Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between attacker and defender. However, economic theory suggests that in many cases doing "nothing" is the optimal strategy when substantial fixed adjustment costs are present. Indeed, the authors' anecdotal experience as chief information security officers indicates that uncertain costs that might be incurred by rapid adoption of security updates substantially delay the application of recommended security controls, so the industry does appear to understand this economic aspect quite well. From a policy perspective, the inherently discontinuous adjustment path taken by firms can cause difficulties in determining the most effective public policy remit ...
Risk transfer plays an increasing role in information security risk management as organisations purc...
With increasing economic pressures and exponential growth in technological innovations, companies ar...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...
Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between a...
Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between a...
This paper examines investments in cybersecurity made by users and software providers with a focus o...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
This paper develops a theory of sequential investments in cybersecurity in which the software vendor...
Cybersecurity has become a key factor that determines the success or failure of companies that rely ...
The United States struggles to impose meaningful costs for destructive or disruptive cyber operation...
One of the most controversial theoretical issues of our time is the governance of cybersecurity. Com...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...
Why care about Cybersecurity? Referencing the book of National Academics of Sciences, Engineering an...
This article discusses how populism and political uncertainty are impacting on one of the main curre...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
Risk transfer plays an increasing role in information security risk management as organisations purc...
With increasing economic pressures and exponential growth in technological innovations, companies ar...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...
Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between a...
Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between a...
This paper examines investments in cybersecurity made by users and software providers with a focus o...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
This paper develops a theory of sequential investments in cybersecurity in which the software vendor...
Cybersecurity has become a key factor that determines the success or failure of companies that rely ...
The United States struggles to impose meaningful costs for destructive or disruptive cyber operation...
One of the most controversial theoretical issues of our time is the governance of cybersecurity. Com...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...
Why care about Cybersecurity? Referencing the book of National Academics of Sciences, Engineering an...
This article discusses how populism and political uncertainty are impacting on one of the main curre...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
Risk transfer plays an increasing role in information security risk management as organisations purc...
With increasing economic pressures and exponential growth in technological innovations, companies ar...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...