Title :
A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms
Author :
Abbas, Haider ; Magnusson, Christer ; Yngstrom, Louise ; Hemani, Ahmed
Author_Institution :
Electron., Comput. & Software Syst., R. Inst. of Technol., Stockholm, Sweden
Abstract :
Organizations relying on Information Technology for their business processes have to employ various Security Mechanisms (Authentication, Authorization, Hashing, Encryption etc) to achieve their organizational security objectives of data confidentiality, integrity and availability. These security mechanisms except from their intended role of increased security level for this organization may also affect other systems outside the organization in a positive or negative manner called externalities. Externalities emerge in several ways i. e. direct cost, direct benefit, indirect cost and indirect benefit. Organizations barely consider positive externalities although they can be beneficial and the negative externalities that could create vulnerabilities are simply ignored. In this paper, we will present an infrastructure to streamline information security externalities that appear dynamically for an organization.
Keywords :
cryptography; IT security mechanisms; authentication; authorization; business processes; data availability; data confidentiality; data integrity; encryption; hashing; information technology; streamline information security; Authentication; Communication channels; Computer security; Costs; Data security; Educational technology; Information analysis; Information security; Software systems; Uncertainty; Information Security Externalities; Options Theory;
Conference_Titel :
Education Technology and Computer Science (ETCS), 2010 Second International Workshop on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-6388-6
Electronic_ISBN :
978-1-4244-6389-3
DOI :
10.1109/ETCS.2010.493