IS

Kelley, Ken

Topic Weight Topic Terms
0.235 network networks social analysis ties structure p2p exchange externalities individual impact peer-to-peer structural growth centrality
0.144 strategies strategy based effort paper different findings approach suggest useful choice specific attributes explain effective
0.142 learning model optimal rate hand domain effort increasing curve result experts explicit strategies estimate acquire
0.109 model research data results study using theoretical influence findings theory support implications test collected tested

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Cheng, Hsing Kenneth 1 Guo, Hong 1
malware propagation 2 information systems security 1 malware defense 1 social networks 1
trajectory network analysis 1 technological networks 1

Articles (1)

Impact of Network Structure on Malware Propagation: A Growth Curve Perspective (Journal of Management Information Systems, 2016)
Authors: Abstract:
    Malicious software, commonly termed Òmalware,Ó continuously presents one of the top security concerns, and causes tremendous worldwide financial losses for organizations. In this paper, we propose a structural risk model to analyze malware propagation dynamics measured by a four-parameter (asymptote, point of inflection, rate, and infection proportion at inflection) growth curve. Using both social network data and technological network infrastructure from a large organization, we estimate the proposed structural risk model based on incident-specific nonlinear growth curves. This paper provides empirical evidence for the explanatory power of the structural characteristics of the underlying networks on malware propagation dynamics. This research provides useful findings for security managers in designing their malware defense strategies. We also simulate three common malware defense strategies (preselected immunization strategies, countermeasure dissemination strategies, and security awareness programs) based on the proposed structural risk model and show that they outperform existing strategies in terms of reducing the size of malware infection. > >