In the information age, the scale and scope of cyber attacks on information systems is on the rise. Meanwhile, a new type of terrorism—cyber terrorism has emerged. Cyber terrorists belong to the most dangerous subgroup of hackers. In recent years, many academic researchers have called attention to this hacker group. There is a dearth of research that analyzes and predicts the behavior of cyber terrorists. The aim of this paper is to use game theory to analyze risk in ITbased information systems, predict the behavior of cyber terrorists, and find an optimal investment. This paper proposes a general one-stage static game model that can be applied to all cyber crimes. This model is used to analyze the optimal investment in information systems ...
The level of firms\u27 information security investment has recently become a critical issue in the m...
When investing in cyber security resources, information security managers have to follow effective d...
Firms lose millions of dollars every year to cyber-attacks and the risk to these companies is growin...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
In this work we attempt to develop models that can suggest requisite levels of investment, and/or in...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
Several research works have proposed economic and financial models to determine the optimal amount o...
The level of firms\u27 information security investment has recently become a critical issue in the m...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Criminal-hacker nexus leads to a 2 step target selection process, which begins with a short list of ...
Firms lose millions of dollars every year to cyber-attacks and the risk to these companies is growin...
The level of firms\u27 information security investment has recently become a critical issue in the m...
When investing in cyber security resources, information security managers have to follow effective d...
Firms lose millions of dollars every year to cyber-attacks and the risk to these companies is growin...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
In this work we attempt to develop models that can suggest requisite levels of investment, and/or in...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
Several research works have proposed economic and financial models to determine the optimal amount o...
The level of firms\u27 information security investment has recently become a critical issue in the m...
The level of firms\u27 information security investment has recently become a critical issue in the m...
Criminal-hacker nexus leads to a 2 step target selection process, which begins with a short list of ...
Firms lose millions of dollars every year to cyber-attacks and the risk to these companies is growin...
The level of firms\u27 information security investment has recently become a critical issue in the m...
When investing in cyber security resources, information security managers have to follow effective d...
Firms lose millions of dollars every year to cyber-attacks and the risk to these companies is growin...