2013 46th Hawaii International Conference on System Sciences 2013
DOI: 10.1109/hicss.2013.256
|View full text |Cite
|
Sign up to set email alerts
|

i-HOPE Framework for Predicting Cyber Breaches: A Logit Approach

Abstract: In light of the recent surge in cyber security breaches globally, Information Security Management Systems (ISMS) for organizations is of utmost importance. In this paper, we used the CSI-FBI survey questionnaires from 1997 to 2010 and ISO/IEC27001 standard to propose an i-HOPE framework to predict the likelihood of a cyber breach. Generalized Linear Model i.e. Logit approach and CSI-FBI questionnaire data was used to compute and validate our proposed model. Using our i-HOPE framework we conclude that (i) speci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 19 publications
(31 reference statements)
0
7
0
Order By: Relevance
“…Ahn et al (2013) and Wu et al (2013) and Schreiber-ehle and Koch (2012) do not propose a real time algorithm and their system mainly was designed for decision makes to improve CSA and protect their network through those solutions. Also the study by Das et al (2013) follows same path but in different way. In other words they combine decision making process with financial issues in their approach of improvement of CSA.…”
Section: Discussionmentioning
confidence: 94%
See 3 more Smart Citations
“…Ahn et al (2013) and Wu et al (2013) and Schreiber-ehle and Koch (2012) do not propose a real time algorithm and their system mainly was designed for decision makes to improve CSA and protect their network through those solutions. Also the study by Das et al (2013) follows same path but in different way. In other words they combine decision making process with financial issues in their approach of improvement of CSA.…”
Section: Discussionmentioning
confidence: 94%
“…Not only previous cyber-attacks should be taken into consideration but also there is always need for an efficient strategy against future cyber-attacks as they are getting more and more sophisticated. FBI and Department of Justice in January 2012, Sony in May 2011 (Aspan and Soh 2011) and Citi Bank in June 2011 were victims of cyber-attacks and it proves that any organizations and businesses regardless of their size can be a potential target for cyber attackers (Das et al 2013).…”
Section: Cyber Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Cyber-attacks are a new and dynamic phenomenon threatening companies and governments and cyber security experts need to learn from the past cyber-attacks and design a comprehensive strategy preparing companies and governments against current threats and new threats in future. (Das et al 2013) Sony as an entertainment company in May 2011 (Aspan and Soh, 2011), Citi Bank as a financial and banking service in June 2011 (Levik, 2011) and FBI as a law enforcement agency in FBI and Department of Justice in January 2012, Sony in May 2011 (Aspan and Soh, 2011) and…”
Section: Cyber Securitymentioning
confidence: 99%