Contagion in cyber security attacks
Abstract Systems security is essential for the efficient operation of all organizations. Indeed,
most large firms employ a designated 'Chief Information Security Officer'to coordinate the …
most large firms employ a designated 'Chief Information Security Officer'to coordinate the …
Economics of cybersecurity
The Internet has enabled tremendous economic and social innovation yet the underlying
systems, networks and services sometimes fail miserably to protect the security of …
systems, networks and services sometimes fail miserably to protect the security of …
Siber güvenlik yatırım kararları üzerine literatür incelemesi
Karmaşıklığı ve sıklığı her geçen gün artan siber saldırıların yol açtığı yüksek ekonomik
zararlar ile bu saldırılara karşı koruma sağlayan çok sayıda siber güvenlik teknolojisi …
zararlar ile bu saldırılara karşı koruma sağlayan çok sayıda siber güvenlik teknolojisi …
Develo** a conceptual framework for cloud security assurance
B Duncan, DJ Pym, M Whittington - 2013 IEEE 5th International …, 2013 - ieeexplore.ieee.org
Managing information security in the cloud is a challenge. Traditional checklist approaches
to standards compliance may well provide compliance, but do not guarantee to provide …
to standards compliance may well provide compliance, but do not guarantee to provide …
A utilitarian re-examination of enterprise-scale information security management
A Stewart - Information & Computer Security, 2018 - emerald.com
Purpose An action is utilitarian when it is both useful and practical. This paper aims to
examine a number of traditional information security management practices to ascertain …
examine a number of traditional information security management practices to ascertain …
Engineering ecosystem models: Semantics and pragmatics
In a world of ever-increasing complexity, the smooth functioning of society is critically
dependent on our ability to understand and manage both individual systems and complex …
dependent on our ability to understand and manage both individual systems and complex …
Enterprise information risk management: Dealing with cloud computing
A Baldwin, D Pym, S Shiu - Privacy and security for cloud computing, 2013 - Springer
Managing information risk is a complex task that must continually adapt to business and
technology changes. We argue that cloud computing presents a more significant step …
technology changes. We argue that cloud computing presents a more significant step …
[PDF][PDF] Sustainability in information stewardship: Time preferences, externalities, and social co-ordination
Despite the ubiquity of the concept of stewardship in environmental economics and
accounting there is no field a-specific, generally accepted definition. We define the …
accounting there is no field a-specific, generally accepted definition. We define the …
Opportunity cost of action bias in cybersecurity incident response
The hours and days immediately following the discovery of a cyber intrusion can be stressful
and chaotic for victims. Without a documented and well-rehearsed incident response plan …
and chaotic for victims. Without a documented and well-rehearsed incident response plan …
Understanding cloud audits
Audits of IT infrastructures can mitigate security problems and establish trust in a provider's
infrastructure and processes. Cloud environments especially lack trust due to non …
infrastructure and processes. Cloud environments especially lack trust due to non …