2019
DOI: 10.1108/itp-05-2018-0252
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity economics – balancing operational security spending

Abstract: Purpose The purpose of this paper is to demonstrate how to find the optimal investment level in protecting an organisation’s assets. Design/methodology/approach This study integrates a case study of an international financial organisation with various methods and theories in security economics and mathematics, such as value-at-risk (VaR), Monte Carlo simulation, exponential and Poisson probability distributions. Thereby it combines theory and empirical findings to establish a new approach to determining opti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…Researchers from both the industry and academia have developed several useful methods and tools that can help assess a company's level of security, for instance, BitSight (Bannam, 2017), SecurityScorecard (Herath et al ., 2010), Value at Risk (Ekelund and Iskoujina, 2019), Factor Analysis of Information Risk (Freund and Jones, 2014), SAFE (Security Assessment Framework for Enterprise) platform (Lucideus Incorporated, 2020), and Cyber Doppler (Boston Consulting Group, 2019). These methods and tools can be employed to evaluate a company's security level before and after implementing a CSAT program and thus quantify its benefit.…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers from both the industry and academia have developed several useful methods and tools that can help assess a company's level of security, for instance, BitSight (Bannam, 2017), SecurityScorecard (Herath et al ., 2010), Value at Risk (Ekelund and Iskoujina, 2019), Factor Analysis of Information Risk (Freund and Jones, 2014), SAFE (Security Assessment Framework for Enterprise) platform (Lucideus Incorporated, 2020), and Cyber Doppler (Boston Consulting Group, 2019). These methods and tools can be employed to evaluate a company's security level before and after implementing a CSAT program and thus quantify its benefit.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…Prior studies have explored the management of cybersecurity resources from a cost–benefit perspective (e.g. Gordon and Loeb, 2006; Ekelund and Iskoujina, 2019; Gordon et al ., 2020). However, very few of them have analyzed CSAT programs from such an aspect.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, Couce-Vieira, Insua, and Kosgodagan (2020) pointed out that the impact of breaches not only affects the company but also has implications for its stakeholders, highlighting the importance of knowing how to correctly manage the information transmitted to customers and shareholders. Also, Ekelund and Iskoujina (2019) highlight the responsibility that companies have to their clients and to the administration, which can translate into compensation and associated costs. 8 Therefore, breaches not only have economic, financial and management implications for the company but also the firm's environment can be threatened by its practices, and by how the company manages its cybersecurity.…”
Section: Research Modelmentioning
confidence: 99%
“…Much of the published research on cybersecurity economics has been focused on the economic valuation of the assets and finding the optimal security investment level in organizations to protect those assets [15][16][17][18][19][20][21]. However, cybersecurity economics not only is concerned with whether an organization is spending enough to secure their assets and whether the security budget is spent on the right security measures and controls [22,23], but is also concerned with how a digital ecosystem and its operating agents function and behave. Cybersecurity economics covers the regulatory changes and competitive pressures (e.g., how cybersecurity can be aligned with broader business processes [24]).…”
Section: Introductionmentioning
confidence: 99%