2013
DOI: 10.1080/1097198x.2013.10845648
|View full text |Cite
|
Sign up to set email alerts
|

Who Can We Trust?: The Economic Impact of Insider Threats

Abstract: Information Systems (IS) Security has become a critical issue in the IT world. Among all threats against IS security, the insider threat is the greatest. This paper proposes a game theoretical model to study the economic impact of insider threats on IS security investments. We identify three factors influencing the optimal IS security investment: breach function sensitivity, deterrence level, and advantage rate. Our simulation results show that the optimal investment required to protect an information systems … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Damaging effects on the reputation and consumers trust are a result of poor network assessment and management which affect the appropriate utilization of IDS [80]. And this is the biggest threats to organizations when security incidents emerge from internal sources [44]. The cause for not finding a reasonable solution for insider threats is because human behavior cannot be accounted for and the motive for performing such attacks varies [31].…”
Section: Insider and Outsider Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…Damaging effects on the reputation and consumers trust are a result of poor network assessment and management which affect the appropriate utilization of IDS [80]. And this is the biggest threats to organizations when security incidents emerge from internal sources [44]. The cause for not finding a reasonable solution for insider threats is because human behavior cannot be accounted for and the motive for performing such attacks varies [31].…”
Section: Insider and Outsider Threatsmentioning
confidence: 99%
“…The impact of internal misuse of information within the organization has increased the vulnerability and risks associated with such abuse [44]. A useful strategy is to implement different security concepts to deter any possible internal threats such as employing disciplinary actions to control human behavior and attitude, the use of more monitoring surveillance, perimeter defense, and notably incorporating decoys as a mean of deception to attackers [8].…”
Section: Researchmentioning
confidence: 99%
“…Hua and Bapna [69] study the impact of cyber-terrorism on economy. They propose a game theoretical model to find the optimal information system security investment and investigate the economic looses caused by terrorism and common hackers.…”
Section: Electronic Warfare Gamesmentioning
confidence: 99%
“…Other work [69] investigates the impact of cyber-threats on information systems investment using game theory approach.…”
Section: Electronic Warfare Gamesmentioning
confidence: 99%
“…Barriers, firewalls and other controls intended to stop external adversaries are generally ineffective for insiders, making this a major and complex security challenge [1]. Although attacks from outside the organisation are more frequent, insiders deliberately or inadvertently misusing their knowledge and access to information generate greater overall consequences [2][3][4][5]. Estimates of the costs of the average insider incident exceed US$400,000, and many incidents exceed US$1 billion in losses [6].…”
Section: Introductionmentioning
confidence: 99%