Cryptanalysis and protocol failures
Communications of the ACM
A taxonomy for key escrow encryption systems
Communications of the ACM
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
Assessing the Risk in E-commerce
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Journal of Computer Security - IFIP 2000
Black Ice: The Invisible Threat of Cyber-Terrorism
Black Ice: The Invisible Threat of Cyber-Terrorism
Understanding Terror Networks
Evaluating information security investments using the analytic hierarchy process
Communications of the ACM - Medical image modeling
Punishment and ethics deterrents: A study of insider security contravention
Journal of the American Society for Information Science and Technology
International Journal of Electronic Commerce
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment
Journal of Management Information Systems
Research Note---A Value-at-Risk Approach to Information Security Investment
Information Systems Research
Encyclopedia of Information Ethics and Security
Encyclopedia of Information Ethics and Security
Report: Politicians speak out on cyberterrorism
Network Security
An economic modelling approach to information security risk management
International Journal of Information Management: The Journal for Information Professionals
How Can We Deter Cyber Terrorism?
Information Security Journal: A Global Perspective
Hi-index | 0.00 |
What is the economic impact of cyber terrorism? Can organizations achieve strategic advantage in the cyber terrorism game? A general game theoretical model is proposed to study the optimal information systems (ISs) security investment and then applied to compare the losses caused by cyber terrorists and common hackers. Literature is reviewed on IS security, game theoretical models of IS security, cyber terrorism, cyber deterrence and IS security breach function. Simulations with varying levels of attacker's preference, breach function sensitivity and deterrence level are carried out to determine sensitivity to the optimal IS security investment. Results suggest that organizations should invest more to protect their strategic information systems against cyber terrorists who have long-term goals.