Economics of Identity and Access Management: Providing decision support for investments

I Azhar - Ishaq Azhar Mohammed.(2014). Economics of Identity …, 2014 - papers.ssrn.com
The main purpose of this paper is to explore how Identity and Access Management is an
important asset in economics especially in decision making to support investments. Identity …

Contagion in cyber security attacks

A Baldwin, I Gheyas, C Ioannidis, D Pym… - Journal of the …, 2017 - Taylor & Francis
Abstract Systems security is essential for the efficient operation of all organizations. Indeed,
most large firms employ a designated 'Chief Information Security Officer'to coordinate the …

Information security trade-offs and optimal patching policies

C Ioannidis, D Pym, J Williams - European Journal of Operational Research, 2012 - Elsevier
We develop and simulate a basic mathematical model of the costly deployment of software
patches in the presence of trade-offs between confidentiality and availability. The model …

Gaining an edge in cyberspace with advanced situational awareness

V Lenders, A Tanner, A Blarer - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Organizations that rely on cyberspace as a mission-critical asset require advanced
situational awareness to maintain a tactical advantage over emerging threats. A new cyber …

Decision support for systems security investment

Y Beresnevichiene, D Pym… - 2010 IEEE/IFIP Network …, 2010 - ieeexplore.ieee.org
Information security managers with fixed budgets must invest in security measures to
mitigate increasingly severe threats whilst maintaining the alignment of their systems with …

Fixed costs, investment rigidities, and risk aversion in information security: A utility-theoretic approach

C Ioannidis, D Pym, J Williams - … of Information Security and Privacy III, 2013 - Springer
This paper addresses the question of determining the optimal timing of interventions in
information security management. Using utility theory, we derive the limiting condition under …

Security as a theoretical attribute construct

JL Bayuk - Computers & Security, 2013 - Elsevier
This paper provides an overview of the field of security metrics and discusses results of a
survey of security experts on the topic. It describes a new framework for develo** security …

Economic methods and decision making by security professionals

A Baldwin, Y Beres, GB Duggan, MC Mont… - … of information security …, 2013 - Springer
Increasing reliance on IT and the worsening threat environment mean that organisations are
under pressure to invest more in information security. A challenge is that the choices are …

Migration to cloud as real option: Investment decision under uncertainty

CY Yam, A Baldwin, S Shiu… - … Conference on Trust …, 2011 - ieeexplore.ieee.org
If cloud is so good then why aren't companies using it more? In this paper we look at how
companies should make a decision to move some IT services or their IT infrastructure into …

Games of timing for security in dynamic environments

B Johnson, A Laszka, J Grossklags - … and Game Theory for Security: 6th …, 2015 - Springer
Increasing concern about insider threats, cyber-espionage, and other types of attacks which
involve a high degree of stealthiness has renewed the desire to better understand the timing …