{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T02:16:50Z","timestamp":1777861010072,"version":"3.51.4"},"reference-count":24,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100012456","name":"National Social Science Fund of China","doi-asserted-by":"publisher","award":["22BGL264"],"award-info":[{"award-number":["22BGL264"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems"],"published-print":{"date-parts":[[2026,5]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>The vigorous development of Internet information technology has brought a lot of convenience and fun to people's lives. However, in the modern information world, the problem of information security has always existed. Given the prevalence of information security problems and their consequences, enterprises often invest in information security technologies to strengthen their information systems. However, the security vulnerabilities of information systems cannot be eliminated, so the choice of investment strategies by enterprises is of great significance. Based on the evolutionary game method, this study analyses, from a microscopic perspective, the investment strategy selection process of enterprises when there are security vulnerabilities in information system in the context of the complementarity of information assets between enterprises, and simulates the impact of enterprises' initial investment intention and potential losses as well as breach probabilities and cost differentials on the evolutionary outcomes. The research shows that an enterprise is more willing to choose an investment strategy that minimises the sum of investment costs and expected losses. The higher the enterprise's initial high investment intention or potential losses, the more likely it is to choose a high investment strategy, whilst its partner enterprise is less likely to choose a high investment strategy. In addition, when security investments effectively reduce breach probabilities, enterprises are more inclined to adopt high\u2010investment strategies, whilst higher hacker operational costs can help alleviate enterprises' security investment pressure.<\/jats:p>","DOI":"10.1111\/exsy.70253","type":"journal-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T10:35:42Z","timestamp":1774953342000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on the Game Theory of Enterprise Information Security Investment Considering Information Complementarity"],"prefix":"10.1111","volume":"43","author":[{"given":"Cuiyou","family":"Yao","sequence":"first","affiliation":[{"name":"School of Management and Engineering Capital University of Economics and Business  Beijing China"}]},{"given":"Lin","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Management and Engineering Capital University of Economics and Business  Beijing China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6803-351X","authenticated-orcid":false,"given":"Dongpu","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Management and Engineering Capital University of Economics and Business  Beijing China"}]},{"given":"Yanhong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Management and Engineering Capital University of Economics and Business  Beijing China"}]},{"given":"Haiqing","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Management and Engineering Capital University of Economics and Business  Beijing China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0030-988X","authenticated-orcid":false,"given":"Fulei","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Management and Engineering Capital University of Economics and Business  Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2026,3,31]]},"reference":[{"key":"e_1_2_10_2_1","first-page":"70","article-title":"Optimal Decision Analysis of Information Security Investment and Cyber Insurance Under Mandatory Constraints","volume":"29","author":"Dong K. X.","year":"2021","journal-title":"Chinese Journal of Management Science"},{"key":"e_1_2_10_3_1","first-page":"66","article-title":"Optimal Decision Analysis of Insurance Company Investment Information Security Software Under Dependent Risk","volume":"374","author":"Dong K. X.","year":"2019","journal-title":"Insurance Studies"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2758756"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.2307\/2938222"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2013.133"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3198705"},{"key":"e_1_2_10_8_1","first-page":"142","article-title":"Evolutionary Game Analysis on Personal Information Privacy Protection of Express Logistics Industry","volume":"39","author":"Hu X. F.","year":"2019","journal-title":"Journal of Modern Information"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6932163"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/mde.3404"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-017-0585-y"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2020.125231"},{"key":"e_1_2_10_13_1","first-page":"497","article-title":"Information Investment Strategies for Two Risk\u2010Averse Firms Under Heterogeneous Attacks","volume":"34","author":"Pan C. X.","year":"2019","journal-title":"Journal of Systems Engineering"},{"key":"e_1_2_10_14_1","first-page":"52","article-title":"Security Investment Strategies for Enterprise Information Systems Under Random Hacker Attacks","volume":"40","author":"Pan C. X.","year":"2021","journal-title":"Enterprise Economy"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41274-016-0134-y"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/itor.12972"},{"key":"e_1_2_10_17_1","first-page":"114","article-title":"Governance of Platform Information Security Based on Tripartite Evolutionary Game","volume":"40","author":"Qu X. C.","year":"2020","journal-title":"Journal of Modern Information"},{"key":"e_1_2_10_18_1","first-page":"174","article-title":"Research on the Game of Information Security Investment Based on the Gordon\u2010Loeb Model","volume":"39","author":"Wang Q.","year":"2018","journal-title":"Journal on Communications"},{"key":"e_1_2_10_19_1","first-page":"134","article-title":"Evolutionary Game Research on Knowledge Sharing of Information Security Crowd\u2010Testing Platform Based on Temporary Team","volume":"40","author":"Xiong Q.","year":"2020","journal-title":"Science and Technology Management Research"},{"key":"e_1_2_10_20_1","first-page":"157","article-title":"Quantitative Risk Assessment Method for Information Security of SCADA Systems","volume":"29","author":"Xiong W. Z.","year":"2019","journal-title":"China Safety Science Journal"},{"key":"e_1_2_10_21_1","article-title":"Information Security Strategy Selection of Competitive Enterprises: Independent Defense or Outsourcing","volume":"42","author":"Zhao L. R.","year":"2019","journal-title":"Information Studies: Theory and Application"},{"key":"e_1_2_10_22_1","first-page":"52","article-title":"Information Security Risk Prediction Model Based on IIWPSO\u2010BP From Perspective of Alliance Chain","volume":"32","author":"Zhou X. M.","year":"2022","journal-title":"China Safety Science Journal"},{"key":"e_1_2_10_23_1","first-page":"13","article-title":"Incentive Investments on Information Security for Libraries: An Evolutionary Game\u2010Theory Approach","volume":"2","author":"Zhu G.","year":"2018","journal-title":"Data Analysis and Knowledge Discovery"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/math6100177"},{"key":"e_1_2_10_25_1","first-page":"3","article-title":"Evolutionary Game Analysis of Information Security Regulatory Strategy in Smart City","volume":"41","author":"Zou K.","year":"2021","journal-title":"Journal of Modern Information"}],"container-title":["Expert Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/exsy.70253","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1111\/exsy.70253","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/exsy.70253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T02:41:15Z","timestamp":1777516875000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/exsy.70253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,31]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["10.1111\/exsy.70253"],"URL":"https:\/\/doi.org\/10.1111\/exsy.70253","archive":["Portico"],"relation":{},"ISSN":["0266-4720","1468-0394"],"issn-type":[{"value":"0266-4720","type":"print"},{"value":"1468-0394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,31]]},"assertion":[{"value":"2025-10-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-03-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-03-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70253"}}