Welcome to Francis Academic Press

The Frontiers of Society, Science and Technology, 2019, 1(8); doi: 10.25236/FSST.2019.010817.

Research on cost budget model of information security based on Game Theory


Rong Chen1,2*, Qiying Cao1

Corresponding Author:
Rong Chen

1. School of information science and technology, Donghua University, China
2. Shanghai Customs College, China
*Corresponding Author


In the face of the widespread use of information technology today, the information security problem has begun to receive extensive attention. In this paper, based on game theory, the cost budget model of information security was studied and analyzed, and the minimax fuzzy game model was proposed. In this model, evidence theory was used to describe the fuzziness of information, and the minimax regret principle of acceptable income was introduced to avoid unacceptable gains and excessive pessimism. The minimax fuzzy game model was applicable to multiple attackers and multiple defenders, and attackers and defenders need not observe their strategies first, so that they can act at the same time.


Game theory; Information security; Cost of safety; Cost budgeting model

Cite This Paper

Rong Chen, Qiying Cao. Research on cost budget model of information security based on Game Theory. The Frontiers of Society, Science and Technology (2019) Vol. 1 Issue 8: 101-109. https://doi.org/10.25236/FSST.2019.010817.


[1] Banker R D, Kauffman R J (2004). 50th anniversary article: The evolution of research on information systems: A fiftieth-year survey of the literature in management science. Management Science, vol.50, no.3, pp. 281-298.
[2] Anderson R, Moore T (2006). The economics of information security. Science, vol.314, no.5799, pp. 610-613.
[3] Cavusoglu H, Mishra B, Raghunathan S (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, vol.16, no.1, pp. 28-46.
[4] Wang J, Chaudhury A, Rao H R (2008). Research Note-A Value-at-Risk Approach to Information Security Investment. Information Systems Research, vol.19, no.1, pp. 106-120.
[5] Dibbern J, Goles T, Hirschheim R, et al (2004). Information systems outsourcing: a survey and analysis of the literature. ACM Sigmis Database, vol.35, no.4, pp.6-102.
[6] Xiong L, Liu L (2004). Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE transactions on Knowledge and Data Engineering, vol.16, no.7, pp.843-857.
[7] Gordon L A, Loeb M P (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), vol.5, no.4, pp.438-457.