3. Reporting of Information Security Breaches

2020 ◽  
pp. 50-63
Author(s):  
Kim Zetter
Author(s):  
Russell Cameron Thomas ◽  
Marcin Antkiewicz ◽  
Patrick Florer ◽  
Suzanne Widup ◽  
Matthew Woodyard

Author(s):  
Joseph K. Tanimura ◽  
Eric W. Wehrly

According to many business publications, firms that experience information security breaches suffer substantial reputational penalties. This paper examines incidents in which confidential information, for a firms customers or employees, is stolen from or lost by publicly traded companies. Firms that experience such breaches suffer statistically significant losses in the market value of their equity. On the whole, the data indicate that these losses are of similar magnitudes to the direct costs. Thus, direct costs, and not reputational penalties, are the primary deterrents to information security breaches. Contrary to many published assertions, on average, firms that lose customer information do not suffer reputational penalties. However, when firms lose employee information, we find significant reputational penalties.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


2021 ◽  
Vol 13 (3) ◽  
pp. 156-162
Author(s):  
Nataliya Blaga ◽  
◽  
Volodymyr Hobela

The mechanism of communication process and information security at an enterprise is considered. The theoretical aspects of the communications at the enterprise are based on the variety of its form and the relation of organizational and information structures: most activities have underlying links via information processes. Thus information security of communication process has a significant impact on the information security of the enterprise as a whole. In modern conditions and circumstances, the information security of the enterprise is largely reduced to cybersecurity and suffers from most threats of the latter. However, the human factor is responsible for most of the real facts of inflicting harm due to information security breaches. Thus, traditional mechanisms of privacy and confidentiality ensuring need to be adapted to new realities. New opportunities also set new requirements for understanding the very concept of information security: information must not only be protected but also timely and accurate as far as it is possible to be provided with modern telecommunication systems and information technologies: information security is a system of information protection of the enterprise – protection against theft, delayed and inaccurate providing of essential information to the recipient inside the enterprise or outside it. There are proposed and justified four principles necessary but not sufficient to ensure efficient mechanism of information security regarding communication process at small to medium enterprises. These include information awareness of staff even if they are not advanced with information technologies, traditional methods of protection against cyber threats such as passwords and encryption, control over information flows and the infrastructure that provides them, reliable cooperation and protection of remote access. These principles should be followed by managers at all levels.


2019 ◽  
Vol 30 (3) ◽  
pp. 18-37
Author(s):  
Tawei Wang ◽  
Yen-Yao Wang ◽  
Ju-Chun Yen

This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that offer similar products and 2) the effect of information transfer is weaker when the information security breach is due to internal faults or is related to the loss of personally identifiable information. Additional tests demonstrate that the effect of information transfer exhibits consistent patterns across time and with different types of information security breaches. Finally, the effect does not depend on whether the firms are IT intensive. Implications, limitations, and future research are discussed.


2020 ◽  
Vol 175 ◽  
pp. 05038
Author(s):  
Marina Ganzhur ◽  
Nikita Dyachenko ◽  
Andrey Gazizov ◽  
Arthur Otakulov ◽  
Dmitry Romanov

Cyber-physical systems are actively explored in the global and domestic scientific community. It is expected that cyber-physical systems will minimize human participation in the production process, as well as in many other areas of society. At the same time, the information security aspect of the interaction of elements remains insufficiently studied. The classical approach to ensuring security is aimed at counteracting a clear destructive information impact - when information security breaches have obvious signs. The risk of failure of one object of the system can lead to critical conditions. Safety modeling of managerial structures is reduced to considering the operability of the functions of the intermediate link and the interaction between objects that make decisions on the management and generating teams. By analyzing these transitions in limiting cases, it allows the use of analysis and synthesis approaches based on structural schemes and logical relationships.


