76 Hits in 5.4 sec

Securing Cyberspace: Realigning Economic Incentives in the ICT Value Net

Johannes M. Bauer, Michel van Eeten
2009 Social Science Research Network  
This paper focuses on the second aspect by adopting an economic approach to examine the relevant incentives of stakeholders in the (ICT) value net to provide for security and the consequences of these  ...  At a technical level, information security standards, mandated security testing, or peer-based information security approaches could be considered.  ... 
doi:10.2139/ssrn.1447511 fatcat:b55u7xws2bfedpxuvge3hlddyu

Towards the Development of a National Cybersecurity Strategy in Nigeria

Gerald Ogoko
2020 Figshare  
This documents assesses the digital landscape in Nigeria and highlights pointers for the development of a national cybersecurity strategy for Nigeria  ...  international infrastructure.  Invest financial and non-financial resources in the implementation of controls to secure the routing of internet traffic for government MDAs with a view to preventing it  ...  Effective Approach to Reducing Cybercrime in Nigeria Reducing cybercrime in Nigeria demands commitment and investment in the following:  Strengthen cybersecurity capacity in law enforcement agencies in  ... 
doi:10.6084/m9.figshare.12696599.v1 fatcat:pmwrnwu73fgsjoinqymfdpc6dy

2020 Cybercrime Economic Costs: No Measure No Solution

Jart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski
2015 2015 10th International Conference on Availability, Reliability and Security  
The analysis of the actual scenario of government actions in cyber security shows that the availability of multiple contrasting figures on the impact of cyber-attacks is holding back the adoption of policies  ...  , and handling of security incidents is balanced with a decrease in losses from offences.  ...  This mismatch of messages is a stumbling block in cybercrime prevention which could be alleviated with better quantification. This area requires further investigation. IV.  ... 
doi:10.1109/ares.2015.56 dblp:conf/IEEEares/ArminTAGRK15 fatcat:n6zys7recfei3nvs2eyh7js3uu

Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management

In Lee
2020 Future Internet  
New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers.  ...  The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy.  ...  The Global Standards Initiative on Internet of Things (IoT-GSI) of ITU-T promoted a unified approach for the development of technical standards to enable the global operations of the IoT and wrapped up  ... 
doi:10.3390/fi12090157 doaj:3f79389138e540feac458278b4cc4d3e fatcat:y4jcjxsn35cpbilnx6w2mlufs4

A Conceptual Framework for Threat Assessment Based on Organization's Information Security Policy

Joseph Elias Mbowe, Irina Zlotnikova, Simon S. Msanjila, George S. Oreku
2014 Journal of Information Security  
Furthermore, the study proposed the policy automation canvas for provision of a methodology to alert the security managers what possible threats found in their organizations for quick security mitigation  ...  However, it has been noted that the current tools for threat assessment processes have not encompassed information security policy for effective security management (i.e. confidentiality, integrity and  ...  Acknowledgements This research is supported by the Nelson Mandela Institution of Science and Technology under research grant from the Commission for Science and Technology (COSTECH), Tanzania.  ... 
doi:10.4236/jis.2014.54016 fatcat:a73h2sql2fc55haplpl64bvkhq

Future developments in cyber risk assessment for the internet of things

Petar Radanliev, David Charles De Roure, Razvan Nicolescu, Michael Huth, Rafael Mantilla Montalvo, Stacy Cannady, Peter Burnap
2018 Computers in industry (Print)  
Our work therefore advances the efforts of integrating cyber risk impact assessments and offer a better understanding of economic impact assessment for IoT cyber risk.  ...  We adapt to IoT both the Cyber Value at Risk model, a well-established model for measuring the maximum possible loss over a given time period, and the MicroMort model, a widely used model for predicting  ...  Acknowledgements Sincere gratitude to the Fulbright Commission.  ... 
doi:10.1016/j.compind.2018.08.002 fatcat:bwhms4lmhzcapazivn47xouwre

Systematically Understanding Cybersecurity Economics: A Survey

Mazaher Kianpour, Stewart J. Kowalski, Harald Øverby
2021 Sustainability  
and threaten the sustainability of digital ecosystems.  ...  This review contributes by aggregating the available knowledge from 28 studies, out of a collection of 628 scholarly articles, to answer five specific research questions.  ...  Acknowledgments: The authors greatly appreciate the thoughtful comments and suggestions of the anonymous reviewers. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su132413677 fatcat:x2had2s5rbebzk63uss6surti4

Riski: A Framework For Modeling Cyber Threats To Estimate Risk For Data Breach Insurance

Angeliki Panou, Christoforos Ntantogian, Christos Xenakis
2017 Zenodo  
Historically, the financial benefits of cyber security investments have not been calculated with the same financial discipline used to evaluate other material investments.  ...  RiSKI armed with the above information, employs a methodology, and develops a supporting scenario-based cyber investment tool, for quantifying the benefits of cybersecurity investments against the many  ...  ACKNOWLEDGMENTS This research has been funded by the European Commission as part of the ReCRED project (Horizon H2020 Framework Programme of the European Union under GA number 653417).  ... 
doi:10.5281/zenodo.1195988 fatcat:f6deud4gtjchbavrqryj53gn4q

