메뉴 건너뛰기




Volumn 37, Issue 9, 2017, Pages 1644-1651

Resilience of Cyber Systems with Over- and Underregulation

Author keywords

Cyber network; regulation; resilience

Indexed keywords

BEHAVIORAL RESEARCH; HUMAN ENGINEERING; NETWORK SECURITY; PERSONNEL TRAINING;

EID: 85006760673     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/risa.12729     Document Type: Article
Times cited : (45)

References (28)
  • 1
    • 84904416346 scopus 로고    scopus 로고
    • February 12,, 41 p., Accessed December 15, 2015
    • National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity, February 12, 2014. 41 p. Available at: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf, Accessed December 15, 2015.
    • (2014) Framework for Improving Critical Infrastructure Cybersecurity
  • 2
    • 85029080900 scopus 로고    scopus 로고
    • October 14,, Accessed December 15, 2015
    • U.S. Department of Homeland Security. National Cybersecurity Protection System (NCPS), October 14, 2015. Available at: http://www.dhs.gov/national-cybersecurity-protection-system-ncps, Accessed December 15, 2015.
    • (2015) National Cybersecurity Protection System (NCPS)
  • 3
    • 33749991949 scopus 로고    scopus 로고
    • Understanding regulation
    • Shleifer A. Understanding regulation. European Financial Management, 2005; 11(4):439–451.
    • (2005) European Financial Management , vol.11 , Issue.4 , pp. 439-451
    • Shleifer, A.1
  • 4
    • 85029122231 scopus 로고    scopus 로고
    • Arlington, VA, Mercatus Center at George Mason University, February, 4 p., Accessed December 15, 2015
    • Williams R, Adams M. Regulatory Overload. Arlington, VA: Mercatus Center at George Mason University, February 2012. 4 p. Report No.: 103. Available at: http://mercatus.org/sites/default/files/Regulatory_Overload_WilliamsAdams_MOP103.pdf, Accessed December 15, 2015.
    • (2012) Regulatory Overload
    • Williams, R.1    Adams, M.2
  • 5
    • 84969264352 scopus 로고    scopus 로고
    • How to hack the hackers: The human side of cybercrime
    • Waldrop MM. How to hack the hackers: The human side of cybercrime. Nature, 2016; 533(7602):164–167.
    • (2016) Nature , vol.533 , Issue.7602 , pp. 164-167
    • Waldrop, M.M.1
  • 6
    • 84929251988 scopus 로고    scopus 로고
    • Washington, DC, Accessed December 15, 2015
    • U.S. Government Publishing Office. Code of Federal Regulations (Annual Edition). Washington, DC, 2015. Available at: https://www.gpo.gov/fdsys/browse/collectionCfr.action?collectionCode=CFR, Accessed December 15, 2015.
    • (2015) Code of Federal Regulations (Annual Edition)
  • 8
    • 85026737590 scopus 로고    scopus 로고
    • Cheltenham, UK, March 15,, Accessed May 31, 2016
    • CESG, Government Communications Headquarters. Password Guidance: Simplifying Your Approach. Cheltenham, UK, March 15, 2016. Available at: https://www.cesg.gov.uk/guidance/password-guidance-simplifying-your-approach, Accessed May 31, 2016.
    • (2016) Password Guidance: Simplifying Your Approach
  • 9
    • 84947490388 scopus 로고    scopus 로고
    • Percolation model of insider threats to assess the optimum number of rules
    • Kepner J, Gadepally V, Michaleas P. Percolation model of insider threats to assess the optimum number of rules. Environment Systems and Decisions, 2015; 35(4):504–510.
    • (2015) Environment Systems and Decisions , vol.35 , Issue.4 , pp. 504-510
    • Kepner, J.1    Gadepally, V.2    Michaleas, P.3
  • 13
    • 0037401532 scopus 로고    scopus 로고
    • Safety goals in “risk-informed, performance-based” regulation
    • Saji G. Safety goals in “risk-informed, performance-based” regulation. Reliability Engineering & System Safety, 2003; 80(2):163–172.
    • (2003) Reliability Engineering & System Safety , vol.80 , Issue.2 , pp. 163-172
    • Saji, G.1
  • 16
    • 77955141180 scopus 로고    scopus 로고
    • Cambridge, MA, National Bureau of Economic Research, May, Report w15018., Accessed December 15, 2015
    • Aizenman J. Financial Crisis and the Paradox of Under- and Over-Regulation. Cambridge, MA: National Bureau of Economic Research, May 2009. Report No.: w15018. Available at: http://www.nber.org/papers/w15018.pdf, Accessed December 15, 2015.
    • (2009) Financial Crisis and the Paradox of Under- and Over-Regulation
    • Aizenman, J.1
  • 18
  • 19
    • 85029070875 scopus 로고    scopus 로고
    • Washington, DC, February 9,, Accessed May 30, 2016
    • U.S. Census Bureau. U.S., NAICS Sectors, Larger Employment Sizes [Internet]. Washington, DC, February 9, 2016. Available at: http://www2.census.gov/econ/susb/data/2013/us_naicssector_large_emplsize_2013.xlsx, Accessed May 30, 2016.
    • (2016) U.S., NAICS Sectors, Larger Employment Sizes [Internet]
  • 20
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • Barabasi A. Emergence of scaling in random networks. Science, 1999; 286(5439):509–512.
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabasi, A.1
  • 22
    • 4544247849 scopus 로고    scopus 로고
    • Redundancy as a design principle and an operating principle
    • Carroll JS. Redundancy as a design principle and an operating principle. Risk Analysis, 2004; 24(4):955–957.
    • (2004) Risk Analysis , vol.24 , Issue.4 , pp. 955-957
    • Carroll, J.S.1
  • 23
    • 4544264381 scopus 로고    scopus 로고
    • Thinking about how many guards will do the job
    • Bunn M. Thinking about how many guards will do the job. Risk Analysis, 2004; 24(4):949–953.
    • (2004) Risk Analysis , vol.24 , Issue.4 , pp. 949-953
    • Bunn, M.1
  • 24
    • 4544366486 scopus 로고    scopus 로고
    • The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security
    • Sagan SD. The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security. Risk Analysis, 2004; 24(4):935–946.
    • (2004) Risk Analysis , vol.24 , Issue.4 , pp. 935-946
    • Sagan, S.D.1
  • 25
    • 55349142134 scopus 로고    scopus 로고
    • How a system backfires: Dynamics of redundancy problems in security
    • Ghaffarzadegan N. How a system backfires: Dynamics of redundancy problems in security. Risk Analysis, 2008; 28(6):1669–1687.
    • (2008) Risk Analysis , vol.28 , Issue.6 , pp. 1669-1687
    • Ghaffarzadegan, N.1
  • 26
    • 70350780079 scopus 로고    scopus 로고
    • Cybersecurity: Stakeholder incentives, externalities, and policy options
    • Bauer JM, van Eeten MJG. Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommunications Policy, 2009; 33(10–11):706–719.
    • (2009) Telecommunications Policy , vol.33 , Issue.10-11 , pp. 706-719
    • Bauer, J.M.1    van Eeten, M.J.G.2
  • 27
    • 84936824601 scopus 로고
    • Management support systems: Towards integrated knowledge management
    • Milan Z. Management support systems: Towards integrated knowledge management. Human Systems Management, 1987;(1):59–70.
    • (1987) Human Systems Management , Issue.1 , pp. 59-70
    • Milan, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.