2020 ◽  
Vol 11 (5) ◽  
pp. 259-269
Author(s):  
V. A. Galatenko ◽  
◽  
K. A. Kostyukhin ◽  

Internet of things technology is developing at an exceptionally fast pace. This applies to both industrial and consumer Internet. The "things" account for billions, and many areas of application have been formed. At the same time, the state of information security of the Internet of things is not satisfactory, and protective measures are clearly inferior to Commerce. This is especially dangerous because the Internet of things spans two worlds: digital and physical, and security breaches can cause both informational and physical damage. The Internet of things is developing rapidly, so it is natural that it experiences typical growth diseases-fragmentation and uneven development. The base for ensuring security is mostly formed (but continues to be formed), the question is how quickly there will be a harmonization of approaches, and advanced ideas will be accepted by device manufacturers. Many state and non-state agencies actively promote security tools, inform and train manufacturers and consumers. The article is an overview of the main provisions of information security of the Internet of things. An attempt is made to consider software and technical and legislative levels of Internet of things security. This makes it different from other publications of a similar nature. Only a holistic, integrated approach can improve real information security. Authors outline basic concepts and describe a reference model of Internet of things, draw attention to the peculiarities of the Internet of things that are important from the security point of view, enumerate typical threats for Internet of things. The legislative level of information security, security recommendations for the Internet of things, manufacturers description of usage, and installation of software corrections are considered in detail.


2017 ◽  
Vol 11 (3) ◽  
pp. 419-455 ◽  
Author(s):  
Vivek Soni ◽  
Prasanta Kumar Dey ◽  
Rashmi Anand ◽  
Charru Malhotra ◽  
Devinder Kumar Banwet

Purpose The purpose of this research paper is to assess e-governance efficacy in various sectors of India. The paper develops on Grey System Theory (GST) methodology and enlightens grey portions of e-governance in select sectors. Research study identifies few grey criteria which affect implementation of information and communication technology (ICT) applications to support sustainable e-governance. Such criteria are related to information security breaches, information technology (IT) policy implementation, investments and strategic advantages for the various sector developments. Design/methodology/approach Considering “information” as a sensitive element to security for administration and part of dark portion to Indian economy, GST-based COmplex PRroportional ASsessment (COPRAS-G) method is adopted to assess the e-governance efficacy. The method provides flexible multicriteria decision-making (MCDM) approach to assess e-governance in prioritizing the sector alternatives of future strategic development. Priority order of select sectors is estimated, and COPRAS-G method is used in the research study to support decision-making on e-governance. Study compares ten major gross domestic product-dependent sectors based on few grey criteria. These criteria are chosen based on authors’ perspective on this study and feedback received from government officials of district levels under the Digital India-training programme. To address the subjectivity that lies in e-governance grey areas of sector, criteria are also weighted using fuzzy scale. Later methodology-based results are presented to draw a strategic road map for strategic development of the country. Findings On applying COPRAS-G method to predict pessimistic, optimistic and realistic scenarios of e-governance implementation across the ten sectors, high priory order in realistic scenario of results shows that implementation of ICT applications for e-governance should be in the sectors such as environment, climate change and in the railways. Industrial sector is also ranked as the preferred one over the other sectors on the basis of e-governance efficacy assessment. Research limitations/implications Here COPRAS-G method is used as MCDM techniques. However, few other MCDM techniques such as GRA, DRSA, VIKOR, SMAA, SWARA and SAW can be also explored to outrank various Indian sectors to deal with subjectivity in decision-making. Practical implications Implementation of ICT applications to support e-governance varies from sector to sector. ICT-based governance involves high degree of complexity in driving the operations for development of respective sectors. Therefore, government and policymakers need more flexibility to overcome present barriers of sector development. Such research can support decision-making where GST-based COPRAS-G method is able to capture and address the breaches of information security. Moreover, management concern for sector development has been presented on the basis of pessimistic, optimistic and realistic scenarios more precisely. Social implications The results can provide guidance to the academicians, policymakers and public sectors highlighting various possible measures to handle the security breaches in multi-facet intention of sustainable development. The outcomes from MCDM framework can also help in drawing a rough trajectory of strategy, i.e. development of ICTs applications and e-governance process. Originality/value This paper can supplement and act as the support for decision-making in conflicting situations on different flexible scenarios. Moreover, such work can synergize conflicting ideas of decision makers, academics and various other stakeholders of the Indian IT sector.


Sign in / Sign up

Export Citation Format

Share Document