Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The economics of information security investment
Gordon L., Loeb M. ACM Transactions on Information and System Security5 (4):438-457,2002.Type:Article
Date Reviewed: Sep 5 2003

A practical approach is presented in this paper for determining the investment requirements necessary for information protection. The model used is explained in detail throughout the 18 pages of the paper. Gordon and Loeb’s detailed approach, which includes textual explanations, formulas, graphics, and proofs, is excellent for clarifying the subject matter. The authors even take the extra step of including a discussion of which areas their research model does not address. These areas include perverse economic incentives affecting investment, dynamic issues, and game theoretic aspects.

The paper is clearly written. It is organized into four sections, which easily flow from one to the next. The authors present analyses for a broad class of security breach probability functions; optimal security spending is presented as an increasing function of vulnerability level. The paper also provides a strong conceptual foundation in explaining why current research has fallen short in this area; the focus of research in information security has mainly been on technical issues.

This useful and thought provoking model paper will not only be interesting to technical security professionals, but will also provide excellent reading for anyone faced with the task of developing a budget for information security. The most interesting thing I found in the paper was the fact that the model showed that management should be concentrating on midrange vulnerabilities, instead of on the high end. This is very important to current practice, in that most security teams do concentrate on the high end. Gordon and Loeb make a good recommendation to security teams, suggesting that all information be split into security breach vulnerability sets (low, middle, and high), and the sets then be defended moderately, instead of devoting all resources to one set. I recommend this paper highly to students, researchers, and information managers.

Reviewer:  Melissa C. Stange Review #: CR128209 (0401-0077)
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
 
 
Value of Information (H.1.1 ... )
 
 
Economics (K.6.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Value of Information": Date
Rating the major computing periodicals on readability
Lemos R. Communications of the ACM 28(2): 152-157, 1985. Type: Article
Jan 1 1986
Unused relevant information in research and development
Wilson P. Journal of the American Society for Information Science 46(1): 45-51, 1995. Type: Article
Mar 1 1996
A contextual uncertainty condition for behavior under risk
Bell D. Management Science 41(7): 1145-1150, 1995. Type: Article
Sep 1 1996
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy