Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
In this study we develop an analytic model for information security investment allocation of a fixed budget. Our model considers concurrent heterogeneous attacks with distinct characteristics and derives the breach probability functions based on the theory of scale-free networks. The relationships a...
Saved in:
Published in | International journal of production economics Vol. 141; no. 1; pp. 255 - 268 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier B.V
01.01.2013
Elsevier Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
ISSN | 0925-5273 1873-7579 |
DOI | 10.1016/j.ijpe.2012.06.022 |
Cover
Abstract | In this study we develop an analytic model for information security investment allocation of a fixed budget. Our model considers concurrent heterogeneous attacks with distinct characteristics and derives the breach probability functions based on the theory of scale-free networks. The relationships among the major variables, such as network exposure, potential loss due to a security breach, investment effectiveness, and security investment levels, are investigated via analytical and numerical analyses subject to various boundary conditions. In particular, our model shows how a firm should allocate its limited information security budget to defend against two classes of security attacks (targeted and opportunistic) concurrently. Among the results of these analyses, we find that a firm with a limited security budget is better off allocating most or all of the investment to measures against one of the classes of attack. Further, we find that managers should focus the security investment on preventing targeted attacks when the information systems are highly connected and relatively open and when the potential loss is large relative to the security budget. |
---|---|
AbstractList | In this study we develop an analytic model for information security investment allocation of a fixed budget. Our model considers concurrent heterogeneous attacks with distinct characteristics and derives the breach probability functions based on the theory of scale-free networks. The relationships among the major variables, such as network exposure, potential loss due to a security breach, investment effectiveness, and security investment levels, are investigated via analytical and numerical analyses subject to various boundary conditions. In particular, our model shows how a firm should allocate its limited information security budget to defend against two classes of security attacks (targeted and opportunistic) concurrently. Among the results of these analyses, we find that a firm with a limited security budget is better off allocating most or all of the investment to measures against one of the classes of attack. Further, we find that managers should focus the security investment on preventing targeted attacks when the information systems are highly connected and relatively open and when the potential loss is large relative to the security budget. In this study we develop an analytic model for information security investment allocation of a fixed budget. Our model considers concurrent heterogeneous attacks with distinct characteristics and derives the breach probability functions based on the theory of scale-free networks. The relationships among the major variables, such as network exposure, potential loss due to a security breach, investment effectiveness, and security investment levels, are investigated via analytical and numerical analyses subject to various boundary conditions. In particular, our model shows how a firm should allocate its limited information security budget to defend against two classes of security attacks (targeted and opportunistic) concurrently. Among the results of these analyses, we find that a firm with a limited security budget is better off allocating most or all of the investment to measures against one of the classes of attack. Further, we find that managers should focus the security investment on preventing targeted attacks when the information systems are highly connected and relatively open and when the potential loss is large relative to the security budget. [PUBLICATION ABSTRACT] |
Author | Huang, C. Derrick Behara, Ravi S. |
Author_xml | – sequence: 1 givenname: C. Derrick surname: Huang fullname: Huang, C. Derrick email: dhuang@fau.edu – sequence: 2 givenname: Ravi S. surname: Behara fullname: Behara, Ravi S. email: rbehara@fau.edu |
BackLink | http://www.econis.eu/PPNSET?PPN=734426631$$DView this record in ZBW - Deutsche Zentralbibliothek für Wirtschaftswissenschaften |
BookMark | eNp9kUtv3CAUhVGVSp08_kA2tdRNN3bg2gYsdVNF6UOKlE26RgxcZ3DHMAWcKv--OJNussgKBN-5OueeU3Lig0dCLhltGGX8amrcdMAGKIOG8oYCvCMbJkVbi14MJ2RDB-jrHkT7gZymNFFKBZNyQ_KNCT7MzqQqjJXzY4izzi74KqFZostP5fERU57R53Kt8g4roxOueJEWJq4_O8wYwwN6DEuqdM7a_E7VX5d31XaxD5hXOOWonc_pnLwf9T7hxct5Rn59u7m__lHf3n3_ef31tjadhFxziS0KwWknrWl7aTlKOghhLQi57ZDrYQRtudQ9AnQtldvWcs637WgBBt2ekc_HuYcY_iwlhJpdMrjf62ebinHBQNAiKeinV-gUluiLO8XYIDh0tIdCfTxSWNK4pA7RzTo-KdF2HZQprBDySJgYUoo4KuPy80LX7HvFqFoLU5NaC1NrYYpyVQorUngl_T_-TdGXF0dlj48Oo0rGoTdoXUSTlQ3uLfk_bsCyLA |
CODEN | IJPCEY |
CitedBy_id | crossref_primary_10_1007_s12525_017_0276_z crossref_primary_10_1007_s10796_016_9648_8 crossref_primary_10_1111_risa_13416 crossref_primary_10_1007_s10878_019_00446_6 crossref_primary_10_1002_asmb_2451 crossref_primary_10_1007_s10660_022_09558_4 crossref_primary_10_1016_j_cose_2021_102533 crossref_primary_10_1016_j_procs_2015_12_165 crossref_primary_10_1080_00207543_2017_1400704 crossref_primary_10_1016_j_future_2021_05_033 crossref_primary_10_1108_JEIM_04_2023_0189 crossref_primary_10_3390_su132413677 crossref_primary_10_1080_17517575_2019_1644672 crossref_primary_10_1057_jors_2013_133 crossref_primary_10_1057_s41274_016_0134_y crossref_primary_10_1016_j_cie_2024_110093 crossref_primary_10_1016_j_ijpe_2024_109448 crossref_primary_10_1108_TG_11_2019_0112 crossref_primary_10_1016_j_cose_2020_101961 crossref_primary_10_1016_j_eswa_2021_114990 crossref_primary_10_26425_2309_3633_2023_11_4_110_118 crossref_primary_10_4018_IJEIS_2018040101 crossref_primary_10_1016_j_cose_2018_02_001 crossref_primary_10_1080_01605682_2023_2233550 crossref_primary_10_1002_mde_3551 crossref_primary_10_1002_mde_3310 crossref_primary_10_1016_j_cie_2024_110519 crossref_primary_10_1108_ICS_02_2020_0028 crossref_primary_10_1007_s40092_016_0144_z crossref_primary_10_1016_j_elerap_2019_100843 crossref_primary_10_4018_IJKM_2019010103 crossref_primary_10_3390_math7070587 crossref_primary_10_1007_s10898_017_0585_y crossref_primary_10_1080_01605682_2022_2096506 crossref_primary_10_1080_00207543_2021_1994166 crossref_primary_10_1016_j_ijpe_2016_09_018 crossref_primary_10_1016_j_jaccpubpol_2018_10_005 crossref_primary_10_1080_0740817X_2015_1125044 crossref_primary_10_1007_s10479_015_1925_2 crossref_primary_10_3390_risks10110220 crossref_primary_10_1016_j_eswa_2023_120654 crossref_primary_10_1016_j_cie_2017_05_018 crossref_primary_10_1016_j_eswa_2015_03_033 crossref_primary_10_1016_j_dss_2013_10_011 crossref_primary_10_1080_01605682_2024_2368611 crossref_primary_10_1108_IMDS_06_2021_0408 crossref_primary_10_1007_s10796_017_9745_3 crossref_primary_10_3390_a15060211 |
Cites_doi | 10.2753/MIS0742-1222250210 10.1109/TEM.2004.839962 10.1145/1005817.1005828 10.1016/j.ijpe.2008.05.002 10.1126/science.1130992 10.1109/TEM.2008.927818 10.1109/TEM.2009.2016065 10.1142/S0217979203022027 10.1145/997150.997156 10.1145/316194.316229 10.1287/deca.1040.0022 10.1126/science.286.5439.509 10.1016/j.ijpe.2008.04.002 10.1103/PhysRevLett.86.3200 10.1103/PhysRevLett.96.208701 10.1109/TNET.2005.861250 10.1140/epjb/e2006-00099-7 10.1145/335168.335170 10.1073/pnas.012583099 10.1007/s10796-006-9011-6 10.1109/MITP.2004.89 10.1145/581271.581274 10.1038/43601 10.1016/j.cose.2005.03.004 10.1038/35019019 10.1287/isre.1050.0041 10.1145/365181.365241 10.1103/PhysRevE.74.056109 10.1016/S1361-3723(03)04010-7 10.1109/TSMCB.2005.854498 10.1038/30918 10.1109/MITP.2008.90 10.1145/777313.777327 10.1109/MSP.2005.30 |
ContentType | Journal Article |
Copyright | 2012 Elsevier B.V. Copyright Elsevier Sequoia S.A. Jan 2013 |
Copyright_xml | – notice: 2012 Elsevier B.V. – notice: Copyright Elsevier Sequoia S.A. Jan 2013 |
DBID | AAYXX CITATION OQ6 7TA 7TB 8FD FR3 JG9 KR7 |
DOI | 10.1016/j.ijpe.2012.06.022 |
DatabaseName | CrossRef ECONIS Materials Business File Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database Materials Research Database Civil Engineering Abstracts |
DatabaseTitle | CrossRef Materials Research Database Civil Engineering Abstracts Engineering Research Database Technology Research Database Mechanical & Transportation Engineering Abstracts Materials Business File |
DatabaseTitleList | Materials Research Database Materials Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Business Economics |
EISSN | 1873-7579 |
EndPage | 268 |
ExternalDocumentID | 2824621561 734426631 10_1016_j_ijpe_2012_06_022 S0925527312002678 |
