ISSE 2013 Securing Electronic Business Processes 2013
DOI: 10.1007/978-3-658-03371-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment

Abstract: Cybersecurity practice lags behind cyber technology achievements. Solutions designed to address many problems may and do exist but frequently cannot be broadly deployed due to economic constraints. Whereas security economics focuses on the cost/benefit analysis and supply/demand, we believe that more sophisticated theoretical approaches, such as economic modeling, rarely utilized, would derive greater societal benefits. Unfortunately, today technologists pursuing interesting and elegant solutions have little k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 25 publications
(21 reference statements)
0
10
0
Order By: Relevance
“…On the other hand, unsuccessful voluntary sharing has several and different root causes. Several studies have been analyzing why people is often reluctant to share [2][3][4][5][6][7].…”
Section: Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, unsuccessful voluntary sharing has several and different root causes. Several studies have been analyzing why people is often reluctant to share [2][3][4][5][6][7].…”
Section: Motivationmentioning
confidence: 99%
“…Visik et al [3], characterize the main reasons about why people is reluctant to share information, if there are not enough incentives for them. Authors suggest that users do not have the same knowledge about the value of artifacts offered, or simply they do not want to share their own data or incidents, as they could be giving a competitive advantage to their own competitors.…”
Section: Paper Organizationmentioning
confidence: 99%
See 1 more Smart Citation
“…In [35], the concept of Mean Failure Cost (MFC) was first introduced. The concept was refined through a series of applications [21,36,37] and has been applied to several domains which include mission assurance [38,39], failure impact analysis in Advanced Metering Infrastructure (AMI) [40,41], risk assessment [42,43], game theoretic simulation [40,44], cybersecurity modeling in the cloud [45], and SCADA environments [46,47]. This value-based metric (MFC), when applied quantifies the security of a computing system by the statistical mean of the random variable that represents for each stakeholder, the amount of loss that results from security threats and system vulnerabilities.…”
Section: Mean Failure Cost (Mfc) As a Measure Of Securitymentioning
confidence: 99%
“…The concept was refined through a series of applications [20,30,31] and has been applied to several domains which include mission assurance [32,33], failure impact analysis in Advanced Metering Infrastructure (AMI) [34,35], risk assessment [36], game theoretic simulation [34,37], cybersecurity modeling in the cloud [38] and SCADA environments [39]. This value-based metric, MFC, when applied quantifies the security of a computing system by the statistical mean of the random variable that represents for each stakeholder, the amount of loss resulting from security threats and system vulnerabilities.…”
Section: The Mean Failure Cost As a Measure Of Securitymentioning
confidence: 99%