A consolidated approach for estimation of data security breach costs

Abdullah M. Algarni, Y. Malaiya
{"title":"A consolidated approach for estimation of data security breach costs","authors":"Abdullah M. Algarni, Y. Malaiya","doi":"10.1109/INFOMAN.2016.7477530","DOIUrl":null,"url":null,"abstract":"Many security breaches have been reported in the past few years impacting both large and small organizations. There has often been considerable disagreement about the overall cost of such breaches. No significant formal studies have yet addressed this issue, though some proprietary approaches exist. A few computational models for evaluating partial data breach costs have been implemented, but these approaches have not been formally compared and have not been systematically optimized. There is a need to develop a more complete and formal model that will minimize redundancy among the factors considered and will confirm with the available data regarding the costs of data breaches. Existing approaches also need to be validated using the data for some of the well documented breaches. It is noted that the existing models yield widely different estimates. The reasons for this variation are examined, and the need for better models is identified.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"4 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Information Management (ICIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOMAN.2016.7477530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

Many security breaches have been reported in the past few years impacting both large and small organizations. There has often been considerable disagreement about the overall cost of such breaches. No significant formal studies have yet addressed this issue, though some proprietary approaches exist. A few computational models for evaluating partial data breach costs have been implemented, but these approaches have not been formally compared and have not been systematically optimized. There is a need to develop a more complete and formal model that will minimize redundancy among the factors considered and will confirm with the available data regarding the costs of data breaches. Existing approaches also need to be validated using the data for some of the well documented breaches. It is noted that the existing models yield widely different estimates. The reasons for this variation are examined, and the need for better models is identified.
用于估计数据安全漏洞成本的综合方法
在过去的几年中,已经报道了许多影响大型和小型组织的安全漏洞。对于此类违规行为的总体成本,往往存在相当大的分歧。尽管存在一些专有方法,但尚未有重要的正式研究解决这个问题。已经实施了一些评估部分数据泄露成本的计算模型,但这些方法尚未进行正式比较,也未进行系统优化。有必要开发一个更完整和正式的模型,以最大限度地减少所考虑因素之间的冗余,并与现有数据确认数据泄露的成本。现有的方法还需要使用一些记录良好的违规行为的数据进行验证。值得注意的是,现有的模型得出的估计差别很大。研究了这种变化的原因,并确定了对更好的模型的需求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信