The Economics of Information Security
The Economics of Information Security
Security Investment
LAWRENCE A. GORDON and MARTIN P. LOEB
University of Maryland
This article presents an economic model that determines the optimal amount to invest to protect
a given set of information. The model takes into account the vulnerability of the information to
a security breach and the potential loss should such a breach occur. It is shown that for a given
potential loss, a firm should not necessarily focus its investments on information sets with the
highest vulnerability. Since extremely vulnerable information sets may be inordinately expensive
to protect, a firm may be better off concentrating its efforts on information sets with midrange
vulnerabilities. The analysis further suggests that to maximize the expected benefit from invest-
ment to protect information, a firm should spend only a small fraction of the expected loss due to
a security breach.
Categories and Subject Descriptors: H.1.1 [Models and Principles]: Systems and Information
Theory—value of information; K.6.0 [Management of Computing and Information Systems]:
General—economics; K.6.5 [Management of Computing and Information Systems]: Security
and Protection
General Terms: Economics, Security
Additional Key Words and Phrases: Optimal security investment
1. INTRODUCTION
Security of a computer-based information system should, by design, protect the
confidentiality, integrity, and availability of the system (e.g., see NIST [1995,
p. 5]). Given the information-intense characteristics of a modern economy (e.g.,
the Internet and World Wide Web), it should be no surprise to learn that in-
formation security is a growing spending priority among most companies. This
growth in spending is occurring in a variety of areas including software to detect
viruses, firewalls, sophisticated encryption techniques, intrusion detection sys-
tems, automated data backup, and hardware devices [Larsen 1999]. The above
notwithstanding, a recent study by the Computer Security Institute, with the
participation of the Federal Bureau of Investigation, reported that “Ninety-one
This research was partially supported by The Robert H. Smith School of Business, University of
Maryland and the Laboratory for Telecommunications Sciences (within the Department of Defense)
through a grant with the University of Maryland Institute for Advanced Computer Studies.
Authors’ address: The Robert H. Smith School of Bussiness, University of Maryland, College Park,
College Park, MD 20742-1815; email: {lgordon;mloeb}@rhsmith.umd.edu.
Permission to make digital/hard copy of part or all of this work for personal or classroom use is
granted without fee provided that the copies are not made or distributed for profit or commercial
advantage, the copyright notice, the title of the publication, and its date appear, and notice is given
that copying is by permission of the ACM, Inc. To copy otherwise, to republish, to post on servers,
or to redistribute to lists, requires prior specific permission and/or a fee.
C 2002 ACM 1094-9224/02/1100-0438 $5.00
!
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002, Pages 438–457.
The Economics of Information Security Investment • 439
1 Moreover, our model could be used to gain insights for the optimal protection of assets other than
information.
2 This is in contrast with earlier literature, such as Pfleeger [1997, Chapter 10], which discuss the
importance of vulnerability in the decision to invest in information security, but does not examine
the effects of changes in vulnerability on the optimal investment in information security. Previous
papers on information security usually combine vulnerability with the potential dollar loss associ-
ated with such vulnerability, to come up with the notion of risk (e.g., Straub and Welke [1998] and
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
440 • L. A. Gordon and M. P. Loeb
2. THE MODEL
We consider a one-period model4 of a firm contemplating the provision of ad-
ditional security to protect a given information set. The information set could
take many forms, such as a list of customers, an accounts payable ledger, a
strategic plan, or company website. The increased security could be with re-
spect to protecting the confidentiality, integrity, authenticity, non-repudiation,
or availability to authorized users of the information set. An information set is
characterized by three parameters: λ, t, and v, representing, respectively, the
loss conditioned on a breach occurring, the probability of a threat occurring,
and the vulnerability, defined in the model as the probability that a threat once
realized (i.e., an attack) would be successful.
Finne [1998]). Thus, earlier literature entangles the relationship between information vulnerability
and the proper amount to spend on preventing such vulnerability.
3 If someone is risk-neutral, it means that they are indifferent to investments that have the
same expected value, even though the investments may have varying amounts of risk. Thus, a
risk-neutral decision-maker would be indifferent to Investment #1 that generates either a net
return of $200,000 or a net loss of $100,000 each with probability of 0.5, and Investment #2 that
generates a net return of either $40,000 or $60,000 each with probability of 0.5, as both investments
have an expected net return of $50,000. Notice that Investment #1 has more risk (i.e., larger
standard deviation around the expected value) than investment #2, and yet the two investments
are being considered equal. Someone who is risk-averse would require a higher expected value
for an investment with a higher risk.