Genre | Feature |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29J 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAFFL AAIAV AAIKJ AAKOC AALRI AAOAW AAPFB AAQFI AAQXK AARIN AAXUO ABFNM ABFRF ABJNI ABMAC ABUCO ABXDB ABYKQ ACDAQ ACGFO ACGFS ACGOD ACIWK ACNNM ACRLP ACROA ADBBV ADEZE ADFHU ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AEYQN AFKWA AFODL AFTJW AGHFR AGTHC AGUBO AGYEJ AHHHB AHJVU AI. AIEXJ AIIAU AIKHN AITUG AJBFU AJOXV AJWLA ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ APLSM ASPBG AVWKF AXJTR AXLSJ AZFZN BEHZQ BEZPJ BGSCR BJAXD BKOJK BKOMP BLXMC BNTGB BPUDD BULVW BZJEE CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HAMUX HLX HVGLF HZ~ IHE IXIXF J1W JJJVA KOM LG8 LY1 LY7 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SBM SDF SDG SDP SDS SES SET SEW SPC SPCBC SSB SSD SSF SST SSZ T5K TAE TN5 U5U VH1 WUQ YK3 ~02 ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO ADVLN AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH OQ6 7TA 7TB 8FD EFKBS FR3 JG9 KR7 |
ID | FETCH-LOGICAL-c482t-68e3e776048dc358d6e80977dd278b4e6a9f2ad68a5e224308b3d666b3fd229a3 |
IEDL.DBID | AIKHN |
ISSN | 0925-5273 |
IngestDate | Fri Sep 05 09:58:52 EDT 2025 Wed Aug 13 10:37:12 EDT 2025 Sat Mar 08 16:22:01 EST 2025 Tue Jul 01 02:31:19 EDT 2025 Thu Apr 24 23:09:04 EDT 2025 Fri Feb 23 02:31:14 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Investment analysis Budget allocation Cost benefit analysis Information security Scale-free network |
Language | English |
License | https://www.elsevier.com/tdm/userlicense/1.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c482t-68e3e776048dc358d6e80977dd278b4e6a9f2ad68a5e224308b3d666b3fd229a3 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
PQID | 1197624052 |
PQPubID | 45063 |
PageCount | 14 |
ParticipantIDs | proquest_miscellaneous_1671270666 proquest_journals_1197624052 econis_primary_734426631 crossref_citationtrail_10_1016_j_ijpe_2012_06_022 crossref_primary_10_1016_j_ijpe_2012_06_022 elsevier_sciencedirect_doi_10_1016_j_ijpe_2012_06_022 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2013-01-01 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – month: 01 year: 2013 text: 2013-01-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | International journal of production economics |
PublicationYear | 2013 |
Publisher | Elsevier B.V Elsevier Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier B.V – name: Elsevier – name: Elsevier Sequoia S.A |
References | Faloutsos, Faloutsos, Faloutsos (bib20) 1999; 29 Watts (bib49) 1999 Barabási, Albert (bib7) 1999; 286 Cavusoglu, Mishra, Raghunathan (bib14) 2005; 16 Cavusoglu, Mishra, Raghunathan (bib13) 2004; 47 Kumar, Park, Subramaniam (bib33) 2008; 25 Ponemon Institute, 2009. 2008 Annual Study: Cost of Data Breach. PGP Corporation. Chang, Young (bib15) 2005; 24 Vijaya, Jaikumar, 2011. Epsilon a Victim of Spear-Phishing Attack, Says Report. Computer World, April 7. Alter, Sherer (bib4) 2004; 14 Anderson, Moore (bib5) 2006; 314 Casey (bib11) 2003; 4 Goel, Chen (bib21) 2008; 115 Li (bib26) 2009; 56 Albert, Jeong, Barabási (bib1) 1999; 401 Richardson, R., 2009. 2008 CSI Computer Crime & Security Survey. Computer Security Institute. Schechter (bib43) 2005; 3 Mercuri (bib35) 2003; 46 Nagaraja, Anderson (bib37) 2005 Carr (bib10) 2003; 81 Karr (bib29) 2006; 4 Watts, Strogatz (bib50) 1998; 393 Zhou, Liu, Bai, Chen, Wang (bib51) 2006; 74 Alderson, Li, Wallinger, Doyle (bib3) 2005; 13 Pastor-Satorras, Vespignani (bib39) 2001; 86 Arora, Hall, Pinto, Ramsey, Telang (bib6) 2004; 6 Huang, Behara, Hu (bib28) 2008; 10 Griffin, Brooks (bib23) 2006; 36 Bellovin (bib9) 2001; 44 Albert, Jeong, Barabási (bib2) 2000; 406 Huang, Behara, Hu (bib27) 2008; 114 Khamooshi, Cioffi (bib31) 2009; 56 Gordon, Loeb (bib22) 2002; 5 Kaufman, R., Li, X., 2005. Technology competition and optimal investment timing: a real options perspective. IEEE Transaction on Engineering Management 52 (1), 15–29. Mirkovic, Reiher (bib36) 2004; 34 Poff (bib40) 2009 CERT, 2007. Overconfidence is Pervasive Amongst Security Professionals, E-Crime Watch Survey by CSO Magazine, CERT, and U.S. Secret Service. Hauske (bib25) 2006; 8 Ogut, H., Menon, N., Raghunathan, S., 2005. Cyber insurance and IT security investment: impact of interdependent risk. In: Fourth Workshop on Economics of Information Security, Cambridge, MA. Cavusoglu, Raghunathan (bib12) 2004; 1 Cremonini, D., Nizovtsev, M., 2006. Understanding and influencing attackers’ decisions: implications for security investment strategies. In: Fifth Workshop on Economics of Information Security, Cambridge, England. Gross, D'Lima, Blasius (bib24) 2006; 96 Dhanjani (bib19) 2009 Lai, Liu, Ye (bib34) 2003; 17 Collins, M., Gates, C., Kataria, G., 2006. A model for opportunistic network exploits: the case of P2P worms. In: Fifth Workshop on Economics of Information Security, Cambridge, England. Behara, Bhattacharya (bib8) 2007; 349–366 Telo da Gama, Nunes (bib45) 2006; 50 Wallinger, Govindan, Jamin, Paxson, Shenker (bib48) 2000; 99 Verizon, 2011. Data Breach Investigations