data security in the digital age
play

Data Security in the Digital Age Reputation and Strategic - PowerPoint PPT Presentation

Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Data Security in the Digital Age Reputation and Strategic Interactions in Security Investment Ying Lei Toh Toulouse School of Economics March 31, 2016


  1. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Data Security in the Digital Age Reputation and Strategic Interactions in Security Investment Ying Lei Toh Toulouse School of Economics March 31, 2016

  2. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Motivation Data security: A quick look... 1 • 1,540 data breaches in 2014 • Over 1 billion records compromised • 55% of breaches occurred due to malicious attacks • Prominent breaches: Target, Home Depot, Ebay, Sony, Ashley Madison . . . 1Source: http://www.creditcards.com/credit-card-news/credit-card-security-id-theft-fraud-statistics-1276.php

  3. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Motivation • Data breaches can lead to adverse consequences for consumers • Rampant data breaches may be indicative that firms underinvest in security • More firms going digital + growing sophiscation of cybercriminals → more data breaches • What can be done to incentivise firms to invest more?

  4. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Overview & Main Results Model Overview • Players - Baseline: Website and unit mass of consumers (het. valuation) - Extended: Website, representative consumer and bank • Two periods • Unobserved (one-time) security investment by website at the start • Consumer learning via imperfect breach detection → customer turnover (reputation cost)

  5. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Overview & Main Results Main Results • Underinvestment in data security from perspective of consumer protection • Mandatory breach notification ◮ May not always lead to a higher level of investment/overall level of security ◮ May result in full crowding out of website’s investment ◮ Effect on consumer surplus may be ambiguous

  6. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Baseline Model • Website and unit mass of consumer with het. valuation, v • Two states of security: good ( ρ = 0) and bad ( ρ = ρ B > 0) Product valued at v ∼ U [0 , 1] Website Consumer Cust. info & rev., r Cust. info, prob ρ Attacks Losses, l Hackers

  7. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Timing • t=0: Website invests c ( q ) in security - t=1: Consumers decide whether to use website, breach may occur and may be detected - t=2: Consumers decide whether to use website

  8. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Timing • t=0: Website invests c ( q ) in security • t=1: Consumers decide whether to use website, breach may occur and may be detected. Users update their beliefs. - t=2: Consumers decide whether to use website...

  9. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Timing • t=0: Website invests c ( q ) in security. • t=1: Consumers decide whether to use website, breach may occur and may be detected. Users update their beliefs. • t=2: Consumers decide whether to use website...

  10. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Strategies Consumers: • Decide whether to use the website given beliefs: E ( U ) = v − E ( ρ ) l vs. 0 ◮ t=1: Use if v ≥ ˆ v – t=2: Use if v ≥ ˆ v ND when no breach detected and v ≥ ˆ v D when breach detected (ˆ v ND > ˆ v > ˆ v D )

  11. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Strategies Consumers: • Decide whether to use the website given beliefs: E ( U ) = v − E ( ρ ) l vs. 0 ◮ t=1: Use if v ≥ ˆ v ◮ t=2: Use if v ≥ ˆ v ND when no breach detected and v ≥ ˆ v D when breach detected (ˆ v ND > ˆ v > ˆ v D )

  12. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Strategies Consumers: • Decide whether to use the website given beliefs: E ( U ) = v − E ( ρ ) l vs. 0 ◮ t=1: Use if v ≥ ˆ v ◮ t=2: Use if v ≥ ˆ v ND when no breach detected and v ≥ ˆ v D when breach detected (ˆ v ND > ˆ v > ˆ v D )

  13. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Strategies Website: • Set level of security, q f , to max profit: Website’s Problem π ( q f , λ, ρ B max , ˆ v , ˆ ) v D , r q f � �� � � �� � prob. of size of turnover turnover

  14. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Strategies Website: • Set level of security, q f , to max profit: Website’s Problem π ( q f , λ, ρ B max , ˆ v , ˆ ) v D , r q f � �� � � �� � prob. of size of turnover turnover • c ′ ( q ∗ ) = Marg. reduction in loss from cust. turnover ( MB ( q ∗ ))

  15. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Strategies Website: • Set level of security, q f , to max profit: Website’s Problem π ( q f , λ, ρ B max , ˆ v , ˆ ) v D , r q f � �� � � �� � prob. of size of turnover turnover • c ′ ( q ∗ ) = Marg. reduction in loss from cust. turnover ( MB ( q ∗ ))

  16. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Equilibrium • Stable Bayes-Nash equilibrium where website invests q ∗ + in security • Too little investment from consumer protection perspective

  17. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Mandatory Breach Notification • Website to inform customers of breaches in a timely fashion • Increases prob. of breach detection ( λ ) to 1 • More investment in equilibrium if consumers are passive

  18. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Mandatory Breach Notification • Website to inform customers of breaches in a timely fashion • Increases prob. of breach detection ( λ ) to 1 • More investment in equilibrium if consumers are passive Intuition: Stronger learning/reputation effect ◮ Direct: Breach detected with higher prob → more likely to lose customers ◮ Indirect: Higher participation when no breach detected (ˆ v is smaller) → more to lose

  19. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Mandatory Breach Notification Consumer self-protection • Upon detecting breach, consumers may take action to mitigate fraction α of potential losses → U = v − ρ (1 − λα ) l • λα : measure of consumers’ ability to self-protect

  20. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Mandatory Breach Notification Consumer self-protection • Upon detecting breach, consumers may take action to mitigate fraction α of potential losses → U = v − ρ (1 − λα ) l • λα : measure of consumers’ ability to self-protect Proposition Equilibrium level of investment, q ∗ + • increases for small α ; • increases for intermediate α , provided that r is large ; • decreases otherwise. Consumers are better off whenever q ∗ + is higher (ambiguous otherwise). Full Proposition

  21. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Mandatory Breach Notification Intuition: • Learning/reputation effect (+): ◮ Same as with passive consumers ◮ Higher reputation cost when r is larger

  22. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Mandatory Breach Notification Intuition: • Learning/reputation effect (+): ◮ Same as with passive consumers ◮ Higher reputation cost when r is larger • Crowding out effect (–): ◮ Larger λ → larger λα → stronger ability to self-protect • Crowding out effect dominates when α is large

  23. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Extended Model New player: Bank • Affects overall security level via its investment, γ (0bserved) Provides partial insurance to consumer, β l Product valued at v Website Consumer Cust. info & rev., r Cust. info, prob (1 − q ) ρ B Attacks Losses, l prob (1 − q ) ρ B (1 − γ ) Fraud attempts Hackers Bank prob (1 − γ )

  24. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Extended Model New player: Bank • Affects overall security level via its investment, γ (0bserved) • Provides partial insurance to consumer, β l Product valued at v Website Consumer Cust. info & rev., r Cust. info, prob (1 − q ) ρ B Attacks Losses, l Bank’s liability, prob (1 − q ) ρ B (1 − γ ) β l Fraud attempts Hackers Bank prob (1 − γ )

  25. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Extended Model

  26. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Extended Model

  27. Introduction Baseline Model Main Results Extended Model Lit. Review Conclusion Appendix Extended Model Extended vs. Baseline: • Pr(Loss | Breach) = 1 − γ < 1 • Consumer learns of “bad” state with prob. λρ B (1 − γ ) < λρ B

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend