Economics of Information Security and Privacy III 2012
DOI: 10.1007/978-1-4614-1981-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic Approach

Abstract: This paper addresses the question of determining the optimal timing of interventions in information security management. Using utility theory, we derive the limiting condition under which, given a potential or realized risk, a decision to invest, delay, or abandon can be justified. Our primary focus is on the decision to defer costly deterministic investments, such as the removal of a service or implementation of a security patch, when the costs associated with future security vulnerabilities are uncertain. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 27 publications
(25 reference statements)
0
15
0
Order By: Relevance
“…The parameters of interest are, therefore, represented by the estimates of λ ∞ that are indicative of the existence of jumps. Contagion is captured by the elements of the contagion matrix (13). All of the statistical results that are presented in the tables below are statistically significant at 5%.…”
Section: Results and Analysismentioning
confidence: 83%
See 2 more Smart Citations
“…The parameters of interest are, therefore, represented by the estimates of λ ∞ that are indicative of the existence of jumps. Contagion is captured by the elements of the contagion matrix (13). All of the statistical results that are presented in the tables below are statistically significant at 5%.…”
Section: Results and Analysismentioning
confidence: 83%
“…The critical tipping point for additional investment occurs when L K (t, T ) = L CS (t, T ). Similar models and conditions have been given in [11,12,13].…”
Section: The Basic Modelmentioning
confidence: 96%
See 1 more Smart Citation
“…This use of multi-attribute utility theory (see [16] for a detailed account) has been employed as a tool for reasoning in a range of security settings; for example, [12,14].…”
Section: Productivity and Utilitymentioning
confidence: 99%
“…Our hypothesis, supported by a body of exploratory (e.g., [1,2]) and theoretical (e.g., [13,14]) work, is that a specific combination of mathematical systems modelling of the structure and dynamics of organizations and their behaviour and economic modelling of their security policy design and decision-making can deliver a framework within which the consequences of security policy and technology co-design decisions can be predicted and explored experimentally. The security systems of interest are often complex assemblies of agents, be they software or human, policies, and technology.…”
Section: Introductionmentioning
confidence: 98%