Research Anthology on Artificial Intelligence Applications in Security 2020
DOI: 10.4018/978-1-7998-7705-9.ch085
|View full text |Cite
|
Sign up to set email alerts
|

It's Not My Fault

Abstract: This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that offer similar products and 2) the effect of information transfer is weaker when the information security breach is due to internal faults or is related to the loss of p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 43 publications
0
0
0
Order By: Relevance
“…Most such efforts have been put into a mechanism to defend against individual attacks (Foley et al, 2020;Pongle & Chavan, 2015) against AODV and RPL routing protocol. (3) Intrusion detection (Shen et al, 2020;Wang et al, 2021) fails to handle high detection rates, early detection of known attacks, the ability to detect novel, unknown attacks, and a low false-positive rate.…”
Section: Introductionmentioning
confidence: 99%
“…Most such efforts have been put into a mechanism to defend against individual attacks (Foley et al, 2020;Pongle & Chavan, 2015) against AODV and RPL routing protocol. (3) Intrusion detection (Shen et al, 2020;Wang et al, 2021) fails to handle high detection rates, early detection of known attacks, the ability to detect novel, unknown attacks, and a low false-positive rate.…”
Section: Introductionmentioning
confidence: 99%