Report. Kumar, R., Raghavan, P., Rajagopalan, S., Sivakumar, D., Tomkins, A., Upfal, E., 2000. The web as a graph. In: Proceedings of 19th ACM Symposium of Principles of Database Systems, Dallas, Texas, 1–10. Kumar (10.1016/j.ijpe.2012.06.022_bib33) 2008; 25 Nagaraja (10.1016/j.ijpe.2012.06.022_bib37) 2005 Bellovin (10.1016/j.ijpe.2012.06.022_bib9) 2001; 44 Goel (10.1016/j.ijpe.2012.06.022_bib21) 2008; 115 Watts (10.1016/j.ijpe.2012.06.022_bib49) 1999 Pastor-Satorras (10.1016/j.ijpe.2012.06.022_bib39) 2001; 86 10.1016/j.ijpe.2012.06.022_bib17 Huang (10.1016/j.ijpe.2012.06.022_bib27) 2008; 114 10.1016/j.ijpe.2012.06.022_bib16 10.1016/j.ijpe.2012.06.022_bib18 Mercuri (10.1016/j.ijpe.2012.06.022_bib35) 2003; 46 Faloutsos (10.1016/j.ijpe.2012.06.022_bib20) 1999; 29 Alderson (10.1016/j.ijpe.2012.06.022_bib3) 2005; 13 Li (10.1016/j.ijpe.2012.06.022_bib26) 2009; 56 Albert (10.1016/j.ijpe.2012.06.022_bib1) 1999; 401 Casey (10.1016/j.ijpe.2012.06.022_bib11) 2003; 4 Gordon (10.1016/j.ijpe.2012.06.022_bib22) 2002; 5 Anderson (10.1016/j.ijpe.2012.06.022_bib5) 2006; 314 Cavusoglu (10.1016/j.ijpe.2012.06.022_bib13) 2004; 47 Watts (10.1016/j.ijpe.2012.06.022_bib50) 1998; 393 Karr (10.1016/j.ijpe.2012.06.022_bib29) 2006; 4 Schechter (10.1016/j.ijpe.2012.06.022_bib43) 2005; 3 Telo da Gama (10.1016/j.ijpe.2012.06.022_bib45) 2006; 50 10.1016/j.ijpe.2012.06.022_bib46 10.1016/j.ijpe.2012.06.022_bib47 10.1016/j.ijpe.2012.06.022_bib42 Gross (10.1016/j.ijpe.2012.06.022_bib24) 2006; 96 10.1016/j.ijpe.2012.06.022_bib41 Chang (10.1016/j.ijpe.2012.06.022_bib15) 2005; 24 Hauske (10.1016/j.ijpe.2012.06.022_bib25) 2006; 8 Dhanjani (10.1016/j.ijpe.2012.06.022_bib19) 2009 Wallinger (10.1016/j.ijpe.2012.06.022_bib48) 2000; 99 Arora (10.1016/j.ijpe.2012.06.022_bib6) 2004; 6 Cavusoglu (10.1016/j.ijpe.2012.06.022_bib14) 2005; 16 10.1016/j.ijpe.2012.06.022_bib38 Alter (10.1016/j.ijpe.2012.06.022_bib4) 2004; 14 Huang (10.1016/j.ijpe.2012.06.022_bib28) 2008; 10 Poff (10.1016/j.ijpe.2012.06.022_bib40) 2009 Behara (10.1016/j.ijpe.2012.06.022_bib8) 2007; 349–366 Zhou (10.1016/j.ijpe.2012.06.022_bib51) 2006; 74 Khamooshi (10.1016/j.ijpe.2012.06.022_bib31) 2009; 56 10.1016/j.ijpe.2012.06.022_bib30 Carr (10.1016/j.ijpe.2012.06.022_bib10) 2003; 81 10.1016/j.ijpe.2012.06.022_bib32 Cavusoglu (10.1016/j.ijpe.2012.06.022_bib12) 2004; 1 Lai (10.1016/j.ijpe.2012.06.022_bib34) 2003; 17 Barabási (10.1016/j.ijpe.2012.06.022_bib7) 1999; 286 Griffin (10.1016/j.ijpe.2012.06.022_bib23) 2006; 36 Albert (10.1016/j.ijpe.2012.06.022_bib2) 2000; 406 Mirkovic (10.1016/j.ijpe.2012.06.022_bib36) 2004; 34 |
References_xml | – volume: 29 start-page: 251 year: 1999 end-page: 262 ident: bib20 article-title: On power–law relationships of the internet topology publication-title: ACM SIGCOMM Computer and Communications Review – volume: 81 start-page: 41 year: 2003 end-page: 49 ident: bib10 article-title: It doesn't matter publication-title: Harvard Business Review – reference: Cremonini, D., Nizovtsev, M., 2006. Understanding and influencing attackers’ decisions: implications for security investment strategies. In: Fifth Workshop on Economics of Information Security, Cambridge, England. – volume: 8 start-page: 338 year: 2006 end-page: 349 ident: bib25 article-title: Returns to information security investment: the effect of alternative information security breach functions on optima investment and sensitivity to vulnerability publication-title: Information Systems Frontier – volume: 56 start-page: 650 year: 2009 end-page: 662 ident: bib26 article-title: Preemptive learning, competency traps, and information technology adoption: a real options analysis publication-title: IEEE Transactions on Engineering Management – volume: 17 start-page: 4045 year: 2003 end-page: 4061 ident: bib34 article-title: Infection dynamics on growing networks publication-title: International Journal of Modern Physics B – reference: CERT, 2007. Overconfidence is Pervasive Amongst Security Professionals, E-Crime Watch Survey by CSO Magazine, CERT, and U.S. Secret Service. – volume: 36 start-page: 198 year: 2006 end-page: 202 ident: bib23 article-title: A note on the spread of worms in scale-free networks publication-title: IEEE Transactions on Systems, Man, Cybernetics B – reference: Richardson, R., 2009. 2008 CSI Computer Crime & Security Survey. Computer Security Institute. – volume: 406 start-page: 378 year: 2000 end-page: 382 ident: bib2 article-title: Error and attack tolerance of complex networks publication-title: Nature – volume: 4 start-page: 8 year: 2003 end-page: 11 ident: bib11 article-title: Determining Intent—Opportunistic vs. Targeted Attacks publication-title: Computer Fraud & Security – volume: 16 start-page: 28 year: 2005 end-page: 46 ident: bib14 article-title: The value of intrusion detection systems in information technology security architecture publication-title: Information Systems Research – reference: Ponemon Institute, 2009. 2008 Annual Study: Cost of Data Breach. PGP Corporation. – volume: 10 start-page: 14 year: 2008 end-page: 19 ident: bib28 article-title: Managing risk propagation in extended enterprise networks publication-title: IEEE IT Professional – volume: 4 year: 2006 ident: bib29 article-title: The State of information security spending publication-title: Forrester Research – year: 2009 ident: bib19 article-title: Hacking: The Next Generation – volume: 13 start-page: 1205 year: 2005 end-page: 1218 ident: bib3 article-title: Understanding Internet topology: principles, models, and validation publication-title: IEEE/ACM Transactions on Networking – volume: 314 start-page: 610 year: 2006 end-page: 613 ident: bib5 article-title: The economics of information security publication-title: Science – year: 2009 ident: bib40 article-title: What's really happening in IT security? publication-title: InterBusiness Issues – reference: Kumar, R., Raghavan, P., Rajagopalan, S., Sivakumar, D., Tomkins, A., Upfal, E., 2000. The web as a graph. In: Proceedings of 19th ACM Symposium of Principles of Database Systems, Dallas, Texas, 1–10. – volume: 25 start-page: 241 year: 2008 end-page: 279 ident: bib33 article-title: Understanding the value of countermeasure portfolios in information systems security publication-title: Journal of Management Information Systems – volume: 115 start-page: 104 year: 2008 end-page: 112 ident: bib21 article-title: Can business process reengineering lead to security vulnerability: analyzing the reengineered process publication-title: International Journal of Production Economics – volume: 96 start-page: 2087011 year: 2006 ident: bib24 article-title: Epidemic dynamics on an adaptive network publication-title: Physical Review Letters – volume: 1 start-page: 131 year: 2004 end-page: 148 ident: bib12 article-title: Configuration of intrusion detection systems: a comparison of decision and game theoretic approaches publication-title: INFORMS Journal of Decision Analysis – volume: 5 start-page: 438 year: 2002 end-page: 457 ident: bib22 article-title: The economics of information security investment publication-title: ACM Transactions on Information Systems Security – volume: 114 start-page: 793 year: 2008 end-page: 804 ident: bib27 article-title: An economic analysis of the optimal information security investment in the case of a risk-averse firm publication-title: International Journal of Production Economics – reference: Kaufman, R., Li, X., 2005. Technology competition and optimal investment timing: a real options perspective. IEEE Transaction on Engineering Management 52 (1), 15–29. – volume: 401 start-page: 130 year: 1999 end-page: 131 ident: bib1 article-title: Diameter of the world-wide web publication-title: Nature – volume: 24 start-page: 280 year: 2005 end-page: 286 ident: bib15 article-title: Infection dynamics on the internet publication-title: Computer Security – volume: 6 start-page: 35 year: 2004 end-page: 42 ident: bib6 article-title: Measuring the risk-based value of IT security solutions publication-title: IEEE IT Professional – reference: Collins, M., Gates, C., Kataria, G., 2006. A model for opportunistic network exploits: the case of P2P worms. In: Fifth Workshop on Economics of Information Security, Cambridge, England. – volume: 46 start-page: 15 year: 2003 end-page: 18 ident: bib35 article-title: Analyzing security costs publication-title: Communications of ACM – volume: 56 start-page: 171 year: 2009 end-page: 179 ident: bib31 article-title: Program risk contingency budget planning publication-title: IEEE Transactions on Engineering Management – volume: 47 start-page: 87 year: 2004 end-page: 92 ident: bib13 article-title: A model for evaluating IT security investments publication-title: Communications of ACM – volume: 286 start-page: 509 year: 1999 end-page: 512 ident: bib7 article-title: Emergence of scaling in random networks publication-title: Science – reference: Vijaya, Jaikumar, 2011. Epsilon a Victim of Spear-Phishing Attack, Says Report. Computer World, April 7. – volume: 34 start-page: 39 year: 2004 end-page: 53 ident: bib36 article-title: A taxonomy of DDoS attack and DDoS defense mechanism publication-title: ACM SIGCOMM Computer and Communications Review – reference: Ogut, H., Menon, N., Raghunathan, S., 2005. Cyber insurance and IT security investment: impact of interdependent risk. In: Fourth Workshop on Economics of Information Security, Cambridge, MA. – volume: 50 start-page: 205 year: 2006 end-page: 208 ident: bib45 article-title: Epidemics in small world networks publication-title: European Physics Journal B – volume: 393 start-page: 440 year: 1998 end-page: 442 ident: bib50 article-title: Collective dynamics of “small-world” publication-title: Networks, Nature – volume: 349–366 year: 2007 ident: bib8 article-title: Process-Centric Risk Management Framework for Information Security publication-title: National Security – year: 1999 ident: bib49 article-title: Small worlds: the dynamics of networks between order and randomness – reference: Verizon, 2011. Data Breach Investigations Report. – volume: 14 start-page: 1 year: 2004 end-page: 28 ident: bib4 article-title: A general, but readily adaptable model of information system risk publication-title: Communications of the AIS – year: 2005 ident: bib37 article-title: The Topology of Covert Conflict, Computer Laboratory Technical Report UCAM-CL-TR-637 – volume: 3 start-page: 40 year: 2005 end-page: 44 ident: bib43 article-title: Towards econometric models of the security risk from remote attacks publication-title: IEEE Security & Privacy – volume: 99 start-page: 2573 year: 2000 end-page: 2580 ident: bib48 article-title: Scaling phenomena in the internet: critically examining criticality publication-title: Proceedings of National Academy of Science – volume: 74 start-page: 0561091 year: 2006 ident: bib51 article-title: Behavior of susceptible-infected epidemics on scale-free networks with identical infectivity publication-title: Physical Reviews E – volume: 86 start-page: 3200 year: 2001 end-page: 3203 ident: bib39 article-title: Epidemic spreading in scale-free networks publication-title: Physical Review Letters – volume: 44 start-page: 131 year: 2001 end-page: 132 ident: bib9 article-title: Computer security: an end state? publication-title: Communications of ACM – year: 2009 ident: 10.1016/j.ijpe.2012.06.022_bib19 – year: 2009 ident: 10.1016/j.ijpe.2012.06.022_bib40 article-title: What's really happening in IT security? publication-title: InterBusiness Issues – volume: 25 start-page: 241 issue: 2 year: 2008 ident: 10.1016/j.ijpe.2012.06.022_bib33 article-title: Understanding the value of countermeasure portfolios in information systems security publication-title: Journal of Management Information Systems doi: 10.2753/MIS0742-1222250210 – ident: 10.1016/j.ijpe.2012.06.022_bib30 doi: 10.1109/TEM.2004.839962 – volume: 47 start-page: 87 issue: 7 year: 2004 ident: 10.1016/j.ijpe.2012.06.022_bib13 article-title: A model for evaluating IT security investments publication-title: Communications of ACM doi: 10.1145/1005817.1005828 – volume: 115 start-page: 104 issue: 1 year: 2008 ident: 10.1016/j.ijpe.2012.06.022_bib21 article-title: Can business process reengineering lead to security vulnerability: analyzing the reengineered process publication-title: International Journal of Production Economics doi: 10.1016/j.ijpe.2008.05.002 – volume: 14 start-page: 1 issue: 1 year: 2004 ident: 10.1016/j.ijpe.2012.06.022_bib4 article-title: A general, but readily adaptable model of information system risk publication-title: Communications of the AIS – volume: 314 start-page: 610 year: 2006 ident: 10.1016/j.ijpe.2012.06.022_bib5 article-title: The economics of information security publication-title: Science doi: 10.1126/science.1130992 – volume: 4 year: 2006 ident: 10.1016/j.ijpe.2012.06.022_bib29 article-title: The State of information security spending publication-title: Forrester Research – volume: 56 start-page: 171 issue: 1 year: 2009 ident: 10.1016/j.ijpe.2012.06.022_bib31 article-title: Program risk contingency budget planning publication-title: IEEE Transactions on Engineering Management doi: 10.1109/TEM.2008.927818 – ident: 10.1016/j.ijpe.2012.06.022_bib16 – volume: 56 start-page: 650 issue: 4 year: 2009 ident: 10.1016/j.ijpe.2012.06.022_bib26 article-title: Preemptive learning, competency traps, and information technology adoption: a real options analysis publication-title: IEEE Transactions on Engineering Management doi: 10.1109/TEM.2009.2016065 – volume: 17 start-page: 4045 issue: 22/23/24 year: 2003 ident: 10.1016/j.ijpe.2012.06.022_bib34 article-title: Infection dynamics on growing networks publication-title: International Journal of Modern Physics B doi: 10.1142/S0217979203022027 – volume: 34 start-page: 39 issue: 2 year: 2004 ident: 10.1016/j.ijpe.2012.06.022_bib36 article-title: A taxonomy of DDoS attack and DDoS defense mechanism publication-title: ACM SIGCOMM Computer and Communications Review doi: 10.1145/997150.997156 – year: 2005 ident: 10.1016/j.ijpe.2012.06.022_bib37 – volume: 29 start-page: 251 issue: 4 year: 1999 ident: 