Knowing the Enemy at the Gates : Measuring Attacker Motivation
Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness...
Ausführliche Beschreibung
Autor*in: |
Corser, George P. [verfasserIn] Arslanturk, Suzan [verfasserIn] Oluoch, Jared [verfasserIn] Fu, Huirong [verfasserIn] Corser, George E. [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2013 |
---|
Umfang: |
1 Online-Ressource |
---|
Übergeordnetes Werk: |
Enthalten in: International journal of interdisciplinary telecommunications and networking - Hershey, Pa : IGI Global, 2009, 5(2013), 2, Seite 83-95 |
---|---|
Übergeordnetes Werk: |
volume:5 ; year:2013 ; number:2 ; pages:83-95 |
Links: |
---|
DOI / URN: |
10.4018/jitn.2013040107 |
---|
Katalog-ID: |
NLEJ251815072 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | NLEJ251815072 | ||
003 | DE-627 | ||
005 | 20231205143932.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231128s2013 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.4018/jitn.2013040107 |2 doi | |
035 | |a (DE-627)NLEJ251815072 | ||
035 | |a (VZGNL)10.4018/jitn.2013040107 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Corser, George P. |e verfasserin |4 aut | |
245 | 1 | 0 | |a Knowing the Enemy at the Gates |b Measuring Attacker Motivation |
264 | 1 | |c 2013 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft | ||
653 | |a Copyright Infringement |a Cost-Benefit Analysis (CBA) |a Cyber Crime |a Identity Theft |a Information Security |a Intellectual Property Theft |a Network Security | ||
700 | 1 | |a Arslanturk, Suzan |e verfasserin |4 aut | |
700 | 1 | |a Oluoch, Jared |e verfasserin |4 aut | |
700 | 1 | |a Fu, Huirong |e verfasserin |4 aut | |
700 | 1 | |a Corser, George E. |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t International journal of interdisciplinary telecommunications and networking |d Hershey, Pa : IGI Global, 2009 |g 5(2013), 2, Seite 83-95 |h Online-Ressource |w (DE-627)NLEJ244419213 |w (DE-600)2703420-3 |x 1941-8671 |7 nnns |
773 | 1 | 8 | |g volume:5 |g year:2013 |g number:2 |g pages:83-95 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107 |m X:IGIG |x Verlag |z Deutschlandweit zugänglich |
856 | 4 | 2 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true |3 Abstract |
912 | |a ZDB-1-GIS | ||
912 | |a GBV_NL_ARTICLE | ||
951 | |a AR | ||
952 | |d 5 |j 2013 |e 2 |h 83-95 |
author_variant |
g p c gp gpc s a sa j o jo h f hf g e c ge gec |
---|---|
matchkey_str |
article:19418671:2013----::nwntenmat |
hierarchy_sort_str |
2013 |
publishDate |
2013 |
allfields |
10.4018/jitn.2013040107 doi (DE-627)NLEJ251815072 (VZGNL)10.4018/jitn.2013040107 DE-627 ger DE-627 rakwb eng Corser, George P. verfasserin aut Knowing the Enemy at the Gates Measuring Attacker Motivation 2013 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft Copyright Infringement Cost-Benefit Analysis (CBA) Cyber Crime Identity Theft Information Security Intellectual Property Theft Network Security Arslanturk, Suzan verfasserin aut Oluoch, Jared verfasserin aut Fu, Huirong verfasserin aut Corser, George E. verfasserin aut Enthalten in International journal of interdisciplinary telecommunications and networking Hershey, Pa : IGI Global, 2009 5(2013), 2, Seite 83-95 Online-Ressource (DE-627)NLEJ244419213 (DE-600)2703420-3 1941-8671 nnns volume:5 year:2013 number:2 pages:83-95 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 5 2013 2 83-95 |
spelling |
10.4018/jitn.2013040107 doi (DE-627)NLEJ251815072 (VZGNL)10.4018/jitn.2013040107 DE-627 ger DE-627 rakwb eng Corser, George P. verfasserin aut Knowing the Enemy at the Gates Measuring Attacker Motivation 2013 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft Copyright Infringement Cost-Benefit Analysis (CBA) Cyber Crime Identity Theft Information Security Intellectual Property Theft Network Security Arslanturk, Suzan verfasserin aut Oluoch, Jared verfasserin aut Fu, Huirong verfasserin aut Corser, George E. verfasserin aut Enthalten in International journal of interdisciplinary telecommunications and networking Hershey, Pa : IGI Global, 2009 5(2013), 2, Seite 83-95 Online-Ressource (DE-627)NLEJ244419213 (DE-600)2703420-3 1941-8671 nnns volume:5 year:2013 number:2 pages:83-95 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 5 2013 2 83-95 |
allfields_unstemmed |
10.4018/jitn.2013040107 doi (DE-627)NLEJ251815072 (VZGNL)10.4018/jitn.2013040107 DE-627 ger DE-627 rakwb eng Corser, George P. verfasserin aut Knowing the Enemy at the Gates Measuring Attacker Motivation 2013 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft Copyright Infringement Cost-Benefit Analysis (CBA) Cyber Crime Identity Theft Information Security Intellectual Property Theft Network Security Arslanturk, Suzan verfasserin aut Oluoch, Jared verfasserin aut Fu, Huirong verfasserin aut Corser, George E. verfasserin aut Enthalten in International journal of interdisciplinary telecommunications and networking Hershey, Pa : IGI Global, 2009 5(2013), 2, Seite 83-95 Online-Ressource (DE-627)NLEJ244419213 (DE-600)2703420-3 1941-8671 nnns volume:5 year:2013 number:2 pages:83-95 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 5 2013 2 83-95 |
allfieldsGer |
10.4018/jitn.2013040107 doi (DE-627)NLEJ251815072 (VZGNL)10.4018/jitn.2013040107 DE-627 ger DE-627 rakwb eng Corser, George P. verfasserin aut Knowing the Enemy at the Gates Measuring Attacker Motivation 2013 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft Copyright Infringement Cost-Benefit Analysis (CBA) Cyber Crime Identity Theft Information Security Intellectual Property Theft Network Security Arslanturk, Suzan verfasserin aut Oluoch, Jared verfasserin aut Fu, Huirong verfasserin aut Corser, George E. verfasserin aut Enthalten in International journal of interdisciplinary telecommunications and networking Hershey, Pa : IGI Global, 2009 5(2013), 2, Seite 83-95 Online-Ressource (DE-627)NLEJ244419213 (DE-600)2703420-3 1941-8671 nnns volume:5 year:2013 number:2 pages:83-95 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 5 2013 2 83-95 |
allfieldsSound |
10.4018/jitn.2013040107 doi (DE-627)NLEJ251815072 (VZGNL)10.4018/jitn.2013040107 DE-627 ger DE-627 rakwb eng Corser, George P. verfasserin aut Knowing the Enemy at the Gates Measuring Attacker Motivation 2013 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft Copyright Infringement Cost-Benefit Analysis (CBA) Cyber Crime Identity Theft Information Security Intellectual Property Theft Network Security Arslanturk, Suzan verfasserin aut Oluoch, Jared verfasserin aut Fu, Huirong verfasserin aut Corser, George E. verfasserin aut Enthalten in International journal of interdisciplinary telecommunications and networking Hershey, Pa : IGI Global, 2009 5(2013), 2, Seite 83-95 Online-Ressource (DE-627)NLEJ244419213 (DE-600)2703420-3 1941-8671 nnns volume:5 year:2013 number:2 pages:83-95 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107 X:IGIG Verlag Deutschlandweit zugänglich http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true Abstract ZDB-1-GIS GBV_NL_ARTICLE AR 5 2013 2 83-95 |
language |
English |
source |
Enthalten in International journal of interdisciplinary telecommunications and networking 5(2013), 2, Seite 83-95 volume:5 year:2013 number:2 pages:83-95 |
sourceStr |
Enthalten in International journal of interdisciplinary telecommunications and networking 5(2013), 2, Seite 83-95 volume:5 year:2013 number:2 pages:83-95 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Copyright Infringement Cost-Benefit Analysis (CBA) Cyber Crime Identity Theft Information Security Intellectual Property Theft Network Security |
isfreeaccess_bool |
false |
container_title |
International journal of interdisciplinary telecommunications and networking |
authorswithroles_txt_mv |
Corser, George P. @@aut@@ Arslanturk, Suzan @@aut@@ Oluoch, Jared @@aut@@ Fu, Huirong @@aut@@ Corser, George E. @@aut@@ |
publishDateDaySort_date |
2013-01-01T00:00:00Z |
hierarchy_top_id |
NLEJ244419213 |
id |
NLEJ251815072 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">NLEJ251815072</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20231205143932.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231128s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/jitn.2013040107</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)NLEJ251815072</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(VZGNL)10.4018/jitn.2013040107</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Corser, George P.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Knowing the Enemy at the Gates</subfield><subfield code="b">Measuring Attacker Motivation</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Copyright Infringement</subfield><subfield code="a">Cost-Benefit Analysis (CBA)</subfield><subfield code="a">Cyber Crime</subfield><subfield code="a">Identity Theft</subfield><subfield code="a">Information Security</subfield><subfield code="a">Intellectual Property Theft</subfield><subfield code="a">Network Security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arslanturk, Suzan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oluoch, Jared</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fu, Huirong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Corser, George E.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International journal of interdisciplinary telecommunications and networking</subfield><subfield code="d">Hershey, Pa : IGI Global, 2009</subfield><subfield code="g">5(2013), 2, Seite 83-95</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)NLEJ244419213</subfield><subfield code="w">(DE-600)2703420-3</subfield><subfield code="x">1941-8671</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:5</subfield><subfield code="g">year:2013</subfield><subfield code="g">number:2</subfield><subfield code="g">pages:83-95</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107</subfield><subfield code="m">X:IGIG</subfield><subfield code="x">Verlag</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-GIS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_NL_ARTICLE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">5</subfield><subfield code="j">2013</subfield><subfield code="e">2</subfield><subfield code="h">83-95</subfield></datafield></record></collection>
|
author |
Corser, George P. |
spellingShingle |
Corser, George P. misc Copyright Infringement Knowing the Enemy at the Gates Measuring Attacker Motivation |
