2005
DOI: 10.1111/j.0272-4332.2005.00573.x
|View full text |Cite
|
Sign up to set email alerts
|

Proportional Hazards in Information Security

Abstract: Nonparametric methods can be used to analyze failure times and estimate probability distributions for failures of systems due to successful attacks on confidentiality, integrity, and availability in information security. However, such methods do not take full advantage of supplemental information regarding the configurations of systems in an information infrastructure that is usually also available. One approach, which does take advantage of such information, views the risks of systems failing from various cau… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…Following the literature support and industrial evidence (Anderson, 2001;Bodin et al, 2005;Carty et al, 2012;Rowe and Gallaher, 2006;Ryan and Ryan, 2005), we, therefore, posit that the following propositions will have a positive effect on firm performance in the context of information security investment.…”
Section: Research Framework and Propositionsmentioning
confidence: 61%
See 1 more Smart Citation
“…Following the literature support and industrial evidence (Anderson, 2001;Bodin et al, 2005;Carty et al, 2012;Rowe and Gallaher, 2006;Ryan and Ryan, 2005), we, therefore, posit that the following propositions will have a positive effect on firm performance in the context of information security investment.…”
Section: Research Framework and Propositionsmentioning
confidence: 61%
“…The effectiveness of IT-related investments, measured in financial terms, has been a topic of research for quite a while now. However, researchers (Anderson, 2001;Bodin et al, 2005;Kuhn et al, 2013;Rowe and Gallaher, 2006;Ryan and Ryan, 2005) have argued that security investments, unlike other IT-related investments, additionally depend on political or regulatory decisions and not solely on financial decisions. In essence, we posit that security investment must be analyzed using a holistic approach that combines different factors such as technical, financial, legal and policy.…”
Section: Conceptual Foundationmentioning
confidence: 99%
“…In [13] nonparametric methods are given as a basis for analysis of failure times in order to derive probability distributions of systems failures (these failures are the consequence of successful breaches of security services). This basis is improved by correlating system survival times to the use of certain design enhancements and other threats countermeasures.…”
Section: Specifics Of Risk Management For Ismentioning
confidence: 99%
“…One of the most studied problems in this area is the issue of security in highrisk facilities-susceptible facilities where failure can cause a catastrophic disaster. This area of study includes transportation security, (36) information security, (37) security in power plants, (8)(9) nuclear facilities, (1) etc. Sagan uses an engineering metaphor called redundancy to explore the counterintuitive behavior we may get from a family of policies.…”
Section: Complicated Interrelations In Security Problemsmentioning
confidence: 99%