Search results

1 – 10 of over 61000
Book part
Publication date: 1 September 2008

Paul Dunne and Fanny Coulomb

Peace, war and international security is an area in which economists are often conspicuous by their absence, to a degree that rivals the importance of economic issues to the…

Abstract

Peace, war and international security is an area in which economists are often conspicuous by their absence, to a degree that rivals the importance of economic issues to the problems at hand. It is getting to the point where the supposed ‘imperialism’ of economics in the social science (Fine, 2001) is reversed and the political scientists, international relations and other such groups exclude the economists and take on the economics themselves. It is not unusual to find studies of post-conflict reconstruction in which economics is surprisingly found to be important. In the case of the World Bank, it came as a great shock to the other social scientists when economists started to argue that economics might have a major role to play in understanding civil wars (Collier et al., 2003). Economists do have the gift of overstatement and a tendency to state unpleasant truths in a clear and precise way that can disturb other social scientists, whose indignation and overreaction reflected this. More recently the debate has reached a more civilised recognition of the complexity of such issues (Arnson & Zartman, 2005; Berdal & Malone, 2000).

Details

War, Peace and Security
Type: Book
ISBN: 978-1-84950-535-2

Article
Publication date: 27 April 2022

Noran Shafik Fouad

The education sector is increasingly targeted by malicious cyber incidents, resulting in huge financial losses, cancelation of classes and exams and large-scale breaches of…

Abstract

Purpose

The education sector is increasingly targeted by malicious cyber incidents, resulting in huge financial losses, cancelation of classes and exams and large-scale breaches of students’ and staff’s data. This paper aims to investigate education technology (EdTech) vendors’ responsibility for this cyber (in)security challenge, with a particular focus on EdTech in India as a case study.

Design/methodology/approach

Theoretically, building on the security economics literature, the paper establishes a link between the dynamics of the EdTech market and the education sector’s cyber insecurities and investigates the various economic barriers that stand in the way of improving EdTech vendors’ security practices. Empirically, the paper analyses publicly reported cyber incidents targeting the Indian education sector and EdTech companies in the past 10 years as published in newspapers, using the LexisNexis database. It also examines existing EdTech procurement challenges in India and elsewhere and develops a number of policy recommendations to address the misaligned incentives and information asymmetries between EdTech vendors and educational institutions.

Findings

Market forces alone cannot create sufficient incentives for EdTech vendors to prioritise security in product design. Considering the infant stage of the EdTech industry, the lack of evidence about the efficacy of EdTech tools, the fragmentation in the EdTech market and the peculiarities of educational institutions as end-users, a regulatorily and policy intervention is needed to secure education through procurement processes.

Originality/value

This paper introduces a novel exploration to the cybersecurity challenge in the education sector, an area of research and policy analysis that remains largely understudied. By adding a cybersecurity angle, the paper also contributes to the literature using a political economy approach in scrutinising EdTech.

Details

Digital Policy, Regulation and Governance, vol. 24 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Book part
Publication date: 1 September 2008

Ron Smith and Jacques Fontanel

Defence economics is often not perceived as a subject, but as a series of questions that arise in the intersection between the spheres of strategy (the art of a general, the…

Abstract

Defence economics is often not perceived as a subject, but as a series of questions that arise in the intersection between the spheres of strategy (the art of a general, the specialist in the use of force) and the sphere of economy (the processes of production, distribution and incentives). This overlap between economics and strategy occurs at the individual, the national and the systemic levels. This intersection or overlap is a contested terrain since economists and strategic studies specialists bring very different presuppositions to the party. Defence economics study take account of the realities of strategy, but the models it brings to the party are those of economists.

Details

War, Peace and Security
Type: Book
ISBN: 978-1-84950-535-2

Book part
Publication date: 20 January 2021

Yao Lixia

Abstract

Details

Energy Security in Times of Economic Transition: Lessons from China
Type: Book
ISBN: 978-1-83982-465-4

Article
Publication date: 8 July 2019

Stale Ekelund and Zilia Iskoujina

The purpose of this paper is to demonstrate how to find the optimal investment level in protecting an organisation’s assets.

1066

Abstract

Purpose

The purpose of this paper is to demonstrate how to find the optimal investment level in protecting an organisation’s assets.

Design/methodology/approach

This study integrates a case study of an international financial organisation with various methods and theories in security economics and mathematics, such as value-at-risk (VaR), Monte Carlo simulation, exponential and Poisson probability distributions. Thereby it combines theory and empirical findings to establish a new approach to determining optimal security investment levels.

Findings

The results indicate that optimal security investment levels can be found through computer simulation with historical incident data to find VaR. By combining various scenarios, the convex graph of the risk cost function has been plotted, where the minimum of the graph represents the optimal invest level for an asset.

Research limitations/implications

The limitations of the research include a modest number of loss observations from one case study, and the use of normal probability distribution. The approach has limitations where there are no historical data available or the data has zero losses. These areas should undergo further research including larger data set of losses and exploring other probability distributions.

Practical implications

The results can be used by leading business practitioners to assist them with decision making on investment to the increased protection of an asset.

Originality/value

The originality of this research is in its new way of combining theories with historical data to create methods to measure theoretical and empirical strength of a control (or set of controls) and translating it to loss probabilities and loss sizes.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 5 October 2012

Andrew Stewart

The purpose of this paper is to investigate the optimality of various strategies for spending on information security. Being able to understand the strengths and weaknesses of…

1036

Abstract

Purpose

The purpose of this paper is to investigate the optimality of various strategies for spending on information security. Being able to understand the strengths and weaknesses of spending strategies is useful to organizations.

Design/methodology/approach

The author's analysis begins with a whole‐systems view of the security spending decision that encompasses people, technology, and economics and a taxonomy of justifications is presented for spending on information security. Each justification within the taxonomy is discussed, with that analysis used to examine the apparent rationality of a number of common spending strategies. A model is constructed that can be used in a practical manner to enable an organization to select a rational approach to spending on information security.

Findings

The author describes two spending strategies intended to be simple and straightforward for an organization to employ in a practical manner. These strategies account for a number of weaknesses in common justifications for spending on information security. They also take into consideration the observation that a number of pressures push companies towards inefficiency in their spending.

Originality/value

When faced with budgeting decisions, managers are bound by fiduciary duty to identify those investments that will maximize shareholder value. As such, decisions about spending must be carefully considered and evaluated in rational economic terms. This paper provides useful thinking on this important topic.

Details

Information Management & Computer Security, vol. 20 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 14 August 2014

Jacques Fontanel and Bénédicte Corvaisier-Drouart

International security is a constant threat to the pursuit of economic optimum. In the traditional economic analysis history, states are seen as agents in constant search for…

Abstract

International security is a constant threat to the pursuit of economic optimum. In the traditional economic analysis history, states are seen as agents in constant search for power, which leads to the emergence of conflicts of interests. The modern concept of security can be defined as the economic study of all the risks of short, medium and long term on the functioning of economic and social life. It can be divided into four sublevels: individual security, national security, international security and global security. The adoption of an enlarged approach to international security by integrating economic and environmental conditions highlights the expression of new collective priorities. Today, theories of security take into account the economic, human and social relationships, societal priorities and the balance of power in the international system. Human security implies a multi-disciplinary analysis, including human rights, state organisation, international relations and strategic studies. Security and sustainable development are deeply interconnected, which involves bearable production conditions for the environment in the long term, the end of extreme poverty, the creation of social stability and the rejection of discrimination.

Details

The Evolving Boundaries of Defence: An Assessment of Recent Shifts in Defence Activities
Type: Book
ISBN: 978-1-78350-965-2

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 1 January 1985

Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to uncover…

16659

Abstract

Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to uncover specific articles devoted to certain topics. This Bibliography is designed to help. Volume III, in addition to the annotated list of articles as the two previous volumes, contains further features to help the reader. Each entry within has been indexed according to the Fifth Edition of the SCIMP/SCAMP Thesaurus and thus provides a full subject index to facilitate rapid information retrieval. Each article has its own unique number and this is used in both the subject and author index. The first Volume of the Bibliography covered seven journals published by MCB University Press. This Volume now indexes 25 journals, indicating the greater depth, coverage and expansion of the subject areas concerned.

Details

Management Decision, vol. 23 no. 1
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 26 August 2020

Rohit Gupta, Baidyanath Biswas, Indranil Biswas and Shib Sankar Sana

This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios…

Abstract

Purpose

This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios, optimal investment of firm, optimal efforts of attackers and their economic utilities are determined.

Design/methodology/approach

Throughout the analysis, a single firm and two attackers for a “firm as a leader” in a sequential game setting and “firm versus attackers” in a simultaneous game setting are considered. While the firm makes investments to secure its information assets, the attackers spend their efforts to launch breaches.

Findings

It is observed that the firm needs to invest more when it announces its security investment decisions ahead of attacks. In contrast, the firm can invest relatively less when all agents are unaware of each other’s choices in advance. Further, the study reveals that attackers need to exert higher effort when no agent enjoys the privilege of being a leader.

Research limitations/implications

In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon – Loeb breach function, with the help of fuzzy expectation operator.

Practical implications

This study reports that the optimal breach effort exerted by each attacker is proportional to its obtained economic benefit for both sequential and simultaneous attack scenarios. A set of numerical experiments and sensitivity analyzes complement the analytical modeling.

Originality/value

In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon – Loeb breach function, with the help of fuzzy expectation operator.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 61000