Managing Information Risk and the Economics of Security 2008
DOI: 10.1007/978-0-387-09762-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security

Abstract: Organizations deploy systems technologies in order to support their operations and achieve their business objectives. In so doing, they encounter tensions between the confidentiality, integrity, and availability of information, and must make investments in information security measures to address these concerns. We discuss how a macroeconomics-inspired model, analogous to models of interest rate policy used by central banks, can be used to understand trade-offs between investments against threats to confidenti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
44
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
2
1

Relationship

4
3

Authors

Journals

citations
Cited by 50 publications
(50 citation statements)
references
References 20 publications
1
44
0
Order By: Relevance
“…Plot of the number of policies against the likelihood of insider attacks to occurring (solid line), and the likelihood that employees will comply with the policies (dashed/dotted lines) [3,4]. Organisations want to be at the "sweet spot", where maximum compliance coincides with minimum number of policies (the dotted plot).…”
Section: Complex Trust Even More Complex Riskmentioning
confidence: 99%
See 1 more Smart Citation
“…Plot of the number of policies against the likelihood of insider attacks to occurring (solid line), and the likelihood that employees will comply with the policies (dashed/dotted lines) [3,4]. Organisations want to be at the "sweet spot", where maximum compliance coincides with minimum number of policies (the dotted plot).…”
Section: Complex Trust Even More Complex Riskmentioning
confidence: 99%
“…Up to a point we are able to predict that new policies will benefit the organisation, based on a reasonable risk analysis-our actions to reduce insider threats do more good than harm to the organisation. Beyond that point, however, the added policies harm the organisation, either because employees do not comply, or because they disturb the work flow too much [3,4].…”
Section: • Who Should Have Access To What Information?mentioning
confidence: 99%
“…Our hypothesis, supported by a body of exploratory (e.g., [1,2]) and theoretical (e.g., [13,14]) work, is that a specific combination of mathematical systems modelling of the structure and dynamics of organizations and their behaviour and economic modelling of their security policy design and decision-making can deliver a framework within which the consequences of security policy and technology co-design decisions can be predicted and explored experimentally. The security systems of interest are often complex assemblies of agents, be they software or human, policies, and technology.…”
Section: Introductionmentioning
confidence: 98%
“…We build upon a range of ideas from the economics of information security [1,3,7] and mathematical systems modelling [5] to create a modelling methodology and framework for building models that can be used to predict the consequences of different policy choices.…”
Section: Introductionmentioning
confidence: 99%