4 In one-period economic models, all decisions and outcomes occur in a simultaneous instant. Thus,
dynamic aspects, such as a first-mover advantage or the time value of money, are not considered.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
The Economics of Information Security Investment • 441
The parameter λ represents the monetary loss to the firm caused by a breach
of security of the information set. This loss could be due to a security breach
related to confidentiality (e.g., the loss due to the strategic information becoming
available to competitors or the fraudulent use of credit card information by
hackers), integrity (e.g., the loss due to the firm making faulty decisions based
on data altered by an intruder), or denial of services (e.g., loss due to missed
sales from authorized users who were denied legitimate access). Although λ
would normally depend on the use of the information (by the firm itself, by
competitors, or by hackers) and would change over time, for simplicity we take
λ to be a fixed amount as estimated by the firm (e.g., the present value of lost
profits from current and future lost sales). Even though we initially assume
that this loss is a fixed value, we will investigate how changes in the value of
the loss affect the firm’s security investment decision. However, we assume λ
is finite and less than some very large number, say M .5 Thus, the model is not
intended to cover protection of national/public assets or other circumstances
where a loss could be catastrophic.
The probability of an attempted breach of the given information set is denoted
by t ∈ [0, 1], and we call t the threat probability. We make the simplifying
assumption that there is a single threat to an information set.6 The parameter
v is used to denote the information set’s vulnerability, by which we mean the
probability that without additional security, a threat that is realized will result
in the information set being breached and the loss, λ, occurring. Our view of
threats and vulnerabilities is consistent with the argument of Littlewood et al.
[1993, p. 228] concerning “the desirability of a probability-based framework for
operational security measurement.” Since v is a probability, v ∈ [0, 1].
Typically, the threat to an information set and the information set’s vul-
nerability would lie in the interior (i.e., 0 < t < 1 and 0 < v < 1). Note that the
information is completely invulnerable when v = 0. One can consider an in-
formation set on a computer buried in concrete thirty feet underground to be
completely invulnerable. Of course, this state of invulnerability (and perfect
confidentiality) is achieved at the cost of having the information set become
completely inaccessible.7 Similarly, if v = 1, the information set is completely
vulnerable. Such information sets, like last quarter’s statement of earnings (for
a publicly traded firm) or the retail price of a specific product, may be viewed
as public information. For a given information set, the probability of the loss
occurring (sometimes called the risk of the loss) is the product of the vulnerabil-
ity and the threat probabilities. Thus, the product vtλ represents the expected
reason to believe that a more complex economic model would yield additional insights. In fact, it is
often argued that clearer insights are provided by models that are less rather than more complex.
In this vein, Varian [1997, p. 4] writes, “A model is supposed to reveal the essence of what is going
on: your model should be reduced to just those pieces that are required to make it work.”
7 Hence, this is one illustration of the trade-offs among the goals of confidentiality, integrity, and
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
442 • L. A. Gordon and M. P. Loeb
8 As noted in the previous footnote, the calculation of the expected loss becomes more complicated
when multiple threats are considered. Assume for simplicity that a threat that results in a breach
causes a loss of λ, but that there can be no additional losses from a second breach (once you’re
shot dead, additional threats are irrelevant). Now suppose there are two (independent) threats
occurring with probability t1 = 0.8 and t2 = 0.9 and suppose the vulnerability probability is v = 0.1.
Then, the probability of a loss (calculated using a simple decision tree) will be 0.1628 < vt1 + vt2 .
9 Investments in information security have many of the same characteristics of what firms usually
consider capital expenditures. This fact notwithstanding, firms usually treat an inordinate portion
of the costs of information security as operating expenditures. Although beyond the scope of this
paper, such treatment raises its own set of interesting questions.
10 Of course, this may not always be the case. For example, if each employee having access to an
information set is viewed as a threat, the threat can be reduced by restricting employee access.
11 Although we hold t fixed, our model allows us to see how changes in the value of the parameter t
(and the parameter λ) would change the optimal security investment decision.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
The Economics of Information Security Investment • 443
12 By making such simplifying assumptions, economists have been able to gain powerful insights
that have proven valid in more general settings.
13 We believe risk-neutrality is a reasonable assumption for most security-related issues. Of course,
if the loss associated with a security breach were of an immense magnitude, a more realistic as-
sumption may well be that of risk-aversion. By implicitly restricting the magnitude of the potential
loss, we concur with Littlewood et al. [1993, p. 217], who write, “in these initial stages of attempt-
ing to model operational security, we should restrict ourselves to systems for which the security
requirements are also modest.” Under a risk-averse assumption, the level of expenditure on in-
formation security would depend on the specific nature and degree of the decision-maker’s risk
aversion (modeled by economists as the decision-maker’s utility function), and the optimal invest-
ment in information security would increase with the level or risk-aversion. Such an analysis,
however, is beyond the scope of this article.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
444 • L. A. Gordon and M. P. Loeb
security, denoted as EBIS, are equal to the reduction in the firm’s expected loss
attributable to the extra security. That is:
EBIS(z) = [v − S(z, v)] L. (1)
EBIS is written above as a function of z, since the investment in information
security is the firm’s only decision variable (v and L are parameters of the
information set). The expected net benefits from an investment in information
security, denoted ENBIS equal EBIS less the cost of the investment, or:
ENBIS(z) = [v − S(z, v)] L − z. (2)
To focus on the effect of vulnerability, we denote the optimal investment as
z ∗ (v). Observe that from A1, if an information set is completely invulnerable,
the optimal investment in information security is set equal to zero, that is,
z ∗ (0) = 0. For now, we assume that the information set is neither completely
vulnerable nor completely invulnerable, that is, 0 < v < 1.
From Assumption (A3), S(z, v) is strictly convex in z, thus ENBIS is strictly
concave in z. Hence, an interior maximum z ∗ > 0 is characterized by the first-
order condition:
−Sz (z ∗ , v) L = 1. (3)
where the left hand side of (3) represents the marginal benefits from the secu-
rity investment and the right hand side of (3) represents the marginal cost of
investment.14 One should invest in security only up to the point where marginal
benefit equals marginal cost.
Recall that the value of an information set is measured by the potential loss
associated with the information set. It follows from Eq. (3), as one would expect,
that for a given level of vulnerability, the optimal amount to be invested in
information security, z ∗ , increases with increases in the value of the information
set (i.e., with increases in the threat t or the loss λ).15
This optimal level of investment in information security is illustrated in
Figure 1. From Eq. (1), A1, and A2, the benefits of an investment in informa-
tion security, EBIS(z), start out at zero and approach vL as the investment level
increases. The costs of the investment are given by z, the 45◦ line in Figure 1.
14 Recall that z measures information security investment in dollars (or other monetary units).
Hence, by definition, the price of a unit of z equals one. Thus, the marginal cost of investment (i.e.,
the cost of increasing z by one unit) equals one.
15 This can be seen by first rewriting (3) as:
1
−Sz (z ∗ , v) =
L
and taking the total differential to get:
dL
Szz (z ∗ , v) dz∗ = .
L2
This yields:
dz∗ 1
= 2 .
dL L Szz (z ∗ , v)
Thus, as Szz (z ∗ , v) is positive from assumption A3, we have (dz∗ /dL) > 0, giving the desired result.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
The Economics of Information Security Investment • 445
The optimal investment, z ∗ , is where the difference between benefits and costs
are maximized, and at that point the tangent to EBIS(z ∗ ), has a slope, repre-
senting the marginal benefits, equal to the marginal cost of one. Observe that
the optimal amount to be invested in information security, z ∗ , is less than vL,
the loss that would be expected in the absence of any investment in security.16
This can be seen by noting in Eq. (2) that the expected benefits will always
be less than vL. In Figure 1, this can be seen by noting that the benefits of
an investment in information security, EBIS(z), crosses the 45◦ line below vL.
In section 3, for two broad classes of security breach probability functions, we
show that the optimal amount to be invested in information security is only a
small fraction of the expected loss, vL.
