Please use this identifier to cite or link to this item:
https://doi.org/10.1109/HICSS.2009.256
DC Field | Value | |
---|---|---|
dc.title | Information security: user precautions, attacker efforts, and enforcement | |
dc.contributor.author | Png, I.P.L. | |
dc.contributor.author | Wang, Q.-H. | |
dc.date.accessioned | 2013-07-23T09:16:48Z | |
dc.date.available | 2013-07-23T09:16:48Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Png, I.P.L.,Wang, Q.-H. (2009). Information security: user precautions, attacker efforts, and enforcement. Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/HICSS.2009.256" target="_blank">https://doi.org/10.1109/HICSS.2009.256</a> | |
dc.identifier.isbn | 9780769534503 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/43001 | |
dc.description.abstract | We analyze the strategic interactions among end-users and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by end-users are strategic substitutes. This explains the inertia among users in taking precautions even in the face of grave potential consequences. Generally, information security can be addressed from two angles - facilitating end-user precautions and enforcement against attackers. We show that, enforcement is more effective as an all-round policy to enhance information security. Facilitating user precautions leads to increased precautions and increased end-user demand, which have conflicting effects on the total harm suffered by end-users. Hence, reduced form estimates of the impact of facilitating precautions may over- or underestimate the impact, depending on which effect is stronger. Further, in targeted attacks, the outcome of interaction between users and attackers depends on the specific cost functions. Attackers may target low-valuation users as they take fewer precautions. © 2009 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/HICSS.2009.256 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | BUSINESS POLICY | |
dc.contributor.department | INFORMATION SYSTEMS | |
dc.description.doi | 10.1109/HICSS.2009.256 | |
dc.description.sourcetitle | Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.