Cybersecurity For Defense Economists

被引:5
|
作者
Arce, Daniel [1 ]
机构
[1] Univ Texas Dallas, Econ, 800 W Campbell Rd, Richardson, TX 75080 USA
关键词
Cybersecurity; defense economics; disinformation; price of anarachy; cryptography; INFORMATION SECURITY; GAME-THEORY; COMPETITION; TERRORISTS;
D O I
10.1080/10242694.2022.2138122
中图分类号
F [经济];
学科分类号
02 ;
摘要
Cybersecurity plays a role in national security. This study introduces cybersecurity concepts in ways familiar to defense economists and identifies parallel methods of analysis in the fields. The theoretical tools of both fields include microeconomics and game theory. These tools enable analyses of phenomena present in both milieus: public goods, externalities, commons, incentives, interdependent security, platform economics, and inefficiency of decentralized decision making. Additional topics include cyber war, cyberterrorism, deterrence and disinformation in cyberspace, price of anarchy, and economics of cryptography.
引用
收藏
页码:705 / 725
页数:21
相关论文
共 50 条
  • [31] How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?
    He, Daojing
    Chan, Sammy
    Zhang, Yan
    Wu, Chunming
    Wang, Bing
    IEEE INTELLIGENT SYSTEMS, 2014, 29 (05) : 14 - 21
  • [32] Moving Target Defense against Advanced Persistent Threats for Cybersecurity Enhancement
    Khosravi-Farmad, Masoud
    Ramaki, Ali Ahmadian
    Bafghi, Abbas Ghaemi
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2018, : 280 - 285
  • [33] ALTERNATIVES FOR DEFENSE IN THE POST-SOVIET WORLD - A GUIDE FOR ECONOMISTS TO THE US DEBATE
    FRANCK, RE
    HILDEBRANDT, GG
    DEFENCE AND PEACE ECONOMICS, 1994, 5 (01): : 37 - 50
  • [34] Vulnerability Assessment and Defense Technology for Smart Home Cybersecurity Considering Pricing Cyberattacks
    Liu, Yang
    Hu, Shiyan
    Ho, Tsung-Yi
    2014 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2014, : 183 - 190
  • [35] How the three lines of defense can contribute to public firms' cybersecurity effectiveness
    Heroux, Sylvie
    Fortin, Anne
    INTERNATIONAL JOURNAL OF DISCLOSURE AND GOVERNANCE, 2024,
  • [36] Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
    Sun, Nan
    Ding, Ming
    Jiang, Jiaojiao
    Xu, Weikang
    Mo, Xiaoxing
    Tai, Yonghang
    Zhang, Jun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (03): : 1748 - 1774
  • [37] PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises
    Karagiannis, Stylianos
    Ntantogian, Christoforos
    Magkos, Emmanouil
    Ribeiro, Luis L.
    Campos, Luis
    INFORMATION, 2021, 12 (08)
  • [38] Defense against the dark arts (of Cyberspace) universities are offering graduate degrees in cybersecurity
    Patel, P., 1600, Institute of Electrical and Electronics Engineers Inc., United States (51):
  • [39] Interactive Cybersecurity Defense Training Inspired by Web-based Learning Theory
    Tang, Dat
    Pham, Cuong
    Chinen, Ken-ichi
    Beuran, Razvan
    PROCEEDINGS OF THE 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION (IEEE ICEED 2017), 2017, : 90 - 95
  • [40] Cybersecurity of Autonomous Vehicles: A Systematic Literature Review of Adversarial Attacks and Defense Models
    Girdhar, Mansi
    Hong, Junho
    Moore, John
    IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, 2023, 4 : 417 - 437