Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between attacker and defender. However, economic theory suggests that in many cases doing "nothing" is the optimal strategy when substantial fixed adjustment costs are present. Indeed, the authors' anecdotal experience as chief information security officers indicates that uncertain costs that might be incurred by rapid adoption of security updates substantially delay the application of recommended security controls, so the industry does appear to understand this economic aspect quite well. From a policy perspective, the inherently discontinuous adjustment path taken by firms can cause difficulties in determining the most effective public policy remit ...
The economics of information security has recently become a thriving and fast-moving discipline. Sys...
Insights in the field of cybersecurity economics empower decision makers to make informed decisions ...
An economic perspective has yielded invaluable insights into the analysis and design of information ...
Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between a...
Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between a...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
Recent efforts to address cybersecurity risks have focused on leveraging the immense technical capac...
Cybersecurity has become a key factor that determines the success or failure of companies that rely ...
Until now, the evolution of cyber security has been largely driven by market demand and has develope...
One of the most controversial theoretical issues of our time is the governance of cybersecurity. Com...
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-exist...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
In an age where so many businesses and systems are reliant on computer systems, there is a large inc...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...
The economics of information security has recently become a thriving and fast-moving discipline. Sys...
Insights in the field of cybersecurity economics empower decision makers to make informed decisions ...
An economic perspective has yielded invaluable insights into the analysis and design of information ...
Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between a...
Cybersecurity tends to be viewed as a highly dynamic, continually evolving technology race between a...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
Recent efforts to address cybersecurity risks have focused on leveraging the immense technical capac...
Cybersecurity has become a key factor that determines the success or failure of companies that rely ...
Until now, the evolution of cyber security has been largely driven by market demand and has develope...
One of the most controversial theoretical issues of our time is the governance of cybersecurity. Com...
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-exist...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
In an age where so many businesses and systems are reliant on computer systems, there is a large inc...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...
This paper studies investment in cybersecurity, where both the software vendor and the consumers can...
The economics of information security has recently become a thriving and fast-moving discipline. Sys...
Insights in the field of cybersecurity economics empower decision makers to make informed decisions ...
An economic perspective has yielded invaluable insights into the analysis and design of information ...