Author List: Cremonini, Marco; Nizovtsev, Dmitri;
Journal of Management Information Systems, 2009, Volume 26, Issue 3, Page 241-274.
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who try to gain unauthorized access to information systems, or "targets," and defenders of those targets. Our analysis of the attacker--defender interaction shows that well-protected targets can use signals of their superior level of protection as a deterrence tool. This is due to the fact that, all other things being equal, rational attackers motivated by potential financial gains tend to direct their effort toward less-protected targets. We analyze several scenarios differing in the scope of publicly available information about target parameters and discuss conditions under which greater defenders' ability to signal their security characteristics may improve their welfare. Our results may assist security researchers in devising better defense strategies through the use of deterrence and provide new insight about the efficacy of specific security practices in complex information security environments.
Keywords: cost--benefit analysis; crime deterrence; games of complete and incomplete information; information security; information warfare; interdependent strategies; signaling
Algorithm:

List of Topics

#186 0.163 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#0 0.145 information types different type sources analysis develop used behavior specific conditions consider improve using alternative understanding data available main target
#246 0.112 strategic benefits economic benefit potential systems technology long-term applications competitive company suggest additional companies industry operating costs difficult substantial total
#56 0.098 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#10 0.080 strategies strategy based effort paper different findings approach suggest useful choice specific attributes explain effective affect employ particular online control
#4 0.065 characteristics experience systems study prior effective complexity deal reveals influenced companies type analyze having basis conducted determine complex comparative drive
#282 0.060 power perspective process study rational political perspectives politics theoretical longitudinal case social rationality formation construction shows multiple instead understanding fact