The optimal level of investment in information security equals zero if the
marginal benefits at z = 0 are less than or equal to the marginal costs of such
investment. This condition can be rewritten as:
1
L≤ . (4)
−Sz (0, v)
Since our focus is on the effects of vulnerability, we are interested in deter-
mining the levels of v that cause the optimal level of investment in information
16 To see this formally, note that 0 < vL − S(z ∗ , v) L − z ∗ < vL − z ∗ , so z ∗ < vL.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
446 • L. A. Gordon and M. P. Loeb
17 Clearly,
if one were to hold v constant and let L vary, the optimal investment in information
security will be zero for sufficiently small L. That is, if the loss conditional on a security breach is
very small, a positive investment in information security is not justified.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
The Economics of Information Security Investment • 447
Fig. 2. Expected value of information loss, S(z, v) L, as vulnerability increases at different levels
of investment in information security (for Class I).
line, S(0, v)L in Figure 2, equals vL, the expected loss without increased invest-
ment in information security. The straight line below it represents S(z 1 , v)L,
which is the expected loss when z 1 is invested in information security. Thus,
for an information set with vulnerability v, the difference between the lines
at v represents EBIS (i.e., the expected benefit of investing z 1 in information
security gross of the costs of the investment).
For security breach probability functions belonging to this first class, an
expression for an interior optimal level of investment in information security
can be found by solving for z ∗ in the first-order condition given by Eq. (3). Letting
z I ∗ (v) denote this optimal yields:
(vβαL)1/(β+1) − 1
z I ∗ (v) = . (6)
α
For this first class of security breach probability functions, condition (4) yields
that z I ∗ (v) = 0 for 0 ≤ v ≤ 1/αβ L. Thus, for the first class of security breach
functions, the optimal investment in security equals zero until v = 1/αβ L, and
then, based on Eq. (6), increases at a decreasing rate (see Figure 3). As z I ∗ (v) is
strictly increasing in v over the high range of vulnerabilities, Figure 3 illustrates
that, at least for security breach probability functions belonging to S I (z, v), for
a given potential loss, a firm can be better off concentrating its resources on
high-vulnerability information sets.
We now examine a second broad class of security breach probability func-
tions that also meets assumptions A1–A3, yet demonstrates that a firm is not
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
448 • L. A. Gordon and M. P. Loeb
Fig. 3. Optimal value of security investments as a function of vulnerability, z ∗ (v) for Class I.
18 The class of security breach function S II (z, v) given in Eq. (7) is not the only class of security
breach functions that has this property and could be used to demonstrate the propositions that are
given later in this section. For example, the class of security breach probability functions given by
S III (z, v) = veαz(v − 1) , where α > 0 could have been used instead of S II (z, v). The class S II (z, v) was
selected for presentation because of its slightly simpler form.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
The Economics of Information Security Investment • 449
Fig. 4. Expected value of information loss, S(z, v) L, as vulnerability increases at different levels
of investment in information security (for Class II).
For this second class of security breach probability functions, condition (4) can
be rewritten (after rearranging terms) as 1/L > −αv ln v. Note that −αv ln v > 0
for 0 < v < 1, and takes on a maximum at v = 1/e ≈ 0.3679, and gets sufficiently
close to 0 for v sufficiently close to either 0 or 1. Thus, for a given L, there
exists a lower limit, V (L), and an upper limit V (L), with 0 < V (L) < V (L) < 1,
such that z II∗ (v) = 0, when 0 < v < V (L) or V (L) < v < 1 and z II∗ (v) > 0 when
V (L) < v < V (L). Although one cannot find a closed form expression for V (L)
and V (L), by plotting z II∗ (v), numerical values for these points can easily be
approximated.19 The regions of extremely low and extremely high vulnerability
are shown in the graph of z ∗ (v) for S II (z, v) = vαz+1 in Figure 5.
While our earlier proposition (and the analysis of the first class of security
breach probability functions) left open the possibility that the optimal invest-
ment in information security is always (weakly) increasing in vulnerability, the
analysis of the second class of security breach probability functions shows that
this is not the case. We have seen that the class of security breach probability
functions S II (z, v) = vαz+1 meets conditions A1–A3 and results in the optimal
security investment first increasing and then decreasing in the vulnerability.
Thus, the demonstration and analysis of the second class of security breach
probability functions provides a counterexample that is sufficient to prove the
following:
PROPOSITION 2. Suppose a security breach probability function meets condi-
tions A1–A3, then it is not necessarily the case that the optimal level of investment
in information security, z ∗ (v), is weakly increasing in vulnerability, v.
19 For example, when α = 0.00001, and L = $400,000, then V ≈ 0.1 and V ≈ 0.7.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
450 • L. A. Gordon and M. P. Loeb
Fig. 5. Optimal value of security investments as a function of vulnerability, z ∗ (v) for Class II.