10.1016/j.ijpe.2012.06.022_bib20 article-title: On power–law relationships of the internet topology publication-title: ACM SIGCOMM Computer and Communications Review doi: 10.1145/316194.316229 – volume: 1 start-page: 131 issue: 3 year: 2004 ident: 10.1016/j.ijpe.2012.06.022_bib12 article-title: Configuration of intrusion detection systems: a comparison of decision and game theoretic approaches publication-title: INFORMS Journal of Decision Analysis doi: 10.1287/deca.1040.0022 – volume: 286 start-page: 509 year: 1999 ident: 10.1016/j.ijpe.2012.06.022_bib7 article-title: Emergence of scaling in random networks publication-title: Science doi: 10.1126/science.286.5439.509 – volume: 114 start-page: 793 issue: 2 year: 2008 ident: 10.1016/j.ijpe.2012.06.022_bib27 article-title: An economic analysis of the optimal information security investment in the case of a risk-averse firm publication-title: International Journal of Production Economics doi: 10.1016/j.ijpe.2008.04.002 – ident: 10.1016/j.ijpe.2012.06.022_bib47 – volume: 86 start-page: 3200 issue: 14 year: 2001 ident: 10.1016/j.ijpe.2012.06.022_bib39 article-title: Epidemic spreading in scale-free networks publication-title: Physical Review Letters doi: 10.1103/PhysRevLett.86.3200 – volume: 96 start-page: 2087011 issue: 20 year: 2006 ident: 10.1016/j.ijpe.2012.06.022_bib24 article-title: Epidemic dynamics on an adaptive network publication-title: Physical Review Letters doi: 10.1103/PhysRevLett.96.208701 – volume: 13 start-page: 1205 issue: 6 year: 2005 ident: 10.1016/j.ijpe.2012.06.022_bib3 article-title: Understanding Internet topology: principles, models, and validation publication-title: IEEE/ACM Transactions on Networking doi: 10.1109/TNET.2005.861250 – volume: 81 start-page: 41 issue: 5 year: 2003 ident: 10.1016/j.ijpe.2012.06.022_bib10 article-title: It doesn't matter publication-title: Harvard Business Review – volume: 50 start-page: 205 year: 2006 ident: 10.1016/j.ijpe.2012.06.022_bib45 article-title: Epidemics in small world networks publication-title: European Physics Journal B doi: 10.1140/epjb/e2006-00099-7 – ident: 10.1016/j.ijpe.2012.06.022_bib32 doi: 10.1145/335168.335170 – volume: 99 start-page: 2573 issue: 1 year: 2000 ident: 10.1016/j.ijpe.2012.06.022_bib48 article-title: Scaling phenomena in the internet: critically examining criticality publication-title: Proceedings of National Academy of Science doi: 10.1073/pnas.012583099 – volume: 8 start-page: 338 year: 2006 ident: 10.1016/j.ijpe.2012.06.022_bib25 article-title: Returns to information security investment: the effect of alternative information security breach functions on optima investment and sensitivity to vulnerability publication-title: Information Systems Frontier doi: 10.1007/s10796-006-9011-6 – volume: 6 start-page: 35 issue: 6 year: 2004 ident: 10.1016/j.ijpe.2012.06.022_bib6 article-title: Measuring the risk-based value of IT security solutions publication-title: IEEE IT Professional doi: 10.1109/MITP.2004.89 – year: 1999 ident: 10.1016/j.ijpe.2012.06.022_bib49 – volume: 5 start-page: 438 issue: 4 year: 2002 ident: 10.1016/j.ijpe.2012.06.022_bib22 article-title: The economics of information security investment publication-title: ACM Transactions on Information Systems Security doi: 10.1145/581271.581274 – volume: 401 start-page: 130 year: 1999 ident: 10.1016/j.ijpe.2012.06.022_bib1 article-title: Diameter of the world-wide web publication-title: Nature doi: 10.1038/43601 – ident: 10.1016/j.ijpe.2012.06.022_bib42 – volume: 24 start-page: 280 year: 2005 ident: 10.1016/j.ijpe.2012.06.022_bib15 article-title: Infection dynamics on the internet publication-title: Computer Security doi: 10.1016/j.cose.2005.03.004 – volume: 406 start-page: 378 year: 2000 ident: 10.1016/j.ijpe.2012.06.022_bib2 article-title: Error and attack tolerance of complex networks publication-title: Nature doi: 10.1038/35019019 – volume: 16 start-page: 28 issue: 1 year: 2005 ident: 10.1016/j.ijpe.2012.06.022_bib14 article-title: The value of intrusion detection systems in information technology security architecture publication-title: Information Systems Research doi: 10.1287/isre.1050.0041 – ident: 10.1016/j.ijpe.2012.06.022_bib18 – ident: 10.1016/j.ijpe.2012.06.022_bib46 – volume: 44 start-page: 131 issue: 3 year: 2001 ident: 10.1016/j.ijpe.2012.06.022_bib9 article-title: Computer security: an end state? publication-title: Communications of ACM doi: 10.1145/365181.365241 – volume: 74 start-page: 0561091 issue: 5 year: 2006 ident: 10.1016/j.ijpe.2012.06.022_bib51 article-title: Behavior of susceptible-infected epidemics on scale-free networks with identical infectivity publication-title: Physical Reviews E doi: 10.1103/PhysRevE.74.056109 – volume: 349–366 year: 2007 ident: 10.1016/j.ijpe.2012.06.022_bib8 article-title: Process-Centric Risk Management Framework for Information Security – volume: 4 start-page: 8 year: 2003 ident: 10.1016/j.ijpe.2012.06.022_bib11 article-title: Determining Intent—Opportunistic vs. Targeted Attacks publication-title: Computer Fraud & Security doi: 10.1016/S1361-3723(03)04010-7 – volume: 36 start-page: 198 issue: 1 year: 2006 ident: 10.1016/j.ijpe.2012.06.022_bib23 article-title: A note on the spread of worms in scale-free networks publication-title: IEEE Transactions on Systems, Man, Cybernetics B doi: 10.1109/TSMCB.2005.854498 – volume: 393 start-page: 440 year: 1998 ident: 10.1016/j.ijpe.2012.06.022_bib50 article-title: Collective dynamics of “small-world” publication-title: Networks, Nature doi: 10.1038/30918 – ident: 10.1016/j.ijpe.2012.06.022_bib17 – ident: 10.1016/j.ijpe.2012.06.022_bib41 – volume: 10 start-page: 14 issue: 4 year: 2008 ident: 10.1016/j.ijpe.2012.06.022_bib28 article-title: Managing risk propagation in extended enterprise networks publication-title: IEEE IT Professional doi: 10.1109/MITP.2008.90 – ident: 10.1016/j.ijpe.2012.06.022_bib38 – volume: 46 start-page: 15 issue: 6 year: 2003 ident: 10.1016/j.ijpe.2012.06.022_bib35 article-title: Analyzing security costs publication-title: Communications of ACM doi: 10.1145/777313.777327 – volume: 3 start-page: 40 issue: 1 year: 2005 ident: 10.1016/j.ijpe.2012.06.022_bib43 article-title: Towards econometric models of the security risk from remote attacks publication-title: IEEE Security & Privacy doi: 10.1109/MSP.2005.30 |
SSID | ssj0007188 |
Score | 2.3203545 |
Snippet | In this study we develop an analytic model for information security investment allocation of a fixed budget. Our model considers concurrent heterogeneous... |
SourceID | proquest econis crossref elsevier |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 255 |
SubjectTerms | Budget allocation Budgeting Computer information security Cost benefit analysis Data integrity Economics Financing Information security Investment Investment analysis Investments Mathematical analysis Mathematical models Network security Networks Numerical analysis Operations research Resource allocation Scale-free network Studies |
Title | Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints |
URI | https://dx.doi.org/10.1016/j.ijpe.2012.06.022 http://www.econis.eu/PPNSET?PPN=734426631 https://www.proquest.com/docview/1197624052 https://www.proquest.com/docview/1671270666 |
Volume | 141 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED9tHULwgGAwrTAqI-0NZU3sxnEep4qpGzBNG5P2ZvkrWyfUViR95W_nLnEqysMeeIucc2L5d747n-_OAMemcj43pU28I2-VVzIpZUiTEFB9lJarzFGi8PdLObudXNzldzsw7XNhKKwyyv5OprfSOraM42yOV_P5-CYteVs-LKM4A5S5u7DHRSnzAeydnn-dXW4EMorfViAjfUIdYu5MF-Y1f1xRtUxyCcqTlPMt_fSMNqXzektR_SOyWz109hpeRQOSnXZjfAM7YbEPz_v49X14-VeFwbfQ9InHNVtWLFZJJSxYHS-uw0aqtEFOQnxkaA8yh5qNyLGr68o3sQeKmlkis4XlumamaSg1n5ETl9m1vw8NEdftfRNN_Q5uz778mM6SeNFCggDxJpEqiFAUElezdyJXXgaVomHoPS-UnQRpyoobL5XJA6p8kSorPO57rKg856URBzBYLBfhEBjPqooHZUNuAqo6Y7NKSJdWqVdWlW4yhKyfXu1iFXIa3E_dh5s9aoJEEySaYu44H8LnTZ9VV4PjSerDDrUNbSEmZIeIbAh5j6PeYjKN-uPJTx71oOu4xGtN568SGTrH1582r3Fx0omLaeHQmSzoZB-n6v1__voDvODtBRzk9DmCQfNrHT6iGdTYEeye_M5GyOzT629Xo8j0fwDxyAoc |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB5RqEp7QC0tYltoXam3KmxiJ45zrFDR0gKXgsTN8it0EdpdkeyV385M4my7PXDoLXLGieUZz4zH34wBvpja-cJUNvGOolVeyaSSIU1CQPNRWa4yR4nC5xdycpX_uC6uN-B4yIUhWGXU_b1O77R1bBnH2RwvptPxr7TiXfmwjHAGqHOfwVZeiJJwfUcPf3AeqHw7dYzUCZHHzJke5DW9XVCtTAoIyqOU8zXr9Jy2pNNmzUz9o7A7K3TyGnai-8i-9SN8AxthtgsvBvT6Lrz6q77gW2iHtOOGzWsWa6QSJ1gTr63DRqqzQSFCfGToDTKHdo3Isavrizex34SZmaOohfmyYaZtKTGfUQiX2aW_CS0RN91tE23zDq5Ovl8eT5J4zUKC7OFtIlUQoSwlrmXvRKG8DCpFt9B7XiqbB2mqmhsvlSkCGnyRKis87nqsqD3nlRF7sDmbz8I-MJ7VNQ_KhsIENHTGZrWQLq1Tr6yqXD6CbJhe7WINchrcnR7AZreaWKKJJZoQd5yP4Ouqz6KvwPEk9X7PtRVtKXLyQkQ2gmLgo14TMY3W48lPHgxM13GBN5pOXyWKc4GvP69e49Kk8xbTsUNnsqRzfZyq9__560-wPbk8P9Nnpxc_P8BL3l3FQeGfA9hs75fhEB2i1n7sBP4R6SMJUg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Economics+of+information+security+investment+in+the+case+of+concurrent+heterogeneous+attacks+with+budget+constraints&rft.jtitle=International+journal+of+production+economics&rft.au=Huang%2C+C.+Derrick&rft.au=Behara%2C+Ravi+S.&rft.date=2013-01-01&rft.pub=Elsevier+B.V&rft.issn=0925-5273&rft.eissn=1873-7579&rft.volume=141&rft.issue=1&rft.spage=255&rft.epage=268&rft_id=info:doi/10.1016%2Fj.ijpe.2012.06.022&rft.externalDocID=S0925527312002678 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0925-5273&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0925-5273&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0925-5273&client=summon |