메뉴 건너뛰기




Volumn 26, Issue 3, 2009, Pages 241-274

Risks and benefits of signaling information system characteristics to strategic attackers

Author keywords

Cost benefit analysis; Crime deterrence; Games of complete and incomplete information; Information security; Information warfare; Interdependent strategies; Signaling

Indexed keywords

COMPLEX INFORMATION; DEFENSE STRATEGY; FINANCIAL GAINS; INCOMPLETE INFORMATION; INFORMATION SECURITY; INFORMATION WARFARE; SECURITY PRACTICE; TARGET PARAMETER;

EID: 77749320098     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.2753/MIS0742-1222260308     Document Type: Article
Times cited : (60)

References (39)
  • 1
    • 85005305538 scopus 로고
    • The market for "lemons": Quality uncertainty and market mechanism
    • Akerlof, G.A. The market for "lemons": Quality uncertainty and market mechanism. Quarterly Journal of Economics, 84, 3 (1970), 488-500.
    • (1970) Quarterly Journal of Economics , vol.84 , Issue.3 , pp. 488-500
    • Akerlof, G.A.1
  • 2
    • 38149088764 scopus 로고    scopus 로고
    • Information security economics-and beyond
    • A. Menezes (ed.) Lecture Notes in Computer Science 4622. Berlin and Heidelberg: Springer
    • Anderson, R.J., and Moore, T. Information security economics-and beyond. In A. Menezes (ed.), Advances in Cryptology-CRYPTO 2007. Lecture Notes in Computer Science 4622. Berlin and Heidelberg: Springer, 2007, pp. 68-91.
    • (2007) Advances in Cryptology-CRYPTO 2007 , pp. 68-91
    • Anderson, R.J.1    Moore, T.2
  • 3
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • August, T., and Tunca, T.I. Network software security and user incentives. Management Science, 52, 11 (2006), 1703-1720.
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 4
    • 0004141256 scopus 로고    scopus 로고
    • Fundamental concepts of dependability
    • Laboratoire d'Analyse et d'Architecture des Systemes, Centre National de la Recherche Scientifique, Toulouse, France
    • Avizienis, A.; Laprie, J.; and Randell, B. Fundamental concepts of dependability. Technical Report no. 01145, Laboratoire d'Analyse et d'Architecture des Systemes, Centre National de la Recherche Scientifique, Toulouse, France, 2001.
    • (2001) Technical Report No. 01145
    • Avizienis, A.1    Laprie, J.2    Randell, B.3
  • 6
    • 77749261781 scopus 로고    scopus 로고
    • Verizon Business Risk Team, New York, available at
    • Baker, W.H.; Hylender, C.D.; and Valentine, J.A. 2008 data breach investigation report. Verizon Business Risk Team, New York, 2008 (available at www.verizonbusiness.com/resources/ security/databreachreport.pdf).
    • (2008) Data Breach Investigation Report , vol.2008
    • Baker, W.H.1    Hylender, C.D.2    Valentine, J.A.3
  • 7
    • 0000982594 scopus 로고
    • The economic way of looking at behavior
    • Becker, G.S. The economic way of looking at behavior. Journal of Political Economy, 101, 3 (1993), 385-409.
    • (1993) Journal of Political Economy , vol.101 , Issue.3 , pp. 385-409
    • Becker, G.S.1
  • 8
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • Bier, V.; Oliveros, S.; and Samuelson, L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 4 (2007), 563-587.
    • (2007) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.1    Oliveros, S.2    Samuelson, L.3
  • 9
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • Cavusoglu, H., and Raghunathan, S. Configuration of detection software: A comparison of decision and game theory approaches. Decision Analysis, 1, 3 (2004), 131-148.
    • (2004) Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 11
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16, 1 (2005), 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 12
    • 66549093519 scopus 로고    scopus 로고
    • Decision theoretic and game-theoretic approaches to IT security investment
    • Fall
    • Cavusoglu, H.; Raghunathan, S.; and Yue, W.T. Decision theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25, 2 (Fall 2008), 281-304.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 281-304
    • Cavusoglu, H.1    Raghunathan, S.2    Yue, W.T.3
  • 13
    • 84909999858 scopus 로고    scopus 로고
    • Understanding and influencing attackers' decisions: Implications for security investment strategies
    • Paper presented at the, Cambridge UK June, 26-28
    • Cremonini, M., and Nizovtsev, D. Understanding and influencing attackers' decisions: Implications for security investment strategies. Paper presented at the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK, June 26-28, 2006.
    • (2006) Fifth Workshop on the Economics of Information Security (WEIS 2006)
    • Cremonini, M.1    Nizovtsev, D.2
  • 14
    • 84906628863 scopus 로고    scopus 로고
    • What do we know about the substitution effect in transnational terrorism?
    • A. Silke and G. Ilardi (eds.). Ilford, UK: Frank Cass
    • Enders, W., and Sandler, T. What do we know about the substitution effect in transnational terrorism? In A. Silke and G. Ilardi (eds.), Researching Terrorism Trends, Achievements, Failures. Ilford, UK: Frank Cass, 2004, pp. 119-137.
    • (2004) Researching Terrorism Trends, Achievements, Failures , pp. 119-137
    • Enders, W.1    Sandler, T.2
  • 18
    • 33751256271 scopus 로고    scopus 로고
    • Income interdependence, and substitution effects affecting incentives for security investment