The next proposition provides insight into the relationship between the op-
timal level of investment in security and the loss that would be expected in
the absence of any investment in security when the security probability breach
functions belong to class I or class II.
PROPOSITION 3. Suppose the security breach probability function belongs to
class I (i.e., it can be expressed as S I (z, v) = v/(αz + 1)β for some α > 0, β ≥ 1)
or to class II (i.e., it can be expressed as S II (z, v) = vαz+1 for some α > 0), then
z ∗ (v) < (1/e) vL. (See Appendix for proof. )
Proposition 3 shows that, for the two broad classes of information security
breach probability functions, the optimal investment in information security
is always less than or equal to 36.79% of the loss that would be expected in
the absence of any investment in security.20 The restriction that the security
breach probability functions have one of two specific functional forms warrants
a discussion of the robustness of the proposition. First, note that the two classes
of security breach probability functions appear unrelated, other than the fact
that functions in both classes satisfy conditions A1–A3. Functions belonging to
class I are linear in vulnerability and those belonging to class II are strictly
concave (for α > 0). Moreover, the result holds for all values of α > 0, β ≥ 1,
that is, the productivity of information security is unrestricted.21 Second, the
proposition critically depends on the assumption that the firm already has some
information security infrastructure in place (e.g., an IT officer devoting some
time to security issues, access controls, etc.) so that there are no incremental
fixed costs associated with new security investments.22
The practical import of Proposition 3 as guidance for decision-making is
enhanced when one considers that the 36.79% figure is a maximum, and for a
wide range of security breach probability functions belonging to class I and II,
the optimal amount to be invested in information security is considerably less.
For example, for class I security breach probability functions with β = 1, the
maximum percent to be invested is 25% of vL (as can be seen by examining
Eq. (A4) in the Appendix) and only occurs when αvL = 4. Thus, when β = 1,
α = 0.00001, L = $400,000 and v = 1, the 25% limit will hold, but at lower values
of v, the optimal level of investment is less than the 25% of vL.23
The findings discussed in this section of the article can be summarized as
follows: The optimal expenditures for protecting a given information set do
20 As indicated in footnote 18 above, Proposition 3 extends beyond the two classes of information
security breach functions.
21 Also note that some simple pertubations of the two classes of security probability functions do
the two classes of breach functions), the optimal total amount spent on information security as
a fraction of the expected loss in the absence of additional security would increase by F /vL. As
F increases, the lower range of vulnerabilities in which investment is uneconomical increases.
Clearly, if F were sufficiently large, no investment would take place.
23 For example, when v = 0.52, the optimal investment is $41,421 or 20.7% of vL.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
452 • L. A. Gordon and M. P. Loeb
not always increase with increases in the information set’s vulnerability. Fur-
thermore, for two broad classes of security breach probability functions, the
optimal amount to invest in information security should not exceed 37% (≈1/e)
of the expected loss due to a security breach. The analysis presented is not
without limitations. First, our result giving the maximum amount of the op-
timal investment in information security depended on the specific functional
forms of the security breach functions and assumed no lumpiness in expen-
ditures for information security. While the assumption that incremental fixed
costs of information security investment is zero clearly played a crucial role
in our demonstration, it is an open question as to whether or not our result
extends to all continuous security breach functions meeting assumptions A1–
A3. Second, there is no simple procedure to determine the probabilities of the
threat and the vulnerability associated with an information set. Third, in a
similar vein, procedures for deriving and considering the potential loss from an
information security breach, especially for a huge loss (as would likely be the
case for the protection of many national/public assets), is also problematic. A
fourth limitation of this research is that we have not modeled how conflicts of
interest between senior management and the firm’s chief information security
officer would affect the derivation of the optimal amount to invest in informa-
tion security.24 Finally, we have not modeled the case where a single investment
in information security is used to protect the security of multiple information
sets having correlated security risks.25
4. CONCLUDING COMMENTS
The new computer-based information age has changed the way organizations
operate, as well as the way they need to look at information security. Indeed,
information security has become at least as important to modern corporations
as is the protection of tangible physical assets. Not surprisingly, a rapidly
growing body of research addresses the issue of information security. This re-
search has focused primarily on the technical aspects of protecting information
in a computer-based system (i.e., encryption, data and software controls, and
hardware controls). The behavioral aspects of preventing information security
breaches have also been attracting much recent attention among researchers.
