Proper Incentives for Proper IT Security Management - A System Dynamics Approach

نویسندگان

  • Jose J. Gonzalez
  • Denis Trcek
چکیده

It has been known for many years that security failures are caused at least as often by bad incentives as by bad design. However, the regulatory correction of bad incentives is not easy in practice and it is still lacking. In the meantime, system dynamics models of security systems can improve the situation by increasing the awareness that misaligned incentives can backfire as long-term consequences of security failures hit back the principal. We illustrate our argument using system archetypes and concept simulation models revealing the impact of two different security strategies, viz. misaligned incentives (the customer having the burden of proof in case of alleged fraud) vs the bank having the burden of proof. From this we argue that online system dynamics could be used in eGovernment to educate principals and the public. Also, legal measures could become more effective when supported with forensic evidence from simulation models.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamics of a Single Point Mooring Marine Aquaculture Cage as a Simple Vibrating System

The increasing world demand for fish cannot be met by capture fisheries. Aquaculture production is increasing and nowadays cage culture has an important role in meeting the world’s fish demand. The design of the physical structure of a cage is determined by the oceanographic conditions of the culture site. Each design is site-specific and knowledge of the topography, wind force and direct...

متن کامل

The effect of developing the dynamics of library software system on information security management (Case study: Libraries of Islamic Azad universities of the country)

Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose   is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Uni...

متن کامل

Core Security Requirements of DRM Systems

The use of Digital Rights Management (DRM) systems involves several stakeholders, such as the content provider, the license provider and the user, each having their own incentives to use the system. Proper use of the system implies that these incentives can only be met if certain security requirements are fulfilled. Quite some attention in literature has been devoted to specific security aspect...

متن کامل

Proposing Dynamic Model of Functional Interactions of IoT Technological Innovation System by Using System Dynamics and Fuzzy DEMATEL

One of the emerging technologies, which is expected to have tremendous effects on community development, is the Internet of Things technology. Given the prospects for this technology and the countrychr('39')s efforts to its development, policymaking for this technology is very crucial. The technological innovation system is one of the most important dynamic approaches in the field of modern tec...

متن کامل

Tire Inflation Pressure Estimation Using Identification Techniques

In this research study, one of the most crucial automotive engineering problems is intended to be solved. The necessity of tire pressure monitoring system is beyond doubt. Such systems are now provided relying on expensive sensors. In this study an indirect tire pressure monitoring system is proposed, utilizing identification techniques, which will reduce the cost of monitoring considerably in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017