Background/Problem] Digital transformation has exposed critical information infrastructure to increasingly sophisticated security threats, rendering traditional regulatory models inadequate. Conducting evolutionary game analysis on security regulation strategies for critical information infrastructure—to elucidate the interaction mechanisms between regulatory policies and security behaviors—has emerged as a pivotal issue for enhancing governance efficacy. [Methods/Process] Building upon an applicability analysis of evolutionary game theory for critical information infrastructure security regulation, this study establishes fundamental assumptions and parameter configurations. A two-party evolutionary game model is constructed from a collaborative perspective, involving both infrastructure operators and government regulators, followed by an analysis of behavioral strategies and the stability of the game system. [Results/Conclusions] The study reveals that an ideal equilibrium is achieved when the benefits of enhanced security management outweigh the costs for operators. Key influencing factors include regulatory costs, enforcement effectiveness, management expenditures, accident probabilities, penalty severity, incentive values, and potential gains from non-compliance. These findings provide actionable insights for optimizing regulatory frameworks.
Evolutionary Game Theory Research on Security Regulation Strategies for Critical Information Infrastructure from a Collaborative Perspective
Kai Zou,Siyi Tang,Yuxin Li,Zhiyi Jiang
Published 2025 in 2025 2nd International Symposium on AI and Cybersecurity (ISAICS)
ABSTRACT
PUBLICATION RECORD
- Publication year
2025
- Venue
2025 2nd International Symposium on AI and Cybersecurity (ISAICS)
- Publication date
2025-10-24
- Fields of study
Not labeled
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-5 of 5 references · Page 1 of 1
CITED BY
- No citing papers are available for this paper.
Showing 0-0 of 0 citing papers · Page 1 of 1