EconPapers    
Economics at your fingertips  
 

Knowing the Enemy at the Gates: Measuring Attacker Motivation

George P. Corser, Suzan Arslanturk, Jared Oluoch, Huirong Fu and George E. Corser
Additional contact information
George P. Corser: Oakland University, Rochester, MI, USA
Suzan Arslanturk: Oakland University, Rochester, MI, USA
Jared Oluoch: Oakland University, Rochester, MI, USA
Huirong Fu: Oakland University, Rochester, MI, USA
George E. Corser: Destination Imagination, Houghton, MI, USA

International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 2013, vol. 5, issue 2, 83-95

Abstract: Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-à-vis two typical network attacks, identity theft and intellectual property theft.

Date: 2013
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jitn.2013040107 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jitn00:v:5:y:2013:i:2:p:83-95

Access Statistics for this article

International Journal of Interdisciplinary Telecommunications and Networking (IJITN) is currently edited by Efosa Carroll Idemudia

More articles in International Journal of Interdisciplinary Telecommunications and Networking (IJITN) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jitn00:v:5:y:2013:i:2:p:83-95