authorStr |
Corser, George P. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)NLEJ244419213 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut |
collection |
NL |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1941-8671 |
topic_title |
Knowing the Enemy at the Gates Measuring Attacker Motivation |
topic |
misc Copyright Infringement |
topic_unstemmed |
misc Copyright Infringement |
topic_browse |
misc Copyright Infringement |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
International journal of interdisciplinary telecommunications and networking |
hierarchy_parent_id |
NLEJ244419213 |
hierarchy_top_title |
International journal of interdisciplinary telecommunications and networking |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)NLEJ244419213 (DE-600)2703420-3 |
title |
Knowing the Enemy at the Gates Measuring Attacker Motivation |
ctrlnum |
(DE-627)NLEJ251815072 (VZGNL)10.4018/jitn.2013040107 |
title_full |
Knowing the Enemy at the Gates Measuring Attacker Motivation |
author_sort |
Corser, George P. |
journal |
International journal of interdisciplinary telecommunications and networking |
journalStr |
International journal of interdisciplinary telecommunications and networking |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2013 |
contenttype_str_mv |
txt |
container_start_page |
83 |
author_browse |
Corser, George P. Arslanturk, Suzan Oluoch, Jared Fu, Huirong Corser, George E. |
container_volume |
5 |
physical |
1 Online-Ressource |
format_se |
Elektronische Aufsätze |
author-letter |
Corser, George P. |
title_sub |
Measuring Attacker Motivation |
doi_str_mv |
10.4018/jitn.2013040107 |
author2-role |
verfasserin |
title_sort |
knowing the enemy at the gatesmeasuring attacker motivation |
title_auth |
Knowing the Enemy at the Gates Measuring Attacker Motivation |
abstract |
Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft |
abstractGer |
Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft |
abstract_unstemmed |
Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft |
collection_details |
ZDB-1-GIS GBV_NL_ARTICLE |
container_issue |
2 |
title_short |
Knowing the Enemy at the Gates |
url |
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true |
remote_bool |
true |
author2 |
Arslanturk, Suzan Oluoch, Jared Fu, Huirong Corser, George E. |
author2Str |
Arslanturk, Suzan Oluoch, Jared Fu, Huirong Corser, George E. |
ppnlink |
NLEJ244419213 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.4018/jitn.2013040107 |
up_date |
2024-07-06T11:40:56.988Z |
_version_ |
1803829700974346240 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">NLEJ251815072</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20231205143932.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231128s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/jitn.2013040107</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)NLEJ251815072</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(VZGNL)10.4018/jitn.2013040107</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Corser, George P.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Knowing the Enemy at the Gates</subfield><subfield code="b">Measuring Attacker Motivation</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-a§-vis two typical network attacks, identity theft and intellectual property theft</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Copyright Infringement</subfield><subfield code="a">Cost-Benefit Analysis (CBA)</subfield><subfield code="a">Cyber Crime</subfield><subfield code="a">Identity Theft</subfield><subfield code="a">Information Security</subfield><subfield code="a">Intellectual Property Theft</subfield><subfield code="a">Network Security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arslanturk, Suzan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oluoch, Jared</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fu, Huirong</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Corser, George E.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International journal of interdisciplinary telecommunications and networking</subfield><subfield code="d">Hershey, Pa : IGI Global, 2009</subfield><subfield code="g">5(2013), 2, Seite 83-95</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)NLEJ244419213</subfield><subfield code="w">(DE-600)2703420-3</subfield><subfield code="x">1941-8671</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:5</subfield><subfield code="g">year:2013</subfield><subfield code="g">number:2</subfield><subfield code="g">pages:83-95</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107</subfield><subfield code="m">X:IGIG</subfield><subfield code="x">Verlag</subfield><subfield code="z">Deutschlandweit zugänglich</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jitn.2013040107&buylink=true</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-GIS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_NL_ARTICLE</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">5</subfield><subfield code="j">2013</subfield><subfield code="e">2</subfield><subfield code="h">83-95</subfield></datafield></record></collection>
|
score |
7.399393 |