Skip to main content
Top
Published in: Information Systems Frontiers 2/2014

01-04-2014

Returns to information security investment: Endogenizing the expected loss

Author: Kjell Hausken

Published in: Information Systems Frontiers | Issue 2/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper endogenizes the value of an information set which has to be produced and protected. The profit is inverse U shaped in security investment and production effort. The breach probability is commonly assumed to decrease convexly in security investment, which means that modest security investment is sufficient to deter most perpetrators. We allow the breach probability to be not only convex, but concave, which means that substantial security investment is needed to deter most perpetrators. Convexity versus concavity depends on the security environment, perpetrators, technology, and law enforcement. A firm strikes a balance between producing and protecting an information set dependent on seven model parameters for production, protection, convexity, concavity, vulnerability, and resource strength.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
k = ∞ gives a step function when S(z,v) = 1 when z < 1, and S(z,v) decreases abruptly to 0 when z = 1. Conversely, k = 0 gives S(z,v) = 1 when z = 0, and S(z,v) decreases abruptly to 0 when z > 0.
 
Literature
go back to reference Gordon, L. A., & Loeb, M. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4), 438–457.CrossRef Gordon, L. A., & Loeb, M. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4), 438–457.CrossRef
go back to reference Hausken, K. (2005). Production and conflict models versus rent seeking models. Public Choice, 123(1), 59–93.CrossRef Hausken, K. (2005). Production and conflict models versus rent seeking models. Public Choice, 123(1), 59–93.CrossRef
go back to reference Hausken, K. (2006). Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338–349.CrossRef Hausken, K. (2006). Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338–349.CrossRef
Metadata
Title
Returns to information security investment: Endogenizing the expected loss
Author
Kjell Hausken
Publication date
01-04-2014
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 2/2014
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-012-9390-9

Other articles of this Issue 2/2014

Information Systems Frontiers 2/2014 Go to the issue

Premium Partner