s Problem

max

qf

π(qf , λ, ρB

  • prob. of

turnover

, ˆ v, ˆ vD, r

size of turnover

)

slide-14
SLIDE 14

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Strategies

Website:

  • Set level of security, qf , to max profit:

Website’s Problem

max

qf

π(qf , λ, ρB

  • prob. of

turnover

, ˆ v, ˆ vD, r

size of turnover

)

  • c′(q∗) = Marg. reduction in loss from cust. turnover

(MB(q∗))

slide-15
SLIDE 15

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Strategies

Website:

  • Set level of security, qf , to max profit:

Website’s Problem

max

qf

π(qf , λ, ρB

  • prob. of

turnover

, ˆ v, ˆ vD, r

size of turnover

)

  • c′(q∗) = Marg. reduction in loss from cust. turnover

(MB(q∗))

slide-16
SLIDE 16

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Equilibrium

  • Stable Bayes-Nash equilibrium where website invests q∗

+ in

security

  • Too little investment from consumer protection perspective
slide-17
SLIDE 17

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

  • Website to inform customers of breaches in a timely fashion
  • Increases prob. of breach detection (λ) to 1
  • More investment in equilibrium if consumers are passive
slide-18
SLIDE 18

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

  • Website to inform customers of breaches in a timely fashion
  • Increases prob. of breach detection (λ) to 1
  • More investment in equilibrium if consumers are passive

Intuition: Stronger learning/reputation effect

◮ Direct: Breach detected with higher prob → more likely to lose

customers

◮ Indirect: Higher participation when no breach detected (ˆ

v is smaller) → more to lose

slide-19
SLIDE 19

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Consumer self-protection

  • Upon detecting breach, consumers may take action to mitigate

fraction α of potential losses → U = v − ρ(1 − λα)l

  • λα: measure of consumers’ ability to self-protect
slide-20
SLIDE 20

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Consumer self-protection

  • Upon detecting breach, consumers may take action to mitigate

fraction α of potential losses → U = v − ρ(1 − λα)l

  • λα: measure of consumers’ ability to self-protect

Proposition

Equilibrium level of investment, q∗

+

  • increases for small α;
  • increases for intermediate α, provided that r is large;
  • decreases otherwise.

Consumers are better off whenever q∗

+ is higher (ambiguous

  • therwise).

Full Proposition

slide-21
SLIDE 21

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Intuition:

  • Learning/reputation effect (+):

◮ Same as with passive consumers ◮ Higher reputation cost when r is larger

slide-22
SLIDE 22

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Intuition:

  • Learning/reputation effect (+):

◮ Same as with passive consumers ◮ Higher reputation cost when r is larger

  • Crowding out effect (–):

◮ Larger λ → larger λα → stronger ability to self-protect

  • Crowding out effect dominates when α is large
slide-23
SLIDE 23

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Extended Model

New player: Bank

  • Affects overall security level via its investment, γ (0bserved)

Provides partial insurance to consumer, βl Hackers Website Consumer Bank

Product valued at v

  • Cust. info,

prob (1 − q)ρB Attacks

  • Cust. info & rev., r

Losses, l prob (1 − q)ρB(1 − γ) Fraud attempts prob (1 − γ)

slide-24
SLIDE 24

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Extended Model

New player: Bank

  • Affects overall security level via its investment, γ (0bserved)
  • Provides partial insurance to consumer, βl

Hackers Website Consumer Bank

Product valued at v

  • Cust. info,

prob (1 − q)ρB Attacks

  • Cust. info & rev., r

Losses, l prob (1 − q)ρB(1 − γ) Bank’s liability, βl Fraud attempts prob (1 − γ)

slide-25
SLIDE 25

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Extended Model

slide-26
SLIDE 26

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Extended Model

slide-27
SLIDE 27

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Extended Model

Extended vs. Baseline:

  • Pr(Loss | Breach) = 1 − γ < 1
  • Consumer learns of “bad” state with prob. λρB(1 − γ) < λρB
slide-28
SLIDE 28

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Extended Model

Extended vs. Baseline:

  • Pr(Loss | Breach) = 1 − γ < 1
  • Consumer learns of “bad” state with prob. λρB(1 − γ) < λρB

Strategies:

  • Bank: min

γ ψ(γ, q) = φ(γ, q) Expected liability

+ t(γ)

  • Inv’t

cost

  • Website: max

q

π(q, γ)

  • Consumer: participate or not
slide-29
SLIDE 29

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Equilibrium

  • Investments are strategic substitutes (for γ < γ)
  • Unique equilibrium with positive levels of investment by both

website and bank when t′ is sufficiently high

slide-30
SLIDE 30

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Proposition

Both website and bank invest more when the initial loss detection probability, ˜ λ, is sufficiently small. Consumer is made better off.

slide-31
SLIDE 31

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Proposition

Both website and bank invest more when the initial loss detection probability, ˜ λ, is sufficiently small. Consumer is made better off. Intuition:

  • Website

◮ Learning/reputation effect (+)

slide-32
SLIDE 32

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Proposition

Both website and bank invest more when the initial loss detection probability, ˜ λ, is sufficiently small. Consumer is made better off. Intuition:

  • Website

◮ Learning/reputation effect (+)

  • Bank:

◮ Loss detection (+): higher prob. of detection → higher

expected liability

◮ Learning (–): lower prob. of using insecure website in t = 2 →

lower expected liability

◮ Loss detection effect dominates when ˜

λ is small

slide-33
SLIDE 33

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Proposition

Increase in bank’s investment fully crowds out of website’s investment when t′ is sufficiently small.

slide-34
SLIDE 34

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Mandatory Breach Notification

Proposition

Increase in bank’s investment fully crowds out of website’s investment when t′ is sufficiently small. Intuition:

  • Bank’s optimality condition: − φ′(γ, q)

Marg. expected liability

= t′(γ)

  • MC of

inv’t

  • Optimal γ > γ for t′ small → consumer moral hazard
  • Consumer always participates → no incentive for website to

invest

slide-35
SLIDE 35

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Related Literature

  • Data/cyber-security investment: Gordon and Loeb (2002),

Varian (2004), Bauer and Van Eeten (2009)

  • Mandatory breach notification: Romanosky et al (2010)
slide-36
SLIDE 36

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Conclusion

  • Proposed a model of security investment with reputation cost

endogenously generated through consumer learning

  • Consumers may be made better off by policies such as

mandatory breach notification...

  • But important to consider strategic interactions between the

agents

slide-37
SLIDE 37

Introduction Baseline Model Main Results Extended Model

  • Lit. Review

Conclusion Appendix

Thank you. Feedback and comments are welcomed at yinglei.toh@gmail.com