Making the Best Use of Cybersecurity Economic Models: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== ==Full Citation== Rachel Rue and Shari Lawrence Pfleeger, Making the Best Use of Cybersecurity Economic Models, 7 IEEE Security and Privacy 4 (2009). [http://...)
 
No edit summary
 
(5 intermediate revisions by 2 users not shown)
Line 1: Line 1:
==Full Title of Reference==
==Full Title of Reference==
Making the Best Use of Cybersecurity Economic Models


==Full Citation==
==Full Citation==


Rachel Rue and Shari Lawrence Pfleeger, Making the Best Use of Cybersecurity Economic Models, 7 IEEE Security and Privacy 4 (2009). [http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2009.98 ''Purchase'']
Rachel Rue and Shari Lawrence Pfleeger, ''Making the Best Use of Cybersecurity Economic Models'', 7 IEEE Security and Privacy 4 (2009). [http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2009.98 ''Purchase'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Rue_Pfleeger:2009&f=wikibiblio.bib ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Rue_Pfleeger:2009&f=wikibiblio.bib ''BibTeX'']
Line 9: Line 11:
==Categorization==
==Categorization==


Issues: [[Metrics]]
Issues: [[Metrics]]; [[Risk Management and Investment]]


==Key Words==  
==Key Words==  


[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Risk_Management risk management]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Risk_Modeling Risk Modeling]


==Synopsis==
==Synopsis==

Latest revision as of 11:00, 17 June 2010

Full Title of Reference

Making the Best Use of Cybersecurity Economic Models

Full Citation

Rachel Rue and Shari Lawrence Pfleeger, Making the Best Use of Cybersecurity Economic Models, 7 IEEE Security and Privacy 4 (2009). Purchase

BibTeX

Categorization

Issues: Metrics; Risk Management and Investment

Key Words

Risk Modeling

Synopsis

This article describes an analysis of several representative cybersecurity economic models, where the authors seek to determine whether each model's underlying assumptions are realistic and useful. They find that many of the assumptions are the same across disparate models, and most assumptions are far from realistic. They recommend several changes so that the predictions from economic models can be more relevant and useful.

Additional Notes and Highlights

Both authors are from RAND corporation. Their article provides a useful overview of the main models for modeling cybersecurity risks, as well as a stimulating critical approach to these models.