In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based ...In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based financial technologies(Fintech)have been identified as important disruptive driving forces for this paradigm shift.In this paper,we take an information economics perspective to investigate how big data affects the transformation of the lending industry.By identifying how signaling and search costs are reduced by big data analytics for credit risk management of P2P lending,we discuss how information asymmetry is reduced in the big data era.Rooted in the lending business,we propose a theory on the economics of big data and outline a number of research opportunities and challenging issues.展开更多
Spurred by the world information tide, China has organized a series of information projects, called the "Three Gold" projects. Recently I had an interview with Mr. Hu Qili, Minister of Electronics Industry, ...Spurred by the world information tide, China has organized a series of information projects, called the "Three Gold" projects. Recently I had an interview with Mr. Hu Qili, Minister of Electronics Industry, about the establishment of China’s modern Electronic Information Industry. Mr. Hu told me that information is the mark of development of a modern society and electronics is the major means of carrying information. Establishing展开更多
This paper provides an analysis of how the benefits of information segmentation can assist an organization to derive the appropriate amount to invest in cybersecurity from a cost-benefit perspective. An analytical mod...This paper provides an analysis of how the benefits of information segmentation can assist an organization to derive the appropriate amount to invest in cybersecurity from a cost-benefit perspective. An analytical model based on the framework of the Gordon-Loeb Model (<span><span><span style="font-family:Verdana;">[1]</span><span></span></span></span><span><span></span></span><span></span><span><span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">) is presented that provides a set of sufficient conditions for information segmentation to lower the total investments in cybersecurity and the expected loss from cybersecurity breaches. A numerical example illustrating the insights gained from the model is also presented.</span></span></span>展开更多
Human history has experienced agricultural society and industrial society and is now entering the information society. The major economic developed countries of the world have drawn up and implemented their informatio...Human history has experienced agricultural society and industrial society and is now entering the information society. The major economic developed countries of the world have drawn up and implemented their information plans. An information revolution is being carried out around the world. How to set up China’s information industry and economic information network is of展开更多
This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber...This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber threat information with all organizations. In prior cybersecurity information sharing models a common element was reciprocity—i.e., firms receiving shared information are also asked to share their private cybersecurity information with all other firms (via an information sharing arrangement). In contrast, sharing of unclassified cyber threat intelligence (CTI) by a government agency or department is not based on reciprocal sharing by the recipient organizations. After considering the government’s cost of preparing and disseminating CTI, as well as the benefits to the recipients of the CTI, we provide sufficient conditions for sharing of CTI to result in an increase in social welfare. Under a broad set of general conditions, sharing of CTI will increase social welfare gross of the costs to the government agency or department sharing the information. Thus, if the entity can keep the sharing costs low, sharing cybersecurity information will result in an increase in net social welfare.展开更多
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash...The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.展开更多
In order to make equipment run safely, economically and continuously, some new maintenance models were put forward to improve the equipment after-sale maintenance service, such as E-maintenance, third-party maintenanc...In order to make equipment run safely, economically and continuously, some new maintenance models were put forward to improve the equipment after-sale maintenance service, such as E-maintenance, third-party maintenance, etc. To certain extent, the models solved the problem of the distance between the manufacturer and customer and the dispersion of the maintenance technologies, however, those resources are still widely distributed and do not collaborate efficiently. In this paper, a network-based collaborative maintenance service model was proposed for after-sales equipment to solve the problem of maintenance resources integration. Concretely, equipment designers, maintainers, spare parts suppliers and maintenance experts were grouped together to establish dynamic alliance. The leader of the alliance is the manufacturer under guaranty period or equipment user exceeding the guaranty period. The process of maintenance service was divided into three stages which are fault diagnosis, maintenance decision and maintenance implementation. The sub-alliances were established to carry out maintenance work at each stage. In addition, the business process of network-based collaborative maintenance was analyzed and collaborative business system for equipment's after-sales collaborative maintenance service was designed. In the end, an informational economics model of network-based collaborative maintenance was established to demonstrate the effectiveness of this maintenance model.展开更多
