Evolutionary Game Theory Research on Security Regulation Strategies for Critical Information Infrastructure from a Collaborative Perspective

Kai Zou,Siyi Tang,Yuxin Li,Zhiyi Jiang

Published 2025 in 2025 2nd International Symposium on AI and Cybersecurity (ISAICS)

ABSTRACT

Background/Problem] Digital transformation has exposed critical information infrastructure to increasingly sophisticated security threats, rendering traditional regulatory models inadequate. Conducting evolutionary game analysis on security regulation strategies for critical information infrastructure—to elucidate the interaction mechanisms between regulatory policies and security behaviors—has emerged as a pivotal issue for enhancing governance efficacy. [Methods/Process] Building upon an applicability analysis of evolutionary game theory for critical information infrastructure security regulation, this study establishes fundamental assumptions and parameter configurations. A two-party evolutionary game model is constructed from a collaborative perspective, involving both infrastructure operators and government regulators, followed by an analysis of behavioral strategies and the stability of the game system. [Results/Conclusions] The study reveals that an ideal equilibrium is achieved when the benefits of enhanced security management outweigh the costs for operators. Key influencing factors include regulatory costs, enforcement effectiveness, management expenditures, accident probabilities, penalty severity, incentive values, and potential gains from non-compliance. These findings provide actionable insights for optimizing regulatory frameworks.

PUBLICATION RECORD

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

CITED BY

  • No citing papers are available for this paper.

Showing 0-0 of 0 citing papers · Page 1 of 1