IS

Yue, Wei T.

Topic Weight Topic Terms
0.636 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.353 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.196 technology investments investment information firm firms profitability value performance impact data higher evidence diversification industry
0.180 set approach algorithm optimal used develop results use simulation experiments algorithms demonstrate proposed optimization present
0.147 dimensions electronic multidimensional game transactions relative contrast channels theory sustained model predict dimension mixture evolutionary
0.138 learning model optimal rate hand domain effort increasing curve result experts explicit strategies estimate acquire
0.136 decision making decisions decision-making makers use quality improve performance managers process better results time managerial
0.128 process problem method technique experts using formation identification implicit analysis common proactive input improvements identify
0.126 dynamic time dynamics model change study data process different changes using longitudinal understanding decisions develop
0.107 strategies strategy based effort paper different findings approach suggest useful choice specific attributes explain effective
0.106 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Cavusoglu, Huseyin 1 Hui, Kai-Lung 1 Hui, Wendy 1 Raghunathan, Srinivasan 1
Çakanyildirim, Metin 1
information security 2 decision theory 1 game theory 1 intrusion detection 1
intrusion prevention 1 intrusion response 1 IT security investments 1 information security outsourcing 1
interdependency risks 1 mandatory security requirement 1 security compliance 1

Articles (3)

Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. (Journal of Management Information Systems, 2012)
Authors: Abstract:
    The rapid growth of computer networks has led to a proliferation of information security standards. To meet these security standards, some organizations outsource security protection to a managed security service provider (MSSP). However, this may give rise to system interdependency risks. This paper analyzes how such system interdependency risks interact with a mandatory security requirement to affect the equilibrium behaviors of an MSSP and its clients. We show that a mandatory security requirement will increase the MSSP's effort and motivate it to serve more clients. Although more clients can benefit from the MSSP's protection, they are also subjected to greater system interdependency risks. Social welfare will decrease if the mandatory security requirement is high, and imposing verifiability may exacerbate social welfare losses. Our results imply that recent initiatives such as issuing certification to enforce computer security protection, or encouraging auditing of managed security services, may not be advisable.
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    Firms have been increasing their information technology (IT) security budgets significantly to deal with increased security threats. An examination of current practices reveals that managers view security investment as any other and use traditional decision-theoretic risk management techniques to determine security investments. We argue in this paper that this method is incomplete because of the problem's strategic nature--hackers alter their hacking strategies in response to a firm's investment strategies. We propose game theory for determining IT security investment levels and compare game theory and decision theory approaches on several dimensions such as the investment levels, vulnerability, and payoff from investments. We show that the sequential game results in the maximum payoff to the firm, but requires that the firm move first before the hacker. Even if a simultaneous game is played, the firm enjoys a higher payoff than that in the decision theory approach, except when the firm's estimate of the hacker effort in the decision theory approach is sufficiently close to the actual hacker effort. We also show that if the firm learns from prior observations of hacker effort and uses these to estimate future hacker effort in the decision theory approach, then the gap between the results of decision theory and game theory approaches diminishes over time. The rate of convergence and the extent of loss the firm suffers before convergence depend on the learning model employed by the firm to estimate hacker effort.
Intrusion Prevention in Information Systems: Reactive and Proactive Responses. (Journal of Management Information Systems, 2007)
Authors: Abstract:
    Intrusion prevention requires effective identification of and response to malicious events. In this paper, we model two important managerial decisions involved in the intrusion prevention process: the configuration of the detection component, and the response by the reaction component. The configuration decision affects the number of alarms the firm has to investigate. It is well known that the traditional intrusion detection system generates too many false alarms. The response decision determines whether alarms are going to be investigated or rejected outright. By jointly optimizing these two decision variables, a firm may apply different strategies in protecting its informational assets: slow but accurate, rapid but inaccurate, or a mixture of the two strategies. We use the optimal control approach to study the problem. Unlike previous literature, which studied the problem with a static model, in our model, the decision on balancing the desire to detect all malicious events with the opportunity costs required to do so is time dependent. Furthermore, we show how the choice of an optimal mixture of reactive and proactive responses depends on the values of cost parameters and investigation rate parameters. We find that in our model, a high damage cost does not immediately translate to a preference of proactive response, or a high false rejection cost does not translate to a preference of proactive response. The dynamics of the problem, such as how fast alarms accumulate and how fast they can be cleared, also affect the decisions.