Skip to main content

Introduction and Overview

  • Chapter
  • First Online:
Cyberdefense

Part of the book series: International Series in Operations Research & Management Science ((ISOR,volume 342))

  • 166 Accesses

Abstract

Contemporary cyberdefense is too slow, it lacks foresight, and it is often ineffective. This introductory chapter explains these problems and proposes how the contributions in this volume can help to overcome them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Accenture. (2019). The cost of cybercrime: Ninth annual cost of cybercrime study. Accenture Security with Ponemon Institute LLC, Traverse City MI: Research report.

    Google Scholar 

  2. Anderson, R. J. (2010). Security engineering: A guide to building dependable distributed systems. Wiley.

    Google Scholar 

  3. Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613.

    Article  Google Scholar 

  4. Barbaglia, L., Frattarolo, L., Onorante, L., Maria Pericoli, F., Ratto, M., & Tiozzo Pezzoli, L. (2022). Testing big data in a big crisis: Nowcasting under Covid-19. International Journal of Forecasting, forthcoming.

    Google Scholar 

  5. Baron, J., & Ritov, I. (2004). Omission bias, individual differences, and normality. Organizational Behavior and Human Decision Processes, 94(2), 74–85.

    Article  Google Scholar 

  6. Beal, B. (2005). IT security: The product vendor landscape. Network Security, 5, 9–10.

    Article  Google Scholar 

  7. Böhme, R. (2013). The economics of information security and privacy. Berlin, Heidelberg: Springer.

    Book  Google Scholar 

  8. Böhme, R. (2012). Security audits revisited. In A. D. Keromytis (Ed.), Financial cryptography and data security (pp. 129–147). Berlin, Heidelberg: Springer.

    Chapter  Google Scholar 

  9. Böhme, R., & Félegyházi, M. (2010). Optimal information security investment with penetration testing. In T. Alpcan, L. Buttyan, & J. S. Baras (Eds.), Decision and game theory for security (pp. 21–37). Berlin, Heidelberg: Springer.

    Chapter  Google Scholar 

  10. Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11(3), 431–448.

    Article  Google Scholar 

  11. Cresson Wood, C. (2004). Why information security is now multidisciplinary, multi-departmental, and multi-organizational in nature. Computer Fraud & Security, 2004(1), 16–17.

    Article  Google Scholar 

  12. Falco, G., et al. (2019). Cyber risk research impeded by disciplinary barriers. Science, 366(6469), 1066–1069.

    Article  Google Scholar 

  13. Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Zhou, L. (2015). Externalities and the magnitude of cyber security underinvestment by private sector firms: A modification of the Gordon-Loeb model. Journal of Information Security, 6(1), 24–30.

    Article  Google Scholar 

  14. Gordon, L. A., Loeb, M. P., & Sohail, T. (2010). Market value of voluntary disclosures concerning information security. MIS Quarterly, 34(3), 567–594.

    Article  Google Scholar 

  15. Gordon, L. A., Loeb, M. P., Lucyshin, W., & Richardson, R. (2005). CSI/FBI computer crime and security survey. Computer Security Journal, 21(3), 1.

    Google Scholar 

  16. Herath, H., & Herath, T. (2008). Investments in information security: A real options perspective With Bayesian post-audit. Journal of Management Information Systems, 25(3), 337–375.

    Article  Google Scholar 

  17. Hunter, L. Y., Albert, C. D., & Garrett, E. (2021). Factors that motivate state-sponsored cyberattacks. The Cyber Defense Review, 6(2), 111–128.

    Google Scholar 

  18. IBM. (2020). Cost of a data breach report. (2020). IBM Security. Armonk NY: IBM Corp.

    Google Scholar 

  19. Islam, M. S., Farah, N., & Stafford, T. F. (2018). Factors associated with security/cybersecurity audit by internal audit function: An international study. Managerial Auditing Journal, 33(4), 377–409.

    Article  Google Scholar 

  20. Kam, H. J., Mattson, T., & Goel, S. (2020). A cross industry study of institutional pressures on organizational effort to raise information security awareness. Information Systems Frontiers, 22(5), 1241–1264.

