Author List: Png, Ivan P. L.; Wang, Qiu-Hong;
Journal of Management Information Systems, 2009, Volume 26, Issue 2, Page 97-121.
We compare alternative information security policies--facilitating end-user precautions and enforcement against attackers. The context is mass and targeted attacks, taking account of strategic interactions between end users and attackers. For both mass and targeted attacks, facilitating end-user precautions reduces the expected loss of end users. However, the impact of enforcement on expected loss depends on the balance between deterrence and slackening of end-user precautions. Facilitating end-user precautions is more effective than enforcement against attackers when the cost of precautions and the cost of attacks are lower. With targeted attacks, facilitating end-user precautions is more effective for users with relatively high valuation of information security, while enforcement against attackers is more effective for users with relatively low valuation of security.
Keywords: enforcement; facilitation; information security; mass attacks; targeted attacks
Algorithm:

List of Topics

#56 0.647 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#248 0.124 computing end-user center support euc centers management provided users user services organizations end satisfaction applications article ibm step field policies
#151 0.096 costs cost switching reduce transaction increase benefits time economic production transactions savings reduction impact services reduced affect expected optimal associated