Background:his paper presents a case study on 100Credit,an Internet credit service provider in China.100Credit began as an IT company specializing in e-commerce recommendation before getting into the credit rating bus...Background:his paper presents a case study on 100Credit,an Internet credit service provider in China.100Credit began as an IT company specializing in e-commerce recommendation before getting into the credit rating business.The company makes use of Big Data on multiple aspects of individuals’online activities to infer their potential credit risk.Methods:Based on 100Credit’s business practices,this paper summarizes four aspects related to the value of Big Data in Internet credit services.Results:1)value from large data volume that provides access to more borrowers;2)value from prediction correctness in reducing lenders’operational cost;3)value from the variety of services catering to different needs of lenders;and 4)value from information protection to sustain credit service businesses.Conclusion:The paper also discusses the opportunities and challenges of Big Databased credit risk analysis,which needs to be improved in future research and practice.展开更多
Given the importance of cybersecurity to the survival of an organization, a fundamental economics-based question that must be addressed by all organizations is: How much should be invested in cybersecurity related act...Given the importance of cybersecurity to the survival of an organization, a fundamental economics-based question that must be addressed by all organizations is: How much should be invested in cybersecurity related activities? Gordon and Loeb [1] presented a model to address this question, and that model has received a significant amount of attention in the academic and practitioner literature. The primary objective of this paper is to discuss the Gordon-Loeb Model with a focus on gaining insights for the model’s use in a practical setting.展开更多
Loyalty program (LP) is a popular marketing activity of enterprises. As a result of firms’ effort to increase customers’ loyalty, point exchange or redemption services are now available worldwide. These services att...Loyalty program (LP) is a popular marketing activity of enterprises. As a result of firms’ effort to increase customers’ loyalty, point exchange or redemption services are now available worldwide. These services attract not only customers but also attackers. In pioneering research, which first focused on this LP security problem, an empirical analysis based on Japanese data is shown to see the effects of LP-point liquidity on damages caused by security incidents. We revisit the empirical models in which the choice of variables is inspired by the Gordon-Loeb formulation of security investment: damage, investment, vulnerability, and threat. The liquidity of LP points corresponds to the threat in the formulation and plays an important role in the empirical study because it particularly captures the feature of LP networks. However, the actual proxy used in the former study is artificial. In this paper, we reconsider the liquidity definition based on a further observation of LP security incidents. By using newly defined proxies corresponding to the threat as well as other refined proxies, we test hypotheses to derive more implications that help LP operators to manage partnerships;the implications are consistent with recent changes in the LP network. Thus we can see the impacts of security investment models include a wider range of empirical studies.展开更多
文摘In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based financial technologies(Fintech)have been identified as important disruptive driving forces for this paradigm shift.In this paper,we take an information economics perspective to investigate how big data affects the transformation of the lending industry.By identifying how signaling and search costs are reduced by big data analytics for credit risk management of P2P lending,we discuss how information asymmetry is reduced in the big data era.Rooted in the lending business,we propose a theory on the economics of big data and outline a number of research opportunities and challenging issues.
文摘Spurred by the world information tide, China has organized a series of information projects, called the "Three Gold" projects. Recently I had an interview with Mr. Hu Qili, Minister of Electronics Industry, about the establishment of China’s modern Electronic Information Industry. Mr. Hu told me that information is the mark of development of a modern society and electronics is the major means of carrying information. Establishing
文摘This paper provides an analysis of how the benefits of information segmentation can assist an organization to derive the appropriate amount to invest in cybersecurity from a cost-benefit perspective. An analytical model based on the framework of the Gordon-Loeb Model (<span><span><span style="font-family:Verdana;">[1]</span><span></span></span></span><span><span></span></span><span></span><span><span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">) is presented that provides a set of sufficient conditions for information segmentation to lower the total investments in cybersecurity and the expected loss from cybersecurity breaches. A numerical example illustrating the insights gained from the model is also presented.</span></span></span>
文摘Human history has experienced agricultural society and industrial society and is now entering the information society. The major economic developed countries of the world have drawn up and implemented their information plans. An information revolution is being carried out around the world. How to set up China’s information industry and economic information network is of
文摘This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber threat information with all organizations. In prior cybersecurity information sharing models a common element was reciprocity—i.e., firms receiving shared information are also asked to share their private cybersecurity information with all other firms (via an information sharing arrangement). In contrast, sharing of unclassified cyber threat intelligence (CTI) by a government agency or department is not based on reciprocal sharing by the recipient organizations. After considering the government’s cost of preparing and disseminating CTI, as well as the benefits to the recipients of the CTI, we provide sufficient conditions for sharing of CTI to result in an increase in social welfare. Under a broad set of general conditions, sharing of CTI will increase social welfare gross of the costs to the government agency or department sharing the information. Thus, if the entity can keep the sharing costs low, sharing cybersecurity information will result in an increase in net social welfare.
