- Full text PDF available (3)
This paper proposes an analysis framework and model for estimating the impact of information security breach episodes. Previous methods either lack empirical grounding or are not sufficiently rigorous, general or flexible. There has also been no consistent model that serves theoretical and empirical research, and also professional practice. The proposed… (More)
This is an extended abstract of the presentation of the same title for the Cyber Security and Information Intelligence Research Workshop, 2009.
Information security is often called an 'arms race', but little is known about the co-evolutionary dynamics of innovation. To facilitate such research, we define two formal methods that can be executed by computational agents in a multi-agent system. First, we formalize the definition of capabilities and business models as a 'viable system'. We generalize… (More)