Contagion in cyber security attacks

A Baldwin, I Gheyas, C Ioannidis, D Pym… - Journal of the …, 2017 - Taylor & Francis
Abstract Systems security is essential for the efficient operation of all organizations. Indeed,
most large firms employ a designated 'Chief Information Security Officer'to coordinate the …

Economics of cybersecurity

H Asghari, M van Eeten, JM Bauer - Handbook on the Economics of …, 2016 - elgaronline.com
The Internet has enabled tremendous economic and social innovation yet the underlying
systems, networks and services sometimes fail miserably to protect the security of …

Siber güvenlik yatırım kararları üzerine literatür incelemesi

H Şentürk, CZ Çil, Ş Sağıroğlu - Politeknik Dergisi, 2016 - dergipark.org.tr
Karmaşıklığı ve sıklığı her geçen gün artan siber saldırıların yol açtığı yüksek ekonomik
zararlar ile bu saldırılara karşı koruma sağlayan çok sayıda siber güvenlik teknolojisi …

Develo** a conceptual framework for cloud security assurance

B Duncan, DJ Pym, M Whittington - 2013 IEEE 5th International …, 2013 - ieeexplore.ieee.org
Managing information security in the cloud is a challenge. Traditional checklist approaches
to standards compliance may well provide compliance, but do not guarantee to provide …

A utilitarian re-examination of enterprise-scale information security management

A Stewart - Information & Computer Security, 2018 - emerald.com
Purpose An action is utilitarian when it is both useful and practical. This paper aims to
examine a number of traditional information security management practices to ascertain …

Engineering ecosystem models: Semantics and pragmatics

T Caulfield, MC Ilau, D Pym - International Conference on Simulation …, 2021 - Springer
In a world of ever-increasing complexity, the smooth functioning of society is critically
dependent on our ability to understand and manage both individual systems and complex …

Enterprise information risk management: Dealing with cloud computing

A Baldwin, D Pym, S Shiu - Privacy and security for cloud computing, 2013 - Springer
Managing information risk is a complex task that must continually adapt to business and
technology changes. We argue that cloud computing presents a more significant step …

[PDF][PDF] Sustainability in information stewardship: Time preferences, externalities, and social co-ordination

C Ioannidis, D Pym, J Williams - RN, 2014 - Citeseer
Despite the ubiquity of the concept of stewardship in environmental economics and
accounting there is no field a-specific, generally accepted definition. We define the …

Opportunity cost of action bias in cybersecurity incident response

J Dykstra, K Shortridge, J Met… - Proceedings of the …, 2022 - journals.sagepub.com
The hours and days immediately following the discovery of a cyber intrusion can be stressful
and chaotic for victims. Without a documented and well-rehearsed incident response plan …

Understanding cloud audits

F Doelitzscher, C Reich, M Knahl, N Clarke - Privacy and security for cloud …, 2013 - Springer
Audits of IT infrastructures can mitigate security problems and establish trust in a provider's
infrastructure and processes. Cloud environments especially lack trust due to non …