Hackers, Users, Information Security
نویسندگان
چکیده
We analyze the strategic interactions among end-users and between end-users and a hacker. We show that security efforts by end users are strategic substitutes. This explains the inertia among end-users in taking precautions even in the face of grave potential consequences. Next, we analyze the direct and indirect effects of changes in user fixing cost and the rate of enforcement against hacking. For instance, a reduction in user fixing cost would directly lead users to increase fixing effort. However, that would make them less attractive targets, and so induce less hacking, and hence, indirectly lead users to reduce fixing. National University of Singapore. Corresponding author: Ivan Png, tel: +65 6516-6807; http://www.comp.nus.edu.sg/~ipng/. We thank Anindya Ghose and the anonymous referees for very helpful advice and suggestions. Workshop on the Economics of Information Security (WEIS 2006) © 2006, Png, Tang, and Wang 2
منابع مشابه
Enhancing Cyber Security of Online Accounts via a Novel Protocol and New Techniques
The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to use in their homes on their personal computers. These tools were a local install, often expensive, and required a learning curve to use them effecti...
متن کاملVulnerability Disclosure: The Strange Case of Bret McDanel
Responsible developers work hard to produce secure, reliable, and efficient software packages. No company wants its integrity compromised by hackers, employees, or legitimate users. Negative publicity damages a firm’s reputation. Legal proceedings can cost an organization millions and destroy any chance of long-term success. Realistically, few products are released without security flaws. Progr...
متن کاملSurvey On Database Security
A database-management system (DBMS) is a collection of correlated data and a set of programs to access correlated data. The collection of data, usually referred to as the database, contains information able to an enterprise. And hence the concept of security lies with-in. As the database contains all information relevant to particular enterprise, so it's very important to be in safe side t...
متن کاملSecurity, Fraudulent transactions and Customer Loyalty: A Field Study
A spate of identity thefts, data breaches and relentless media coverage of these issues has brought security issues to the forefront of not only consumers but also policy makers. This is even more important for financial industry. Users trust their banks to protect their financial assets and information. Unfortunately, hackers also realize that financial firms are an attractive target. Phishing...
متن کاملA Novel Approach to Deal with Keyloggers
Keyloggers have been widely used by hackers as a tool to steal information and passwords from users in e-commerce. The malware security software has also grown but keylogger grow too. This article reviews some of the techniques used by hackers to spread Keyloggers and bypass various security techniques by using advanced Keyloggers and finally, we describe a novel approach to deal with Keylogger...
متن کاملBehavioral Information Security: Two End User Survey Studies of Motivation and Security Practices
Information security is a multibillion-dollar problem faced by commercial and government organizations around the world. Through their adverse effects on organizational information systems, malware, hackers, and malicious insiders jeopardize organizations’ capabilities to pursue their missions effectively. Although technology-based solutions help to mitigate some of the many problems of informa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006