In contrast, very little work has been done which addresses the economic
aspects of information security. In particular, given the amount of resources
24 In another context, Hann and Weber [1996] model the conflict of interest between senior manage-
ment and the CIO. The cost of the conflict of interest between a principal (e.g., a senior manager)
and an agent (e.g., the CIO) is known in economics as an agency cost. Agency costs arise in a variety
of other situations where the decision making authority is delegated by a principal (e.g., an owner)
to an agent (e.g., a senior manager).
25 Similarly, our article does not address the joint protection of information sets along with tangible
assets such as desks, printers, and personnel. For example, fire protection adds to the security of
non-information assets along with information assets. Of course, if we bundle all assets together
as a single set, we could still use our model for guidance in determining a joint level of (information
plus noninformation) security investment. However, our model does not give guidance on how the
total investment in security should be allocated between information security investments and
security investments for other assets.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
The Economics of Information Security Investment • 453
APPENDIX
PROOF OF PROPOSITION 1. Observe from (A1), Sz (z, 0) = 0 for all z > 0 and from
(A3), Sz (z, v) < 0, for all z > 0 and 0 < v < 1. Therefore, at least over some range,
Sz (z, v) is decreasing in v. Consider the pair (z, v), which is in the range where
Sz (z, v), is decreasing in v. There exists an L such that −Sz (z, v) L = 1, so for that
L, z ∗ (v) = z. Thus, for sufficiently small but positive ε, −Sz (z ∗ (v), v + ε, )L > 1.
From (A3), Szz > 0, so there exists δ > 0 such that −Sz (z ∗ (v) + δ, v + ε) L = 1,
that is, z ∗ (v + ε) = z ∗ (v) + δ. Hence, z ∗ is increasing at v.
PROOF OF PROPOSITION 3. Suppose the security breach probability function
belongs to class I. Then, using Eq. (6), we have:
z I ∗ (v) (βαvL)1/(β+1) − 1
= . (A.1)
vL αvL
Letting x = αvL, Eq. (A.1) can be rewritten as:
z I ∗ (v) (βx)1/(β+1) − 1
= . (A.2)
vL x
The right hand side of (A.2) reaches its maximum at:
x = (β + 1)β+1 β −2−β , (A.3)
and substituting this (A.3) into (A.2) we get:
! "β+1
z∗ β
= . (A.4)
vL β +1
26 Thisgame-theoretic aspect is noted by Jajodia and Millen [1993, p. 85], “Computer security is a
kind of game between two parties, the designer of a secure system, and a potential attacker.” The
game-theoretic aspect of information security is also highlighted by Gordon and Loeb [2001].
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
The Economics of Information Security Investment • 455
ACKNOWLEDGEMENTS
The authors wish to thank Mike Ball, John Hughes, Jon Millen, Ravi Sandhu,
Tashfeen Sohail, Gene Spafford, Zheng Wang and the participants at the ac-
counting and finance workshop at the London School of Economics and Political
Science for comments on an earlier version of this article.
REFERENCES
ANDERSON, J. 1972. Computer security technology planning study. U.S. Air Force Electronic Sys-
tems Division Tech. Rep. (Oct.), 73–51.
ANDERSON, R. 2001. Why information security is hard—An economic perspective. In Proceedings
of 17th Annual Computer Security Applications Conference (ACSAC) (New Orleans, La. Dec.
10–14).
AXELSSON, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans.
Inf. Syst. Sec. 3, 3 (Aug.), 186–205.
BUZZARD, K. 1999. Computer security—What should you spend your money on. Comput. Sec. 18,
4, 322–334.
DANIELS, T. E. AND SPAFFORD, E. H. 1999. Identification of host audit data to detect attacks on
low-level IP. J. Comput. Sec. 7, 1, 3–35.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
456 • L. A. Gordon and M. P. Loeb
DENNING, D. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 2 (Feb.),
222–226.
DENNING, D. AND BRANSTAD, D. 1996. A taxonomy of key escrow encryption systems. Commun.
ACM. 39, 3 (Mar.), 34–40.
FINNE, T. 1998. A conceptual framework for information security management. Comput. Sec. 17,
4, 303–307.
FRINCKE, D. 2000. Balancing cooperation and risk in intrusion detection. ACM Trans. Inf. Syst.
Sec. 3, 1 (Feb.), 1–29.
GORDON, L. AND LOEB, M. 2001. A framework for using information security as a response to
competitor analysis systems. Commun. ACM, 44, 9 (Sept.), 70–75.
HANN, J. AND WEBER, R. 1996. Information systems planning: A model and empirical tests. Man-
age. Sci. 42, 7 (July), 1043–1064.
HOO, K. 2000. How much is enough? A risk-management approach to computer security. Consor-
tium for Research on Information Security Policy (CRISP) Working Paper. Stanford University,
Stanford, Calif., June.
JAJODIA, S. AND MILLEN, J.. 1993. Editors’ preface. J. Comput. Sec. 2, 2/3, 85.
JONES, A. 1997. Penetration testing and system audit. Comput. Sec. 16, 595–602.
KPMG. 2000. Information Security Survey 2000. http://www.kpmg.co.uk/services/audit/pubs/
ISS (Apr.), 1–4
LARSEN, A. 1999. Global security survey: Virus attack. InformationWeek.Com. http://www.
informationweek.com/743/security.htm.
LITTLEWOOD, B., BROCLEHURST, S., FENTON, N., MELLOR, P., PAGE, S., WRIGHT, D., DOBSON, J., MCDERMID,
J., AND GOLLMAN, D. 1993. Towards operational measures of security. J. Comput. Sec. 2, 2,
211–229.
LOCH, K. D., CARR, H. H., AND WARKENTIN, M. E. 1992. Threats to information systems: Today’s
reality, yesterday’s understanding. MIS Quart. 17, 2, 173–186.
LUOTONEN, O. 1993. Risk management and insurances. Painatuskeskus Oy. Helsinki,
Finland.
MCKNIGHT, L., SOLOMON, R., REAGLE, J., CARVER, D., JOHNSON, C., GEROVAC, B., AND GINGOLD, D. 1997.
Information security of internet commerce. In Internet Economics, L. McKnight and J. Bailey,
Eds., MIT Press, Cambridge, Mass., pp. 435–452.
MEADOWS, C. 2001. A cost-based framework for analysis of denial of service in networks J. Com-
put. Sec. 9, 1/2, 143–164.
MILLEN, J. 1992. A resource allocation model for denial of service. In Proceedings of the 1992
IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif.,
pp. 137–147.
MURALIDHAR, K., BATRA, D., AND KIRS, P. 1995. Accessibility, security, and accuracy in statistical
databases: The case for the multiplicative fixed data perturbation approach. Manage. Sci. 41, 9
(Sept.), 1549–1564.
NIST (NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY). 1995. An Introduction to Computer
Security: The NIST Handbook. (Special Publication 800-12).
OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to en-
force mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Sec. 3, 2 (May),
85–106.
PEYRAVIAN, M., ROGINSKY, A., AND ZUNIC, N. 1999. Hash-based encryption. Comput. Sec. 18, 4,
345–350.
PFLEEGER, C. 1997. Security in Computing (2nd ed.), Prentice-Hall, Englewood Cliffs, N.J.
POWER, R. 2001. 2001 CSI/FBI computer crime and security survey. Comput. Sec. J. 17, 2 (Spring),
29–51.
SANDHU, R. S., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based ad-
ministration of roles. ACM Trans. Inf. Syst. Sec. 1, 2 (Feb.), 105–135.
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control
models. IEEE Comput. 29, 2 (Feb.), 38–47.
SCHNEIER, B. 1996. Applied Cryptography (2nd ed.), Wiley. New York.
SIMMONS, G. 1994. Cryptanalysis and protocol failures. Commun. ACM. 37, 11 (Nov.), 56–64.
STRAUB, D. W. 1990. Effective IS security: An empirical study. Inf. Syst. Res. 1, 3, 255–276.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
The Economics of Information Security Investment • 457
STRAUB, D. W. AND WELKE, R. J. 1998. Coping with systems risk: Security planning models for
management decision making. MIS Quart. 23, 4, 441–469.
VARIAN, H. R. 1997. How to build an economic model in your spare time. Part of a collection titled
Passion and Craft: Economists at Work, ed. Michael Szenberg, University of Michigan Press,
available at http://www.sims.berkeley.edu/˜hal/Papers/how.pdf.
VIGNA, G. AND KEMMEERER, R. A. 1999. NetSTAT: a network-based intrusion detection system.
J. Comput. Sec. 7, 1, 37–71.
WISEMAN, S. 1986. A secure capability computer system. In Proceedings of the IEEE Symposium
on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif, pp. 86–94.
ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.