期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
1
作者 scott farrow Jules Szanton 《Journal of Information Security》 2016年第2期15-28,共14页
Extensions of the Gordon-Loeb [1] and the Gordon-Loeb-Lucyshyn-Zhou [2] models are presented based on mathematical equivalency with a generalized homeland security model. The extensions include limitations on changes ... Extensions of the Gordon-Loeb [1] and the Gordon-Loeb-Lucyshyn-Zhou [2] models are presented based on mathematical equivalency with a generalized homeland security model. The extensions include limitations on changes in the probability of attack, simultaneous effects on probability and loss, diversion of attack, and shared non-information defenses. Legal cases are then investigated to assess approximate magnitudes of external effects and the extent they are internalized by the legal system. 展开更多
关键词 CYBERSECURITY Investment EXTERNALITY LOG-CONVEXITY Law
下载PDF
Cybersecurity: Integrating Information into the Microeconomics of the Consumer and the Firm
2
作者 scott farrow 《Journal of Information Security》 2016年第5期281-290,共10页
The connectivity of information has changed many things but not the way economists model consumers, firms and government. Information is here newly modeled as a fundamental element of microeconomic choices and utility... The connectivity of information has changed many things but not the way economists model consumers, firms and government. Information is here newly modeled as a fundamental element of microeconomic choices and utility, cost and tax functions. The results are more clearly defined metrics for losses due to cyber breaches or productivity gains from cyber investments. The integration of information into standard microeconomics also allows use of econometric and other tools to analyze the empirics of the consumer and the firm. In particular, the results identify ways in which losses in the Gordon and Loeb [1] model can be specified in more detail. 展开更多
关键词 MICROECONOMICS Utility Cost Cyber Losses
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部