Managing Information Risk and the Economics of Security
M. Eric Johnson
Springer
The lifeblood of the global economy, information has become a source of growing risk as more firms maintain information online. With risks now fueled by sophisticated, organized, malicious groups, information security requires not only technology, but a clear understanding of potential risks, decision-making behaviors, and metrics for evaluating business and policy options. Managing Information Risk and the Economics of Security, an edited volume contributed by well-established researchers in the field worldwide, presents the latest research on economics driving both the risks and the solutions. Covering the implications of policy within firms and across countries, this volume provides managers and policy makers with new thinking on how to manage risk. Managing Information Risk and the Economics of Security is designed for managers, policy makers, and researchers focusing on economics of information security, as well as for advanced-level students in computer science, business management and economics.
[ in PDF format (1,319K) ]
![](../images/HorizontalRule.gif) ![](../images/Information Technology for Development_Book.jpg)
Protecting Critical Information Infrastructure: Developing Cybersecurity Policy
Hans Brechbuhl, Robert Bruce, Scott Dynes
and M. Eric Johnson
Information Technology for Development, Volume 16 No 1, Commonwealth, Spring 2010. This article discusses the elements of successful information security practices and policies at developing countries, based on field studies of information security practices and policies at US firms as well as on literature research. These elements include shared behaviors, persuasive relationships, and trust: we see these as resulting from increased dialog and necessity, not necessarily from any formal governing structure. This article presents a network model of the interactions required for effective cybersecurity and provide guidance to ICT Ministers in developing countries about the multidimensional aspects of cybersecurity policy concerns. [more]
Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain
M. Eric Johnson
Journal of Management Information Systems, Fall 2008.
Firms face many different types of information security risk. Inadvertent disclosure of sensitive business information represents one of the largest classes of recent security breaches. We examine a specific instance of this problem—inadvertent disclosures through peer-to-peer file-sharing networks. We characterize the extent of the security risk for a group of large financial institutions using a direct analysis of leaked documents. We also characterize the threat of loss by examining search patterns in peer-to-peer networks. Our analysis demonstrates both a substantial threat and vulnerability for large financial firms.
[ in PDF format (1,319K) ]
Cyber Security: Are Economic Incentives Adequate?
Scott Dynes, Eric Goetz, and Michael Freeman
Critical Infrastructure Protection, Springer, editors Eric Goetz and Sujeet Shenoi
Protecting national critical infrastructure assets from cyber incidents is an important challenge. This article examines the threats faced by for-profit critical infrastructure entities, the incentives and drivers that influence investment in cyber security measures, and how policy initiatives might influence cyber preparedness in critical infrastructure entities.
[ in PDF format (1,319K) ]
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users
M. Eric Johnson, Dan McGuire, Nicholas Willey
Proceedings of the 41st Hawaii International Conference on System Sciences - 2008
This paper
examines the peer-to-peer file sharing phenomena, including an overview of the industry, its business models, and evolution. The authors describe the information security risks users’ face including personal identification disclosure and leakage of proprietary business information.
[ in PDF format (353K) ]
Ubiquitous Communication: Tracking Technologies within the Supply Chain
M. Eric Johnson
Logistics Engineering Handbook, CRC Press, editor G. D. Taylor
The article examines tracking technologies in the context of a case study of an integration project at a major retailer, focusing on the business case for investment. The case looks at how technologies like Radio Frequency Identification (RFID) and Global Positioning System (GPS) can be used to improve supply chain performance and aid in reducing supply chain shrinkage.
[ in PDF format (323K) ]
Economic Costs of Firm-Level Information Infrastructure Failures
Scott Dynes and M. Eric Johnson
International Journal of Logistics Management, Vol. 18, No. 3, 2007
There is little research on e-business's potential in dealing with dynamic, unpredictable and sometimes sporadic customer demands. This paper presents a method for estimating the macro-economic cost of a firm-level information system disruption within a supply chain.
[ in PDF format (3,900K) ]
Embedding Information Security into the Organization
M. Eric Johnson and Eric Goetz
Security & Privacy Magazine, IEEE, Vol. 5, Issue 3, May-June 2007
Risk and business have always been inseparable, but new information security risks pose unknown challenges. How should firms organize and manage to improve enterprise security? In this article, the authors address how chief information security officers (CISOs) are working to build secure organizations.
[ in PDF format (517K) ]
Dual Sourcing Strategies
M. Eric Johnson
Supply Chain Excellence in Emerging Economies, Springer-Verlag, editors Hau L. Lee and Chung-Yee Lee
This article examines a case study of Mattel and its decision process to add production capacity to a network of both outsourced and Mattel-operated facilities. Set during the Asian financial crisis, the case illustrates: 1) How toy makers manage demand and supply uncertainty; 2) Mattel’s outsourcing strategy in Asia; 3) How Mattel integrates its marketing and supply chain strategy.
[ in PDF format (174K) ]
Building a Distribution System in Eastern Europe
M. Eric Johnson
Supply Chain Excellence in Emerging Economies, Springer-Verlag, editors Hau L. Lee and Chung-Yee Lee
In an environment of changing customer expectations and evolving distribution infrastructure, firms can develop new business models that generate rapid growth. This article examines the organic growth of an office supply firm, Papirius, in Eastern Europe, including major decisions about its growth and the defendability of its markets, and the outcome of those decisions.
[ in PDF format (298K) ]
Looking for a specific article? Visit the Academic Publications List for a table of all of the center's academic publications.
|