基金The National Natural Science Foundation of China(No.71071033)the Innovation Project of Jiangsu Postgraduate Education(No.CX10B_058Z)
文摘The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.
基金supported by National Natural Science Foundation of China (Grant No. 70301012)National Hi-tech Research and Development Program of China (863 Program, Grant No. 2006AA04Z369-1)Innovative Talent Project of the Third Stage of "211" Project, Chongqing University, China (Grant No. S-09107)
文摘In order to make equipment run safely, economically and continuously, some new maintenance models were put forward to improve the equipment after-sale maintenance service, such as E-maintenance, third-party maintenance, etc. To certain extent, the models solved the problem of the distance between the manufacturer and customer and the dispersion of the maintenance technologies, however, those resources are still widely distributed and do not collaborate efficiently. In this paper, a network-based collaborative maintenance service model was proposed for after-sales equipment to solve the problem of maintenance resources integration. Concretely, equipment designers, maintainers, spare parts suppliers and maintenance experts were grouped together to establish dynamic alliance. The leader of the alliance is the manufacturer under guaranty period or equipment user exceeding the guaranty period. The process of maintenance service was divided into three stages which are fault diagnosis, maintenance decision and maintenance implementation. The sub-alliances were established to carry out maintenance work at each stage. In addition, the business process of network-based collaborative maintenance was analyzed and collaborative business system for equipment's after-sales collaborative maintenance service was designed. In the end, an informational economics model of network-based collaborative maintenance was established to demonstrate the effectiveness of this maintenance model.
文摘Background:his paper presents a case study on 100Credit,an Internet credit service provider in China.100Credit began as an IT company specializing in e-commerce recommendation before getting into the credit rating business.The company makes use of Big Data on multiple aspects of individuals’online activities to infer their potential credit risk.Methods:Based on 100Credit’s business practices,this paper summarizes four aspects related to the value of Big Data in Internet credit services.Results:1)value from large data volume that provides access to more borrowers;2)value from prediction correctness in reducing lenders’operational cost;3)value from the variety of services catering to different needs of lenders;and 4)value from information protection to sustain credit service businesses.Conclusion:The paper also discusses the opportunities and challenges of Big Databased credit risk analysis,which needs to be improved in future research and practice.
文摘Given the importance of cybersecurity to the survival of an organization, a fundamental economics-based question that must be addressed by all organizations is: How much should be invested in cybersecurity related activities? Gordon and Loeb [1] presented a model to address this question, and that model has received a significant amount of attention in the academic and practitioner literature. The primary objective of this paper is to discuss the Gordon-Loeb Model with a focus on gaining insights for the model’s use in a practical setting.
文摘Loyalty program (LP) is a popular marketing activity of enterprises. As a result of firms’ effort to increase customers’ loyalty, point exchange or redemption services are now available worldwide. These services attract not only customers but also attackers. In pioneering research, which first focused on this LP security problem, an empirical analysis based on Japanese data is shown to see the effects of LP-point liquidity on damages caused by security incidents. We revisit the empirical models in which the choice of variables is inspired by the Gordon-Loeb formulation of security investment: damage, investment, vulnerability, and threat. The liquidity of LP points corresponds to the threat in the formulation and plays an important role in the empirical study because it particularly captures the feature of LP networks. However, the actual proxy used in the former study is artificial. In this paper, we reconsider the liquidity definition based on a further observation of LP security incidents. By using newly defined proxies corresponding to the threat as well as other refined proxies, we test hypotheses to derive more implications that help LP operators to manage partnerships;the implications are consistent with recent changes in the LP network. Thus we can see the impacts of security investment models include a wider range of empirical studies.