Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures

نویسندگان

  • Chad Heitzenrater
  • Andrew C. Simpson
چکیده

Empirical analysis within the field of information security economics is fraught with difficulty, primarily due to a lack of data. Over the last three years, the UK Government, through the Department for Business, Innovation & Skills (BIS), has taken a lead in the area of public disclosure on corporate cyber intrusions via their Information Security Breaches Survey. The recent development of the Cyber Essentials scheme by the same department presents a unique opportunity for reasonably correlated data to be analysed against public policy. We describe some initial steps in undertaking such an analysis by performing standard economics calculations on this data. Through the examination of three key questions that are central to the relationship between these documents, economic implications of the existing policy are highlighted against the reported threats. Somewhat inevitably, the results echo the well-worn ‘it depends’ answer to the question of cyber security expenditure need; nevertheless, in doing so, they do point out the dependencies. We aim to provide further insight into the method with a view to helping inform a range of stakeholders: policy-makers; those who make decisions with respect to data disclosures; and those looking to policy to help guide their investment in cyber security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bridging the Gap Between Research and Policy and Practice; Comment on “CIHR Health System Impact Fellows: Reflections on ‘Driving Change’ Within the Health System”

Far too often, there is a gap between research and policy and practice. Too much research is undertaken with little relevance to real life problems or its reported in ways that are obscure and impenetrable. At the same time, many policies are developed and implemented but are untouched by, or even contrary to evidence. An accompanying paper describes an innovative progr...

متن کامل

Good Governance and Virtue in South Africa's Cyber Security Policy Implementation

Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack to their national interests and to prepare for a cyber offence in response to an attack. A discourse analysis of the “0x Omar”-Israeli conflict of 2012, as reported...

متن کامل

Serious, therefore Organised? A Critique of the Emerging “Cyber-Organised Crime” Rhetoric in the United Kingdom

This paper, based on discourse analysis of policy documents, departs from a critique of the juxtaposition of the terms “serious” and “organised” in policies against organised crime in the UK. The conceptualisation of organised crime as national security threat supports our hypothesis that a similar critique can be applied to the emerging narrative of cyber-organised crime in the country. We arg...

متن کامل

Cyber Security in the UK

 Cyber security was one of four top priorities for UK national security in the 2010 National Security Strategy.  Effective approaches to cyber security integrate technological measures with those relating to processes and personnel.  There is no overarching regulation of cyber security in the UK, although a growing number of organisations are complying with voluntary standards.  Better comm...

متن کامل

Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure

Allan Cook Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk allan.cook@ my365.dmu.ac.uk Richard Smith Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Leandros Maglaras Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK www.dmu.ac.uk [email protected] Helge Janicke Cyber Security Cen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Cybersecurity

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2015