    • Hausken, K. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25, 6 (2006), 629-665.
    • (2006) Journal of Accounting and Public Policy , vol.25 , Issue.6 , pp. 629-665
    • Hausken, K.1
  • 19
    • 35348950536 scopus 로고    scopus 로고
    • Strategic defense and attack for series and parallel reliability systems
    • Hausken, K. Strategic defense and attack for series and parallel reliability systems. European Journal of Operational Research, 186, 2 (2008), 856-881.
    • (2008) European Journal of Operational Research , vol.186 , Issue.2 , pp. 856-881
    • Hausken, K.1
  • 20
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson, E., and Olovsson, T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 23, 4 (1997), 235-245.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 22
    • 77749261847 scopus 로고    scopus 로고
    • Data breaches: What the underground world of "carding" reveals
    • U.S. Department of Justice, Washington DC, available at
    • Kiefer Peretti, K. Data breaches: What the underground world of "carding" reveals. Computer Crime and Intellectual Property Section, U.S. Department of Justice, Washington, DC, 2008 (available at www.usdoj.gov/criminal/cybercrime/DataBreachesArticle.pdf).
    • (2008) Computer Crime and Intellectual Property Section
    • Kiefer Peretti, K.1
  • 26
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • Liu, P.; Zang, W.; and Yu, M. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security, 8, 1 (2005), 78-118.
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 78-118
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 27
    • 85070912494 scopus 로고    scopus 로고
    • Attack-potential-based survivability modeling for high-consequence systems
    • J. L. Cole and S.D. Wolthusen (eds.). Los Alamitos, CA : IEEE Computer Society
    • McDermott, J. Attack-potential-based survivability modeling for high-consequence systems. In J.L. Cole and S.D. Wolthusen (eds.), Proceedings of the Third IEEE International Information Assurance Workshop. Los Alamitos, CA : IEEE Computer Society, 2005, pp. 119-130.
    • (2005) Proceedings of the Third IEEE International Information Assurance Workshop , pp. 119-130
    • McDermott, J.1
  • 30
    • 0033325475 scopus 로고    scopus 로고
    • Experiments with quantitative evaluation tools for monitoring operational security
    • Ortalo, R.; Deswarte, Y.; and Kaâniche, M. Experiments with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25, 5 (1999), 633-650.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3
  • 31
    • 63349088117 scopus 로고    scopus 로고
    • The deterrent and displacement effects of information security enforcement: International evidence
    • Fall
    • Png, I.P.L.; Wang, C.Y.; and Wang, Q.H. The deterrent and displacement effects of information security enforcement: International evidence. Journal of Management Information Systems, 25, 2 (Fall 2008), 125-144.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 125-144
    • Png, I.P.L.1    Wang, C.Y.2    Wang, Q.H.3
  • 32
    • 0001024816 scopus 로고
    • A dynamic game of R&D: Patent protection and competitive behavior
    • Reinganum, J. A dynamic game of R&D: Patent protection and competitive behavior. Econometrica, 50, 3 (1982), 671-688.
    • (1982) Econometrica , vol.50 , Issue.3 , pp. 671-688
    • Reinganum, J.1
  • 34
    • 35248853499 scopus 로고    scopus 로고
    • How much security is enough to stop a thief? the economics of outsider theft via computer systems and networks
    • R.N. Wright (ed.). Lecture Notes in Computer Science 2742. Berlin: Springer
    • Schechter, S.E., and Smith, M.D. How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks. In R.N. Wright (ed.), Financial Cryptography Conference. Lecture Notes in Computer Science 2742. Berlin: Springer, 2003, pp. 122-137.
    • (2003) Financial Cryptography Conference , pp. 122-137
    • Schechter, S.E.1    Smith, M.D.2
  • 35
    • 33646075395 scopus 로고    scopus 로고
    • A model for when disclosure helps security: What is different about computer and network security?
    • Swire, P.P. A model for when disclosure helps security: What is different about computer and network security? Journal on Telecommunications and High Technology Law, 3, 1 (2004), 163-208.
    • (2004) Journal on Telecommunications and High Technology Law , vol.3 , Issue.1 , pp. 163-208
    • Swire, P.P.1
  • 36
    • 77749333197 scopus 로고    scopus 로고
    • A theory of disclosure for security and competitive reasons: Open source, proprietary software, and government agencies
    • Swire, P.P. A theory of disclosure for security and competitive reasons: Open source, proprietary software, and government agencies. Houston Law Review, 42, 5 (2006), 1333-1380.
    • (2006) Houston Law Review , vol.42 , Issue.5 , pp. 1333-1380
    • Swire, P.P.1
  • 38
    • 0033715016 scopus 로고    scopus 로고
    • Fixed- vs. variable-length patterns for detecting suspicious process behavior
    • Wespi, A.; Debar, H.; Dacier, M.; and Nassehi, M. Fixed- vs. variable-length patterns for detecting suspicious process behavior. Journal of Computer Security, 8, 2-3 (2000), 1-15.
    • (2000) Journal of Computer Security , vol.8 , Issue.2-3 , pp. 1-15
    • Wespi, A.1    Debar, H.2    Dacier, M.3    Nassehi, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.