Search: onr:"swepub:oai:DiVA.org:kth-11610" >
A Structured Approa...
A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms
-
- Abbas, Haider (author)
- KTH,Elektronik- och datorsystem, ECS
-
Magnusson, Christer (author)
-
Yngström, Louise (author)
-
show more...
-
- Hemani, Ahmed (author)
- KTH,Elektronik- och datorsystem, ECS
-
show less...
-
(creator_code:org_t)
- Wuhan, China, 2010
- 2010
- English.
-
In: IEEE ETCS 2010. - Wuhan, China. ; , s. 149-153
- Related links:
-
https://urn.kb.se/re...
-
show more...
-
https://doi.org/10.1...
-
show less...
Abstract
Subject headings
Close
- Organizations relying on Information Technology for their business processes have to employ various Security Mechanisms (Authentication, Authorization, Hashing, Encryption etc) to achieve their organizational security objectives of data confidentiality, integrity and availability. These security mechanisms except from their intended role of increased security level for this organization may also affect other systems outside the organization in a positive or negative manner called externalities. Externalities emerge in several ways i.e. direct cost, direct benefit, indirect cost and indirect benefit. Organizations barely consider positive externalities although they can be beneficial and the negative externalities that could create vulnerabilities are simply ignored. In this paper, we will present an infrastructure to streamline information security externalities that appear dynamically for an organization
Subject headings
- NATURVETENSKAP -- Data- och informationsvetenskap (hsv//swe)
- NATURAL SCIENCES -- Computer and Information Sciences (hsv//eng)
Keyword
- Information security externalities
- Options theory
- Information technology
- Informationsteknik
Publication and Content Type
- ref (subject category)
- kon (subject category)
To the university's database