Usability and privacy: a study of Kazaa P2P file-sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A study of malware in peer-to-peer networks
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Malware prevalence in the KaZaA file-sharing network
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Embedding Information Security into the Organization
IEEE Security and Privacy
Journal of Management Information Systems
Why file sharing networks are dangerous?
Communications of the ACM - Inspiring Women in Computing
Intrusion Prevention in Information Systems: Reactive and Proactive Responses
Journal of Management Information Systems
Why file sharing networks are dangerous?
Communications of the ACM - Inspiring Women in Computing
Special Section: Competitive Strategy, Economics, and Information Systems
Journal of Management Information Systems
Should We Go Our Own Way? Backsourcing Flexibility in IT Services Contracts
Journal of Management Information Systems
Safe Contexts for Interorganizational Collaborations Among Homeland Security Professionals
Journal of Management Information Systems
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Journal of Management Information Systems
Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis
Journal of Management Information Systems
Hi-index | 0.00 |
Firms face many different types of information security risk. Inadvertent disclosure of sensitive business information represents one of the largest classes of recent security breaches. We examine a specific instance of this problem-inadvertent disclosures through peer-to-peer file-sharing networks. We characterize the extent of the security risk for a group of large financial institutions using a direct analysis of leaked documents. We also characterize the threat of loss by examining search patterns in peer-to-peer networks. Our analysis demonstrates both a substantial threat and vulnerability for large financial firms. We find a statistically significant link between leakage and leak sources including the firm employment base and the number of retail accounts. We also find a link between firm visibility and threat activity. Finally, we find that firms with more leaks also experience increased threat.