IS

Cavusoglu, Huseyin

Topic Weight Topic Terms
0.998 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.292 technologies technology new findings efficiency deployed common implications engineers conversion change transformational opportunity deployment make
0.290 app brand mobile apps paid utility facebook use consumption users brands effects activities categories patterns
0.195 technology investments investment information firm firms profitability value performance impact data higher evidence diversification industry
0.171 learning model optimal rate hand domain effort increasing curve result experts explicit strategies estimate acquire
0.147 dimensions electronic multidimensional game transactions relative contrast channels theory sustained model predict dimension mixture evolutionary
0.144 value business benefits technology based economic creation related intangible cocreation assessing financial improved key economics
0.142 privacy information concerns individuals personal disclosure protection concern consumers practices control data private calculus regulation
0.124 negative positive effect findings results effects blog suggest role blogs posts examined period relationship employees
0.111 firms firm financial services firm's size examine new based result level including results industry important
0.109 content providers sharing incentive delivery provider net incentives internet service neutrality broadband allow capacity congestion
0.108 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Raghunathan, Srinivasan 3 Cavusoglu, Hasan 2 Airoldi, Edoardo M. 1 Mishra, Birendra 1
Phan, Tuan Q. 1 Yue, Wei T. 1
analytical modeling 1 content sharing 1 decision theory 1 disclosure 1
economics of IT security 1 economics of information systems 1 firewalls 1 game theory 1
intrusion detection systems (IDSs) 1 IT security management 1 information security 1 information security technologies 1
intrusion detection systems 1 IT security investments 1 online social networks 1 openness 1
privacy 1 privacy controls 1 ROC curves 1 security configuration 1
software configuration 1 secrecy 1

Articles (4)

Assessing the Impact of Granular Privacy Controls on Content Sharing and Disclosure on Facebook (Information Systems Research, 2016)
Authors: Abstract:
    We examine the role of granular privacy controls on dynamic content-sharing activities and disclosure patterns of Facebook users based on the exogenous policy change in December 2009. Using a unique panel data set, we first conduct regression discontinuity analyses to verify a discontinuous jump in context generation activities and disclosure patterns around the time of the policy change. We next estimate unobserved effects models to assess the short-run and long-run effects of the change. Results show that Facebook users, on average, increase use of wall posts and decrease use of private messages after the introduction of granular privacy controls. Also, users' disclosure patterns change to reflect the increased openness in content sharing. These effects are realized immediately and over time. More importantly, we show that user-specific factors play crucial roles in shaping users' varying reactions to the policy change. While more privacy sensitive users (those who do not reveal their gender and/or those who have exclusive disclosure patterns ex ante) share more content openly and less content secretly than before, less privacy sensitive users (those who reveal their gender and/or those who have inclusive disclosure patterns ex ante) share less content openly and more content secretly after the change. Hence, the policy change effectively diminishes variation among Facebook users in terms of content-generation activities and disclosure patterns. Therefore, characterizing the privacy change as a way to foster openness across all user categories does not reveal the change's true influence. Although an average Facebook user seems to favor increased openness, the policy change has different impacts on various groups of users based on their sensitivity to privacy, and this impact is not necessarily toward increased openness. To our knowledge, this is the first study that relies on observational data to assess the impact of a major privacy change on dynamic content-sharing activities and the resulting disclosure patterns of Facebook users.
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems. (Information Systems Research, 2009)
Authors: Abstract:
    Proper configuration of security technologies is critical to balance the needs for access and protection of information. The common practice of using a layered security architecture that has multiple technologies amplifies the need for proper configuration because the configuration decision about one security technology has ramifications for the configuration decisions about others. Furthermore, security technologies rely on each other for their operations, thereby affecting each other's contribution. In this paper we study configuration of and interaction between a firewall and intrusion detection systems (IDS). We show that deploying a technology, whether it is the firewall or the IDS, could hurt the firm if the configuration is not optimized for the firm's environment. A more serious consequence of deploying the two technologies with suboptimal configurations is that even if the firm could benefit when each is deployed alone, the firm could be hurt by deploying both. Configuring the IDS and the firewall optimally eliminates the conflict between them, ensuring that if the firm benefits from deploying each of these technologies when deployed alone, it will always benefit from deploying both. When optimally configured, we find that these technologies complement or substitute each other. Furthermore, we find that while the optimal configuration of an IDS does not change whether it is deployed alone or together with a firewall, the optimal configuration of a firewall has a lower detection rate (i.e., allowing more access) when it is deployed with an IDS than when deployed alone. Our results highlight the complex interactions between firewall and IDS technologies when they are used together in a security architecture, and, hence, the need for proper configuration to benefit from these technologies.
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    Firms have been increasing their information technology (IT) security budgets significantly to deal with increased security threats. An examination of current practices reveals that managers view security investment as any other and use traditional decision-theoretic risk management techniques to determine security investments. We argue in this paper that this method is incomplete because of the problem's strategic nature--hackers alter their hacking strategies in response to a firm's investment strategies. We propose game theory for determining IT security investment levels and compare game theory and decision theory approaches on several dimensions such as the investment levels, vulnerability, and payoff from investments. We show that the sequential game results in the maximum payoff to the firm, but requires that the firm move first before the hacker. Even if a simultaneous game is played, the firm enjoys a higher payoff than that in the decision theory approach, except when the firm's estimate of the hacker effort in the decision theory approach is sufficiently close to the actual hacker effort. We also show that if the firm learns from prior observations of hacker effort and uses these to estimate future hacker effort in the decision theory approach, then the gap between the results of decision theory and game theory approaches diminishes over time. The rate of convergence and the extent of loss the firm suffers before convergence depend on the learning model employed by the firm to estimate hacker effort.
The Value of Intrusion Detection Systems in Information Technology Security Architecture. (Information Systems Research, 2005)
Authors: Abstract:
    The increasing significance of information technology (IT) security to firms is evident from their growing IT security budgets. Firms rely on security technologies such as firewalls and intrusion detection systems (IDSs) to manage IT security risks. Although the literature on the technical aspects of IT security is proliferating, a debate exists in the IT security community about the value of these technologies. In this paper, we seek to assess the value of IDSs in a firm's IT security architecture. We find that the IDS configuration, represented by detection (true positive) and false alarm (false positive) rates, determines whether a firm realizes a positive or negative value from the IDS. Specifically, we show that a firm realizes a positive value from an IDS only when the detection rate is higher than a critical value, which is determined by the hacker's benefit and cost parameters. When the firm realizes a positive (negative) value, the IDS deters (sustains) hackers. However, irrespective of whether the firm realizes a positive or negative value from the IDS, the IDS enables the firm to better target its investigation of users, while keeping the detection rate the same. Our results suggest that the positive value of an IDS results not from improved detection per se, but from an increased deterrence enabled by improved detection. Finally, we show that the firm realizes a strictly nonnegative value if the firm configures the IDS optimally based on the hacking environment.