A Simulation Model of Information Systems Security

A Simulation Model of Information Systems Security

Norman Pendegraft (University of Idaho, USA) and Mark Rounds (University of Idaho, USA)
Copyright: © 2007 |Pages: 13
DOI: 10.4018/jisp.2007100104
OnDemand PDF Download:
$37.50

Abstract

The value of IS security is evaluated by simulating interactions between an information system, its users, and a population of attackers. Results suggest that the marginal value of additional security may be positive or negative as can the time rate of change of system value. This implies that IT security policy makers should be aware of where they are in the state space before setting IT security policy.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2017): Forthcoming, Available for Pre-Order
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing