Security Decision-Making among Interdependent Organizations

@article{MiuraKo2008SecurityDA,
  title={Security Decision-Making among Interdependent Organizations},
  author={Reiko Ann Miura-Ko and Benjamin Yolken and John Mitchell and Nicholas Bambos},
  journal={2008 21st IEEE Computer Security Foundations Symposium},
  year={2008},
  pages={66-80}
}
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the security of another. We develop a model for security decision-making in such settings, using a variation of linear influence networks. The linear influence model uses a matrix to represent linear dependence between security investment at one organization and resulting security at another, and utility functions to measure… CONTINUE READING
Highly Cited
This paper has 83 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 37 extracted citations

A Survey of Interdependent Information Security Games

ACM Comput. Surv. • 2014
View 40 Excerpts
Method Support
Highly Influenced

Applications of group testing to security decision-making in networks

2017 IEEE 56th Annual Conference on Decision and Control (CDC) • 2017
View 6 Excerpts
Highly Influenced

Provision of Public Goods on Networks: On Existence, Uniqueness, and Centralities

IEEE Transactions on Network Science and Engineering • 2018
View 9 Excerpts
Highly Influenced

Exit equilibrium: Towards understanding voluntary participation in security games

IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications • 2016
View 4 Excerpts
Highly Influenced

Opting Out of Incentive Mechanisms: A Study of Security as a Non-Excludable Public Good

IEEE Transactions on Information Forensics and Security • 2016
View 4 Excerpts
Highly Influenced

Provision of non-excludable public goods on networks: From equilibrium to centrality measures

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) • 2015
View 4 Excerpts
Highly Influenced

Cyber Insurance

ArXiv • 2018
View 1 Excerpt

83 Citations

01020'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 83 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Equilibria and free riding in linear influence

Nicholas Bambos Benjamin Yolken, R. Ann Miura- Ko
2007
View 4 Excerpts
Highly Influenced

Moderate interactions in games with induced complementarities

Coralio Ballester, Antoni Calvo-Armengol
2007
View 3 Excerpts

How to hack a quarter of all japanese web user accounts

Ken Y-N
What Japan Thinks http: //whatjapanthinks.com/2006/08/08/ how-to-hack-a-quarter-of-all-japanese-web-users- • 2006
View 1 Excerpt

System Reliability and Free Riding

Economics of Information Security • 2004
View 1 Excerpt