Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms
KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.ORCID iD: 0000-0003-0565-9376
2010 (English)In: IEEE ETCS 2010, Wuhan, China, 2010, 149-153 p.Conference paper, Published paper (Refereed)
Abstract [en]

Organizations relying on Information Technology for their business processes have to employ various Security Mechanisms (Authentication, Authorization, Hashing, Encryption etc) to achieve their organizational security objectives of data confidentiality, integrity and availability. These security mechanisms except from their intended role of increased security level for this organization may also affect other systems outside the organization in a positive or negative manner called externalities. Externalities emerge in several ways i.e. direct cost, direct benefit, indirect cost and indirect benefit. Organizations barely consider positive externalities although they can be beneficial and the negative externalities that could create vulnerabilities are simply ignored. In this paper, we will present an infrastructure to streamline information security externalities that appear dynamically for an organization

Place, publisher, year, edition, pages
Wuhan, China, 2010. 149-153 p.
Keyword [en]
Information security externalities, Options theory
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:kth:diva-11610DOI: 10.1109/ETCS.2010.493Scopus ID: 2-s2.0-77953188587OAI: oai:DiVA.org:kth-11610DiVA: diva2:278281
Conference
2nd International Workshop on Education Technology and Computer Science, ETCS 2010, Wuhan, Hubei, 6 March 2010 through 7 March 2010
Note
QC 20110215Available from: 2009-11-25 Created: 2009-11-25 Last updated: 2011-02-15Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Authority records BETA

Hemani, Ahmed

Search in DiVA

By author/editor
Abbas, HaiderHemani, Ahmed
By organisation
Electronic, Computer and Software Systems, ECS
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 227 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf