Network interconnection and information sharing among firms and their departments expose them to cybersecurity breaches. Traditional cybersecurity studies have paid little attention to the reallocation of security investment within firms. This paper proposes a mathematical model for optimal allocation of cybersecurity investment among headquarters and branches with budget constraints. The differences in size of information sets and system interconnection have been taken into account. The responses of optimal allocation to internal and external factors, such as the portion of branch information set, the propagation probability, the budget constraints, and the intrinsic vulnerability, have been studied in deep both theoretically and numerically. Analysis results indicate that the group will give priority to protecting headquarters when the total budget is small and intrinsic vulnerability is high. The security investment allocated to each branch increases with budget, propagation probability and portion of information set, but never exceeds 1 / ( n + 1 ) of total budget. Numerical simulations also verify that security information sharing among headquarters and branches can help improve the efficiency of security investment in the whole system. Furthermore, the findings of this paper will draw attention to the reallocation of cybersecurity investment within a business group and help cybersecurity managers to develop investment allocation strategies and policies.
This paper studies a container slot allocation problem with dynamic pricing for time-sensitive cargo considering port congestion. Time-sensitive cargo calls for express delivery as soon as possible, and hence a new pricing pattern is proposed considering port congestion. To solve the slot allocation with dynamic pricing issue, a one-phase allocation model which is from different points of view on slot allocation strategy is proposed to formulate this problem. Finally, numerical examples are carried out to test the applicability of the proposed model and solution algorithm.
Considering information security and personalization paradoxes, this paper investigates the optimal information security investments of a firm and purchasing decisions of consumers with different privacy concerns in online personalization. It is found that consumers and firm tend to fall into a prisoner's dilemma in Nash equilibrium. To improve security investment efficiency and boost personalization consumption, firm‐led Stackelberg game and firm‐led Stackelberg game with punishment mechanism are proposed and analyzed. The results indicate that the security information measures firm take in advance can effectively increase the waverers' willingness to purchase personalized products. Government punishment helps to facilitate a win‐win situation but does not work when proportion of wavers in the market is very small. Furthermore, the responses of equilibrium strategies and payoffs to related characteristics are discussed numerically. Finally, some managerial insights are recommended to firms who provide personalized products for making proper security investment and to government departments for formulating security punishment policies.
Correctly identifying the human hair anatomic location
found at
crime scenes can link biological sample donors with the actual crime
event, thus providing significant insight into the crime scene reconstruction.
Forensic proteomic studies on human hairs can facilitate the development
of new biomarkers for hair identification while compensating for the
limitations of the conventional morphologic hair comparison and DNA
analysis. Herein, the LC–MS/MS platform was used to find differentially
expressed protein biomarkers in hairs from different body sites. The
findings indicated that a total of 296 protein biomarkers with statistically
significant differences in body sites were initially identified, and
hair samples from the scalp, pubic, and armpit parts were distinguished
from each other, which were validated by multiple bioinformatic methods.
Fewer differences in protein patterns between armpit and pubic hairs
while larger differences between hair and armpit as well as pubic
hairs provided reasonable evidence of sexual or close intimate contact
in crimes. This study lays the foundation for the development of a
more reliable strategy to distinguish human hairs of various body
areas from Chinese and will also support microscopic hair comparison
analysis and assist in the proper handling of legal proceedings in
relative cases by judicial officers, deserving special attention and
further in-depth investigation. The MS proteomics data have been deposited
to the ProteomeXchange Consortium via the iProX partner repository
with the dataset identifier PXD038173.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.