243,959 research outputs found

    A methodology for cost-benefit analysis of information security technologies

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Although information security technologies (such as digital rights management products) has been proven effective and successful in protecting the confidentiality of sensitive information by providing access control, these technologies have not been widely adopted and used to their potential. One reason for this could be that cost and benefit of these products have not been analysed in a systematic and quantitative manner to date. As a result, companies do not have an established procedure to evaluate the cost and benefit of implementing these products. In this document, the benefits of implementing a digital rights management product in enterprises are quantified using stochastic Petri nets models and are compared with the security needs of a corporation and potential costs incurred by the implementation process. An evaluating procedure for implementing these products is established. This procedure has the potential to be used to improve the ability of a corporation to make sensible security investment decisions

    Measuring attitude towards personal data for adaptive cybersecurity

    Get PDF
    Purpose: This paper presents an initial development of a Personal Data Attitude (PDA) measurement instrument based on established psychometric principles. The aim of the research was to develop a reliable measurement scale for quantifying and comparing attitudes towards personal data that can be incorporated into cybersecurity behavioral research models. Such a scale has become necessary for understanding individualsā€™ attitudes towards specific sets of data as more technologies are being designed to harvest, collate, share and analyze personal data. Design/methodology/approach: An initial set of 34 five-point Likert style items were developed with 8 sub-scales and administered to participants online. The data collected were subjected to Exploratory and Confirmatory factor analysis and some MANOVA. The results are consistent with multi-dimensionality of attitude theories and suggest the adopted methodology for the study is appropriate for future research with a more representative sample. Findings: Factor analysis of 247 responses identified 6 constructs of individualsā€™ attitude towards personal data: Protective Behavior, Privacy Concerns, Cost-Benefit, Awareness, Responsibility and Security. This paper illustrates how the PDA scale can be a useful guide for information security research and design by briefly discussing the factor structure of the PDA and related results. Originality/value: This study addresses a genuine gap in the research by taking the first step towards establishing empirical evidence for dimensions underlying personal data attitudes. It also adds a significant benchmark to a growing body of literature on understanding and modelling computer usersā€™ security behaviors

    An Overview of Economic Approaches to Information Security Management

    Get PDF
    The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in information security. However, the largest body of research related to preventing breaches is technical, focusing on such issues as encryption and access control. In contrast, research related to the economic aspects of information security is small but rapidly growing. The goal of this technical note is twofold: i) to provide the reader with an structured overview of the economic approaches to information security and ii) to identify potential research directions

    Is small beautiful? A multicriteria assessment of small-scale energy technology applications in local governments

    Get PDF
    In its 2003 White Paper the UK government set ambitious renewable energy targets. Local governments and households have an increasing role in the overall energy system as consumers, suppliers of smaller-scale applications and citizens discussing energy projects. In this paper, we consider if small-scale or large-scale approaches to renewable energy provision can achieve energy targets in the most socially, economically and environmentally (SEE) effective way. We take a local case study of renewable energy provision in the Metropolitan Borough of Kirklees in Yorkshire, UK, and apply a multi-criteria decision analysis methodology to compare the small-scale schemes implemented in Kirklees with large-scale alternatives. The results indicate that small-scale schemes are the most SEE effective, despite large-scale schemes being more financially viable. The selection of the criteria on which the alternatives are assessed and the assigned weights for each criterion are of crucial importance. It is thus very important to include the relevant stakeholders to elicit this information

    A Smart Modular Wireless System for Condition Monitoring Data Acquisition

    Get PDF
    Smart sensors, big data, the cloud and distributed data processing are some of the most interning changes in the way we collect, manage and treat data in recent years. These changes have not significantly influenced the common practices in condition monitoring for shipping. In part this is due to the reduced trust in data security, data ownership issues, lack of technological integration and obscurity of direct benefit. This paper presents a method of incorporating smart sensor techniques and distributed processing in data acquisition for condition monitoring to assist decision support for maintenance actions addressing these inhibitors
    • ā€¦
    corecore