Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
column
Free access

Designing user incentives for cybersecurity

Published: 27 October 2014 Publication History

Abstract

How to encourage better user security practices and behavior

References

[1]
Anderson, R. and Moore, T. The economics of information security. Science 314, (2006), 610--613.
[2]
August, T. and Tunca, T. Network software security and user incentives. Management Science 52 (2006), 1703--1720.
[3]
August, T. and Tunca, T. Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Science 57 (2011), 934--959.
[4]
Department of Defense, Department of Defense Strategy for Operating in Cyberspace (2011); http://www.defense.gov/news/d20110714cyber.pdf.
[5]
Espiner, T. EC wants software makers held liable for code. ZDNet (2009).
[6]
Heckman, C. Two views on security software liability: Using the right legal tools. IEEE Security & Privacy 1, (2003), 73--75.
[7]
Moore, D., Shannon, C., and Brown, J. Code-Red: A case study on the spread and victims of an Internet worm. In Proceedings of the ACM SIGCOMM/USENIX Internet Measurement Workshop (2002), 273--284.
[8]
National Science Foundation. Secure and Trustworthy Cyberspace (SaTC) Program Solicitation NSF 12-596 (2012); www.nsf.gov/pubs/2012/nsf12596/nsf12596.pdf.
[9]
Obama, B. Executive Order---Improving Critical Infrastructure Cybersecurity. The White House, Office of the Press Secretary, Washington, D.C., 2013.
[10]
Ryan, D. Two views on security software liability: Let the legal system decide. IEEE Security & Privacy 1, (2003), 70--72.
[11]
Satter, R. ACLU: Slow smartphone updates are privacy threat. Associated Press (2013).
[12]
Yang, J. Smartphones in use surpass 1 billion, will double by 2015. Bloomberg (2012).

Cited By

View all
  • (2022)Economics of RansomwareManagement Science10.1287/mnsc.2022.430068:12(8979-9002)Online publication date: 1-Dec-2022
  • (2022)Enhanced social engineering framework mitigating against social engineering attacks in higher educationSECURITY AND PRIVACY10.1002/spy2.2375:5Online publication date: 18-May-2022
  • (2021)Filtering and Informing the Design SpaceACM Transactions on Computer-Human Interaction10.1145/343446228:1(1-28)Online publication date: 20-Jan-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 57, Issue 11
November 2014
95 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2684442
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 October 2014
Published in CACM Volume 57, Issue 11

Check for updates

Qualifiers

  • Column
  • Popular
  • Un-reviewed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)181
  • Downloads (Last 6 weeks)17
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Economics of RansomwareManagement Science10.1287/mnsc.2022.430068:12(8979-9002)Online publication date: 1-Dec-2022
  • (2022)Enhanced social engineering framework mitigating against social engineering attacks in higher educationSECURITY AND PRIVACY10.1002/spy2.2375:5Online publication date: 18-May-2022
  • (2021)Filtering and Informing the Design SpaceACM Transactions on Computer-Human Interaction10.1145/343446228:1(1-28)Online publication date: 20-Jan-2021
  • (2021)The Nudge PuzzleACM Transactions on Computer-Human Interaction10.1145/342988828:1(1-45)Online publication date: 20-Jan-2021
  • (2020)Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐ExperimentProduction and Operations Management10.1111/poms.1311929:2(410-427)Online publication date: 1-Feb-2020
  • (2020)Update now or later? Effects of experience, cost, and risk preference on update decisionsJournal of Cybersecurity10.1093/cybsec/tyaa0026:1Online publication date: 6-Mar-2020
  • (2020)Understanding Security Vulnerability Awareness, Firm Incentives, and ICT Development in Pan-AsiaJournal of Management Information Systems10.1080/07421222.2020.179018537:3(668-693)Online publication date: 18-Nov-2020
  • (2019)Market Segmentation and Software SecurityManagement Science10.1287/mnsc.2018.315365:10(4575-4597)Online publication date: 1-Oct-2019
  • (2018)GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk ControlSecurity in Computer and Information Sciences10.1007/978-3-319-95189-8_7(68-78)Online publication date: 14-Jul-2018
  • (2017)Dynamic public learning in networks of strategic agents: The role of inter/intra-community ties2017 IEEE 56th Annual Conference on Decision and Control (CDC)10.1109/CDC.2017.8264133(3232-3237)Online publication date: 12-Dec-2017
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media