Optimal Information Security Investment in Modern Social Networking

被引:2
|
作者
Trufanov, Andrey [1 ]
Kinash, Nikolay [1 ]
Tikhomirov, Alexei [2 ]
Berestneva, Olga [3 ]
Rossodivita, Alessandra [4 ]
机构
[1] Irkutsk Natl Res Tech Univ, Irkutsk, Russia
[2] Inha Univ, Incheon, South Korea
[3] Natl Res Tomsk Polytech Univ, Tomsk, Russia
[4] Luigi Sacco Acad Hosp, Milan, Italy
来源
关键词
D O I
10.1007/978-3-319-54241-6_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
For further clarification of methodological issues of the social network's information security we stratified the systems that support human relations into three components of different nature: computer, communication and social ones. A security model for a network component is developed using consideration of security for individual nodes. Modeling of attacks on networks in whole is analyzed taking into account specification of network security level. The results for real computer, communication and social entities supported that for a network attacked intentionally it is better off allocating the investment proportionally to degree centralities of the nodes rather than uniformely. The analysis further hints that to make investment justifiable to protect a network, its proprietor should spend lesser than to reach approximately 0.4 of network security level.
引用
收藏
页码:175 / 182
页数:8
相关论文
共 50 条
  • [1] Optimal Information Security Investment with Penetration Testing
    Boehme, Rainer
    Felegyhazi, Mark
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 21 - 37
  • [2] Towards an optimal information security investment strategy
    Wang, Zikai
    Song, Haitao
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 756 - 761
  • [3] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Kjell Hausken
    [J]. Information Systems Frontiers, 2006, 8 : 338 - 349
  • [4] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Hausken, Kjell
    [J]. INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) : 338 - 349
  • [5] Optimal information security investment in a Healthcare Information Exchange: An economic analysis
    Huang, C. Derrick
    Behara, Ravi S.
    Goo, Jahyun
    [J]. DECISION SUPPORT SYSTEMS, 2014, 61 : 1 - 11
  • [6] Optimal Timing of Information Security Investment: A Real Options Approach
    Tatsumi, Ken-ichi
    Goto, Makoto
    [J]. ECONOMICS OF INFORMATION SECURITY AND PRIVACY, 2010, : 211 - +
  • [7] Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information
    Hajli, Nick
    Lin, Xiaolin
    [J]. JOURNAL OF BUSINESS ETHICS, 2016, 133 (01) : 111 - 123
  • [8] Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information
    Nick Hajli
    Xiaolin Lin
    [J]. Journal of Business Ethics, 2016, 133 : 111 - 123
  • [9] Security Issues in Social Networking
    Kumar, Damera Vijay
    Varma, P. S. S.
    Pabboju, Shyam Sunder
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (06): : 120 - 124
  • [10] Optimal Information Security Investment Analyses with the Consideration of the Benefits of Investment and Using Evolutionary Game Theory
    Wang, Qin
    Zhu, Jianming
    [J]. PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2016), 2016,