Techniques and Applications for Advanced Information Privacy and Security
DOI: 10.4018/9781605662107.ch020
|View full text |Cite
|
Sign up to set email alerts
|

A Simulation Model of IS Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Results [44] suggest there are states where adding more security is detrimental to the overall systems value. Further, under some circumstances changing the state by changing user response (perhaps through training) may be a better use of limited resources than additional security measures.…”
Section: Simulation Studies For Information Securitymentioning
confidence: 93%
See 1 more Smart Citation
“…Results [44] suggest there are states where adding more security is detrimental to the overall systems value. Further, under some circumstances changing the state by changing user response (perhaps through training) may be a better use of limited resources than additional security measures.…”
Section: Simulation Studies For Information Securitymentioning
confidence: 93%
“…Previous work [42] [43] [44] [45] has modeled the attacker/user relationship (Figure 1). The model posits positive influence on both attacks and use from increases in system value and negative influences on all three from security increases.…”
Section: Simulation Studies For Information Securitymentioning
confidence: 99%