Knowing the Enemy at the Gates: Measuring Attacker Motivation
George P. Corser,
Suzan Arslanturk,
Jared Oluoch,
Huirong Fu and
George E. Corser
Additional contact information
George P. Corser: Oakland University, Rochester, MI, USA
Suzan Arslanturk: Oakland University, Rochester, MI, USA
Jared Oluoch: Oakland University, Rochester, MI, USA
Huirong Fu: Oakland University, Rochester, MI, USA
George E. Corser: Destination Imagination, Houghton, MI, USA
International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 2013, vol. 5, issue 2, 83-95
Abstract:
Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-à-vis two typical network attacks, identity theft and intellectual property theft.
Date: 2013
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jitn.2013040107 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jitn00:v:5:y:2013:i:2:p:83-95
Access Statistics for this article
International Journal of Interdisciplinary Telecommunications and Networking (IJITN) is currently edited by Efosa Carroll Idemudia
More articles in International Journal of Interdisciplinary Telecommunications and Networking (IJITN) from IGI Global
Bibliographic data for series maintained by Journal Editor ().