We develop and simulate a dynamic model of investment in information security. The model is based oil the recognition that both IT managers and users appreciate the trade-off between two of the fundamental characteristics of information security, namely confidentiality and availability. The model's parameters can be clustered in a manner that allows us to categorize and compare the responses to shocks of various types of organizations. We derive the system's stability conditions and find that they admit a wide choice of parameters. We examine tire system's responses to the same shock in confidentiality under different parameter constellations that correspond to various types of organizations. Our analysis illustrates that the response to investments in information security will be uniform in neither size nor time evolution.
|Name||Lecture Notes in Computer Science|
|Conference||13th International Conference on Financial Cryptography and Data Security|
|Period||1/07/09 → …|