1,187,137 research outputs found

    Health Information and Social Security Entitlements

    Get PDF
    This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition Examination Survey. To examine the effect of information on entitlements, the survey data are matched to administrative data from the Social Security Administration. The results suggest that new health information leads to delayed entitlements, particularly among workers near the early retirement age

    Survey on economics of information security

    Get PDF
    Economics of information security has recently become a rapidly growing field of research that is vitally important for managing the decisions and behaviors in cyberspace security. This field provides valuable insights not only for security experts, but also for policy makers, business managers, economists and psychologists.In this paper, we are going to discuss the emergence and evolution of economics of information security; where it came from, where it is today and its future directions. Research conducted for this survey explores the literature on economic issues in information security and review the advantages, drawbacks, and future research directions to set the scene that the assessment and analysis of the economics of information security publications followed it. Furthermore, we provide a structured discussion and overview of selected sets of works and highlight the models and theories in this field by organizing the presented works into six main categories namely information security investment, trust and privacy, network security, malicious program and malware economics, penetration testing and digital forensics and software security. Additionally, this survey aims to familiarize readers with major areas of this field already in hand to indicate the gaps and overlooked issues in the economics of security

    Perceived risk and sensitive data on mobile devices

    Get PDF
    This paper reports on a survey to investigate the behaviour and assumptions of smartphone users, with reference to the security practices adopted by such users. The primary objective was to shed light on the level of information security awareness in smartphone users and determine the extent of sensitive information such users typically hold on these mobile devices

    Airports at Risk: The Impact of Information Sources on Security Decisions

    Get PDF
    Security decisions in high risk organizations such as airports involve obtaining ongoing and frequent information about potential threats. Utilizing questionnaire survey data from a sample of airport employees in European Airports across the continent, we analyzed how both formal and informal sources of security information affect employee's decisions to comply with the security rules and directives. This led us to trace information network flows to assess its impact on the degree employees making security decisions comply or deviate with the prescribed security rules. The results of the multivariate analysis showed that security information obtained through formal and informal networks differentially determine if employee will comply or not with the rules. Information sources emanating from the informal network tends to encourage employees to be more flexible in their security decisions while formal sources lead to be more rigid with complying with rules and protocols. These results suggest that alongside the formal administrative structure of airports, there exists a diverse and pervasiveness set of informal communications networks that are a potent factor in determining airport security levels

    A New Theory of Communication: Privacy Surrender for Security Theory

    Get PDF
    This thesis seeks to analyze the viability of a newly proposed theory of communication, Privacy Surrender for Security Theory (PSST), by analyzing a quantitative survey administered by the researcher. Proposed in 2018 by a team of undergraduate students, Privacy Surrender for Security Theory seeks to explain why American citizens are willing to surrender their personal privacy rights for the sake of national security. The original team of researchers prepared a survey to further their study, and the researcher chose to administer a revised version of that survey through Facebook and a group message. Most participants surveyed said knowing that the National Security Administration has surveillance programs in place made them feel safer, yet when asked if knowing that the National Security Administration could access their personal information made them feel violated, many agreed. The survey data reveals that American citizens generally agree that the nation is vulnerable to acts of terror, yet the data also reveals that Americans are divided on their feelings on surrendering their personal privacy rights for the sake of increasing national security. An analysis of the data reveals evidence that supports the third axiom of the proposed theory, and further research is suggested to continue analyzing the first two axioms of PSST

    A Survey of Interdependent Information Security Games

    Get PDF
    Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and users is a fundamental property that shapes the efficiency of security defense solutions. Game theory is the most appropriate method to model the strategic interactions between these participants. In this survey, we summarize game-theoretic interdependence models, characterize the emerging security inefficiencies, and present mechanisms to improve the security decisions of the participants. We focus our attention on games with interdependent defenders and do not discuss two-player attackerdefender games. Our goal is to distill the main insights from the state-of-the-art and to identify the areas that need more attention from the research community

    A Survey of Interdependent Information Security Games

    Get PDF

    Survey of information security risk management models

    Get PDF
    Information security in a current and urgent issue for government and industry with the increasing frequency of cyber security breaches that have occurred in terms of hacking and information theft. To address such issues several approaches have been and continue to be devised to keep abreast with the advances in technology and the skills of those intending harm. To manage the risk inherent in information security several strategies and frameworks are explored. There have been three generations of security risk management strategies as well as governing standards and processes that have been put into place with varying success. Additionally, three security risk management frameworks are analyzed in terms of their effectiveness, policy and legislative relevance and alignment to security and control processes
    corecore