Showing 1 - 10 of 2,987
Persistent link: https://www.econbiz.de/10008986773
One of the most difficult issues in cyber conflict is the application of territorial sovereignty and other geographic principles to an activity that defies the traditional notions of borders. The structure of the internet and the protocols by which it operates, including the inability to direct...
Persistent link: https://www.econbiz.de/10014176032
Persistent link: https://www.econbiz.de/10011455476
This article argues that the costs of credit monitoring should be recoverable in cybersecurity tort litigation. If a data subject's personal information has been seriously exposed to improper access by a data possessor's negligence, expenses incurred to detect the opening of unauthorized...
Persistent link: https://www.econbiz.de/10013065445
We examine a potential path to value-creation by cybersecurity investments: a reduction in a firm's cost of capital. Building on the existing literature on corporate finance, we suggest that given the business-ending threats of cybersecurity incidents and the importance of cybersecurity...
Persistent link: https://www.econbiz.de/10012839647
This paper presents mathematical models for cyber breach probability as function of security spending in protecting a firm's ICT systems. We derive optimal level of security investment as percentage of value-at-risk. We show that the upper bound of optimal investment can be 1/e, 1/√2π or...
Persistent link: https://www.econbiz.de/10012950989
Managerial flexibility, or real options, embedded in IT investments allows resolving uncertainty not only by passively waiting for new information to arrive during deferral but also by proactively deploying mitigations. Classic real options models fail to account for the value of proactive...
Persistent link: https://www.econbiz.de/10012957732
In this approach, we used multiple random information from the set theory to understand the proportional of information leaks if any threats happen. In this environment, we try to propose a hybrid architecture, which is a combination of convolutional neural network and decision based neural...
Persistent link: https://www.econbiz.de/10012894949
Cybersecurity breaches may be correlated due to geography, similar infrastructure, or use of a third-party contractor. We show how a copula model may be used to estimate the probability of an attack where breaches may be correlated among firms. Losses arising from cybersecurity breaches have an...
Persistent link: https://www.econbiz.de/10012898409
Cyberattacks present existential challenges for U.S. national security and economic interests, yet Congress has failed to adopt a comprehensive regulatory framework to secure private-sector information and systems. To fill that gap, state legislatures have passed many laws that regulate data...
Persistent link: https://www.econbiz.de/10012898435