IS

Cremonini, Marco

Topic Weight Topic Terms
0.163 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.145 information types different type sources analysis develop used behavior specific conditions consider improve using alternative
0.112 strategic benefits economic benefit potential systems technology long-term applications competitive company suggest additional companies industry

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Nizovtsev, Dmitri 1
cost--benefit analysis 1 crime deterrence 1 games of complete and incomplete information 1 information security 1
information warfare 1 interdependent strategies 1 signaling 1

Articles (1)

Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers. (Journal of Management Information Systems, 2009)
Authors: Abstract:
    The paper uses a game-theoretic setting to examine the interaction between strategic attackers who try to gain unauthorized access to information systems, or "targets," and defenders of those targets. Our analysis of the attacker--defender interaction shows that well-protected targets can use signals of their superior level of protection as a deterrence tool. This is due to the fact that, all other things being equal, rational attackers motivated by potential financial gains tend to direct their effort toward less-protected targets. We analyze several scenarios differing in the scope of publicly available information about target parameters and discuss conditions under which greater defenders' ability to signal their security characteristics may improve their welfare. Our results may assist security researchers in devising better defense strategies through the use of deterrence and provide new insight about the efficacy of specific security practices in complex information security environments.