Learn More
We develop and simulate a dynamic model of investment in information security. The model is based on the recognition that both IT managers and users appreciate the trade-off between two of the fundamental characteristics of information security, namely confidentiality and availability. The model's parameters can be clustered in a manner that allows us to(More)
We develop and simulate a basic mathematical model of the costly deployment of software patches in the presence of trade-offs between confidentiality and availability. The model incorporates representations of the key aspects of the system architecture, the managers' preferences, and the stochastic nature of the threat environment. Using the model, we(More)
This paper addresses the question of determining the optimal timing of interventions in information security management. Using utility theory, we derive the limiting condition under which, given a potential or realized risk, a decision to invest, delay, or abandon can be justified. Our primary focus is on the decision to defer costly deterministic(More)
BACKGROUND Care of children and young people (children) with long-term kidney conditions is usually managed by multidisciplinary teams. Published guidance recommends that whenever possible children with long-term conditions remain at home, meaning parents may be responsible for performing the majority of clinical care-giving. Multidisciplinary team members,(More)
BACKGROUND Limited negotiation around care decisions is believed to undermine collaborative working between parents of children with long-term conditions and professionals, but there is little evidence of how they actually negotiate their respective roles. Using chronic kidney disease as an exemplar this paper reports on a multi-method study of social(More)
At the end of 2009, countries in the Eurozone (euro area) began to experience a sudden divergence of bond yields as the market perception of sovereign default risk increased. The theory of complete markets suggests that sovereign debt and credit default swap (CDS) credit spreads should track each other closely. In addition, liquidity risk should be priced(More)
Security managers face the challenge of formulating and implementing policies that deliver their desired system security postures — for example, their preferred balance of confidentiality, integrity, and availability — within budget (monetary and otherwise). In this paper, we describe a security modelling methodology, grounded in rigorous mathematical(More)