The ICT standardisation policy of the EU

Kai Jakobs, Knut Blind
2009 Proceedings of the 2009 Euro American Conference on Telematics and Information Systems New Opportunities to increase Digital Citizenship - EATIS '09  
This document presents the conclusions of the Optimising ICT study into the effects of ICT on the policy process.  ...  The remit of the study has evolved to examine the disjunction between physical markets and their online counterparts caused by the presence of ICT factors that either elude policymakers altogether or cannot  ...  We also benefited from the generous contributions of staff at the ITRE and IMCO Committees of the European Parliament.  ... 
doi:10.1145/1551722.1551725 dblp:conf/eatis/JakobsB09 fatcat:svcqjsi5k5edroc2hwqp5ui4tu

The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security

Lindy Newlove-Eriksson, Giampiero Giacomello, Johan Eriksson
2018 The International Spectator: Italian Journal of International Affairs  
A recent illustrative case with enormous implications is the 2017 Swedish ICT scandal, where outsourcing of CII caused major security breaches.  ...  Corporatisation of critical information infrastructure (CII) is rooted in the 'privatisation wave' of the 1980s-90s, when the ground was laid for outsourcing public utilities.  ...  to prevent the crisis.  ... 
doi:10.1080/03932729.2018.1458445 fatcat:thoqrk7dlbgipke4yicv654tpa

A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate

Ioannis Agrafiotis, Jason R C Nurse, Michael Goldsmith, Sadie Creese, David Upton
2018 Journal of Cybersecurity  
These would allow organizations to identify corporate assets, link these to different types of cyber-harm, measure those harms and, finally, consider the security controls needed for the treatment of harm  ...  We conclude by arguing for the need for analytical tools for organizational cyber-harm, which can be based on a taxonomy such as the one we propose here.  ...  However, the quantification of harm is still an unsolved problem for organizations.  ... 
doi:10.1093/cybsec/tyy006 dblp:journals/cybersecurity/AgrafiotisNGCU18 fatcat:tdwlcbwx5reodi44r5brifvc2q

Securitizing Innovation to Protect Trade Secrets Between "the East" and "the West": A Neo-Schumpeterian Public Legal Reading

Riccardo Vecellio Segate
2020 UCLA Pacific Basin law journal  
For these reasons, the only way to protect trade secrets by law is through ensuring that their secrecy is reasonably safe by means of compulsory cybersecurity and cyber-hygiene standards to be complied  ...  When it comes to this specific form of IP, the only protection is afforded with prevention: injunctions and compensations can work as remedies for other IP rights' misappropriations and misexploitations  ...  See David Collins, Applying the Full Protection and Security Standard of International Investment Law to Digital Assets, 12 J.  ... 
doi:10.5070/p8371048804 fatcat:upica3fkxnfnfnhogv372afw24

A real-world information security performance assessment using a multidimensional socio-technical approach

Kaja Prislan, Anže Mihelič, Igor Bernik, Qi Jiang
2020 PLoS ONE  
The paper aims to validate the model used for evaluating the performance of information security management system through a multidimensional socio-technical approach, in a real-world settings among medium-sized  ...  Even though enterprises do possess certain information security capabilities and are aware of the importance of information security, their current practices make it difficult for them to keep up with  ...  . • Technical resources for preventing information security incidents.  ... 
doi:10.1371/journal.pone.0238739 pmid:32898183 fatcat:oft2cevelbccljmxo64axkawji

Protecting Critical Infrastructure in the EU

Centre for European Policy Studies
2010 Social Science Research Network  
The ECI directive simply writes that ICT will be the next sector to which the EC will look to define criteria for the criticality of ICT CIs.  ...  risks • Possibility of performing threat and vulnerability analysis on the CI and its components and also at the level of interdependencies and services when ICT are involved. • Risk quantification: R  ...  CSIRT (Computer Security and Incident Response Team). Another term for CERT. Culture of security.  ... 
doi:10.2139/ssrn.1756710 fatcat:xkc3vththvctdgdhnmhkkav6i4

Report On Challenges For Scis

Gerald Walther, Milos Jovanović, Maike Vollmer, Gerard Desmond, Amrita Choudhary, Zoltán Székely, Johan Sanne, Peter Klimek, Dmitrij Bezrukov, Raija Koivisto, Riitta Molarius, I. Mascari (+16 others)
2017 Zenodo  
In terms of the results, the system/physical dimension received the highest number of important challenges.  ...  The report discusses the challenges posed by four types of threats -terrorist attacks, cyber attacks, extreme weather and social unrest- on the SmartResilience case studies.  ...  There are many challenges when dealing with the ICT-security threats such as a cyber-attack.  ... 
doi:10.5281/zenodo.438644 fatcat:mido7xwnrnhcbokjjuubpnso4e
« Previous Showing results 1 — 15 out of 76 results