Economic perspective of information security

被引:0
|
作者
Zhu, G [1 ]
Dai, J [1 ]
机构
[1] Cent Michigan Univ, Dept Comp Sci, Mt Pleasant, MI 48859 USA
关键词
information security Model(ISM); game theory; dominant strategy; Nash equilibrium; Bayesian equilibrium;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are a lot of interesting questions in information security. Do we spend enough or too much on information security? How much do we spend towards the security system? Are the products effective to defend all the possible attacks? Do they meet the special interests of the company? What is the most applicable security combination system to the specific industry? To answer these questions, we no longer regard information security as a pure issue of IT industry We may use economic theories to solve these issues respectively. The strategic and tactical decisions that face information securities are essentially economic in nature. In this paper, Nash Equilibrium [8], one of the most important theories in modern economics, along with Bayesian Equilibrium [6] will be applied to our model of economic perspective of information security. It will mainly focus on how to find the most cost-effective information security products (either one product or combination of them).
引用
收藏
页码:527 / 533
页数:7
相关论文
共 50 条
  • [1] Target Information Trading - An Economic Perspective of Security
    Hou, Jing
    Sun, Li
    Shu, Tao
    Li, Husheng
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 126 - 145
  • [2] Why information security is hard - An economic perspective
    Anderson, R
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 358 - 365
  • [3] Economic Security Perspective
    Shigeru, Kitamura
    [J]. ASIA-PACIFIC REVIEW, 2022, 29 (03) : 56 - 77
  • [4] An Economic Perspective on Water Security
    Garrick, Dustin E.
    Hahn, Robert W.
    [J]. REVIEW OF ENVIRONMENTAL ECONOMICS AND POLICY, 2021, 15 (01) : 45 - 66
  • [5] The economic approach of information security
    Tsiakis, T
    Stephanides, G
    [J]. COMPUTERS & SECURITY, 2005, 24 (02) : 105 - 108
  • [6] INFORMATION RISKS AND ECONOMIC SECURITY
    Okhrimenko, S. A.
    Solonenko, O.
    [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2010, 1 (08): : 200 - 204
  • [7] Selection of information security systems to ensure economic security
    Voronin, E. A.
    Yushin, I. V.
    [J]. DILEMAS CONTEMPORANEOS-EDUCACION POLITICA Y VALORES, 2019, 6
  • [8] Information Security in Enterprises - Ontology Perspective
    Schiavone, Stephen
    Garg, Lalit
    Summers, Kelly
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON IS MANAGEMENT AND EVALUATION (ECIME 2013), 2013, : 164 - 173
  • [9] Information security culture: A management perspective
    Van Niekerk, J. F.
    Von Solms, R.
    [J]. COMPUTERS & SECURITY, 2010, 29 (04) : 476 - 486
  • [10] Information Security: End Users' Perspective
    Xu, Hongjiang
    [J]. INNOVATION AND KNOWLEDGE MANAGEMENT IN TWIN TRACK ECONOMIES: CHALLENGES & SOLUTIONS, VOLS 1-3, 2009, : 568 - 569