Investments and trade-offs in the economics of information security

Christos Ioannidis, David Pym, Julian Williams

Research output: Chapter in Book/Report/Conference proceedingConference publication

Abstract

We develop and simulate a dynamic model of investment in information security. The model is based on the recognition that both IT managers and users appreciate the trade-off between two of the fundamental characteristics of information security, namely confidentiality and availability. The model’s parameters can be clustered in a manner that allows us to categorize and compare the responses to shocks of various types of organizations. We derive the system’s stability conditions and find that they admit a wide choice of parameters. We examine the system’s responses to the same shock in confidentiality under different parameter constellations that correspond to various types of organizations. Our analysis illustrates that the response to investments in information security will be uniform in neither size nor time evolution.
Original languageEnglish
Title of host publicationFinancial cryptography and data security:13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised selected papers
EditorsRoger Dingledine, Philippe Golle
Place of PublicationBerlin (DE)
PublisherSpringer
Pages148-166
Number of pages19
ISBN (Electronic)978-3-642-03549-4
ISBN (Print)978-3-6420-3548-7
DOIs
Publication statusPublished - 2009
Event13th International Conference on Financial Cryptography and Data Security - Accra Beach, Barbados
Duration: 23 Feb 200926 Feb 2009

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Number5628
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th International Conference on Financial Cryptography and Data Security
Abbreviated titleFC 2009
CountryBarbados
CityAccra Beach
Period23/02/0926/02/09

Fingerprint Dive into the research topics of 'Investments and trade-offs in the economics of information security'. Together they form a unique fingerprint.

Cite this