    Article  Google Scholar 

  21. Keupp, M. M. (2020). The security of critical infrastructures (pp. 1–14). Cham: Springer Nature.

    Book  Google Scholar 

  22. Lelarge, M. (2012). Coordination in network security games: A monotone comparative statics approach. IEEE Journal on Selected Areas in Communications, 30(11), 2210–2219.

    Article  Google Scholar 

  23. Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365–404.

    Article  Google Scholar 

  24. Macias, P., Stelmasiak, D., & Szafranek, K. (2022). Nowcasting food inflation with a massive amount of online prices. International Journal of Forecasting, forthcoming.

    Google Scholar 

  25. Malladi, S., & Subramanian, H. C. (2020). Bug bounty programs for cybersecurity: Practices, issues, and recommendations. IEEE Software, 37(1), 31–39.

    Article  Google Scholar 

  26. NCSC. (2018). Foreign economic espionage in cyberspace. U.S. National Counterintelligence and Security Center, Washington D.C.: Office of the Director of National Intelligence.

    Google Scholar 

  27. OECD. (2012). Cybersecurity policy making at a turning point: Analysing a new generation of national cybersecurity strategies for the internet economy. Paris: OECD Publishing.

    Google Scholar 

  28. Ohlin, J. D. (2016). Did Russian cyber interference in the 2016 election violate international law? Texas Law Review, 95, 1579.

    Google Scholar 

  29. Osawa, J. (2017). The escalation of state sponsored cyberattack and national cyber security affairs: Is strategic cyber deterrence the key to solving the problem? Asia-Pacific Review, 24(2), 113–131.

    Article  Google Scholar 

  30. Patt, A., & Zeckhauser, R. (2000). Action bias and environmental decisions. Journal of Risk and Uncertainty, 21(1), 45–72.

    Article  Google Scholar 

  31. Pliatsos, D., Sarigiannidis, S., Lagkas, T., & Sarigiannidis, A. (2020). A survey on SCADA systems: Secure protocols, incidents, threats and tactics. IEEE Communications Surveys and Tutorials, 22(3), 1942–1976.

    Article  Google Scholar 

  32. Purser, S. A. (2004). Improving the ROI of the security management process. Computers & Security, 23(7), 542–546.

    Article  Google Scholar 

  33. Schatz, D., & Bashroush, R. (2017). Economic valuation for information security investment: A systematic literature review. Information Systems Frontiers, 19(5), 1205–1228.

    Article  Google Scholar 

  34. Shirtz, D., & Elovici, Y. (2011). Optimizing investment decisions in selecting information security remedies. Information Management & Computer Security, 19(2), 95–112.

    Article  Google Scholar 

  35. Smith, T., Higgs, J., & Pinsker, R. (2019). Do auditors price breach risk in their audit fees? Journal of Information Systems, 33(2), 177–204.

    Article  Google Scholar 

  36. Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215–225.

    Article  Google Scholar 

  37. Srivastava, S. K., Das, S., Udo, G. J., & Bagchi, K. (2020). Determinants of cybercrime originating within a nation: A cross-country study. Journal of Global Information Technology Management, 23(2), 112–137.

    Article  Google Scholar 

  38. Tselios, C., Tsolis, G., & Athanatos, M., et al. (2020). A comprehensive technical survey of contemporary cybersecurity products and solutions. Springer lecture notes in computer scienceIn A. P. Fournaris (Ed.), Computer security (Vol. 11981, pp. 3–18). Cham: Springer International Publishing.

    Chapter  Google Scholar 

  39. Wirth, A. (2019). Reviewing today’s cyberthreat landscape. Biomedical Instrumentation & Technology, 53(3), 227–231.

    Article  Google Scholar 

  40. Yeh, Q. J., & Chang, A. J. (2007). Threats and countermeasures for information system security: A cross-industry study. Information & Management, 44(5), 480–491.

    Article  Google Scholar 

  41. Zhou, L., Loeb, M. P., Gordon, L. A., & Lucyshyn, W. (2018). Empirical evidence on the determinants of cybersecurity investments in private sector firms. Journal of Information Security, 9(2), 720–726.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcus M. Keupp .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Keupp, M.M. (2023). Introduction and Overview. In: Keupp, M.M. (eds) Cyberdefense. International Series in Operations Research & Management Science, vol 342. Springer, Cham. https://doi.org/10.1007/978-3-031-30191-9_1

Download citation

Publish with us

Policies and ethics