Systematically Understanding Cybersecurity Economics: A Survey

被引:16
|
作者
Kianpour, Mazaher [1 ]
Kowalski, Stewart J. [1 ]
Overby, Harald [1 ]
机构
[1] NTNU Norwegian Univ Sci & Technol, Fac Informat Technol & Elect Engn, Dept Informat Secur & Commun Technol, N-2815 Gjovik, Norway
关键词
cybersecurity economics; economics of information security; complex systems; socio-technical systems; meta-narrative literature review; sustainable digital ecosystems; INFORMATION SECURITY INVESTMENT; CYBER-SECURITY; QUANTITATIVE MODEL; GAMES; PSYCHOLOGY; FRAMEWORK; SCIENCE; SYSTEMS; DESIGN; IMPACT;
D O I
10.3390/su132413677
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Insights in the field of cybersecurity economics empower decision makers to make informed decisions that improve their evaluation and management of situations that may lead to catastrophic consequences and threaten the sustainability of digital ecosystems. By drawing on these insights, cybersecurity practitioners have been able to respond to many complex problems that have emerged within the context of cybersecurity over the last two decades. The academic field of cybersecurity economics is highly interdisciplinary since it combines core findings and tools from disciplines such as sociology, psychology, law, political science, and computer science. This study aims to develop an extensive and consistent survey based on a literature review and publicly available reports. This review contributes by aggregating the available knowledge from 28 studies, out of a collection of 628 scholarly articles, to answer five specific research questions. The focus is how identified topics have been conceptualized and studied variously. This review shows that most of the cybersecurity economics models are transitioning from unrealistic, unverifiable, or highly simplified fundamental premises toward dynamic, stochastic, and generalizable models.
引用
收藏
页数:28
相关论文
共 50 条
  • [21] A Survey of Cybersecurity of Digital Manufacturing
    Mahesh, Priyanka
    Tiwari, Akash
    Jin, Chenglu
    Kumar, Panganamala R.
    Reddy, A. L. Narasimha
    Bukkapatanam, Satish T. S.
    Gupta, Nikhil
    Karri, Ramesh
    PROCEEDINGS OF THE IEEE, 2021, 109 (04) : 495 - 516
  • [22] Graph Mining for Cybersecurity: A Survey
    Yan, Bo
    Yang, Cheng
    Shi, Chuan
    Fang, Yong
    Li, Qi
    Ye, Yanfang
    Du, Junping
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2024, 18 (02)
  • [23] The theories and methods for systematically understanding land resource
    Fu, Bojie
    Liu, Yanxu
    CHINESE SCIENCE BULLETIN-CHINESE, 2019, 64 (21): : 2172 - 2179
  • [24] Systematically understanding the immunity leading to CRPC progression
    Ji, Zhiwei
    Zhao, Weiling
    Lin, Hui-Kuan
    Zhou, Xiaobo
    PLOS COMPUTATIONAL BIOLOGY, 2019, 15 (09)
  • [25] Understanding Economics
    Sears, William P.
    EDUCATION, 1951, 72 (02): : 130 - 130
  • [26] Understanding the Process of Data Labeling in Cybersecurity
    Braun, Tobias
    Pekaric, Irdin
    Apruzzese, Giovanni
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1596 - 1605
  • [27] Towards Understanding the Skill Gap in Cybersecurity
    Goupil, Francois
    Laskov, Pavel
    Pekaric, Irdin
    Felderer, Michael
    Duerr, Alexander
    Thiesse, Frederic
    PROCEEDINGS OF THE 27TH ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, ITICSE 2022, VOL 1, 2022, : 477 - 483
  • [28] Understanding Cybersecurity Education Gaps in Europe
    Ricci, Sara
    Parker, Simon
    Jerabek, Jan
    Danidou, Yianna
    Chatzopoulou, Argyro
    Badonnel, Remi
    Lendak, Imre
    Janout, Vladimir
    IEEE TRANSACTIONS ON EDUCATION, 2024, 67 (02) : 190 - 201
  • [29] Understanding Cybersecurity Practices in Emergency Departments
    Stobert, Elizabeth
    Barrera, David
    Homier, Valerie
    Kollek, Daniel
    PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20), 2020,
  • [30] Designing Cybersecurity into Defense Systems: An Information Economics Approach
    Dacus, Chad
    Yannakogeorgos, Panayotis A.
    IEEE SECURITY & PRIVACY, 2016, 14 (03) : 44 - 51