Skip to main content

Information Security Investments: When Being Idle Equals Negligence

  • Conference paper
Economics of Grids, Clouds, Systems, and Services (GECON 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8193))

Included in the following conference series:

Abstract

The Learned Hand’s rule, comparing security investments against the expected loss from data breaches, can be used as a simple tool to determine the negligence of the company holding the data. On the other hand, companies may determine their investments in security by maximizing their own net profit. We consider the well known Gordon-Loeb models as well as the more recent Huang-Behara models for the relationship between investments and the probability of money loss due to malicious attacks to determine the outcome of the application of three forms of Hand’s rule: status quo (loss under no investments), ex-post (loss after investment), transitional (loss reduction due to investment). The company is always held negligent if it does not invest in both the status quo and the transitional form. In the ex-post form, it is instead held negligent just if the potential loss is below a threshold, for which we provide the exact expression.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cooter, R., Ulen, T.: Law and economics. Addison-Wesley (2000)

    Google Scholar 

  2. D’Acquisto, G., Flamini, M., Naldi, M.: Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches. In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 149–160. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. D’Acquisto, G., Flamini, M., Naldi, M.: A game-theoretic formulation of security investment decisions under ex-ante regulation. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 412–423. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  4. Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438–457 (2002)

    Article  Google Scholar 

  5. Huang, C.D., Behara, R.S.: Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. International Journal of Production Economics 141(1), 255–268 (2013)

    Article  Google Scholar 

  6. Markovits, R.S.: Tort-Related Risk Costs and the Hand Formula for Negligence. The University of Texas School of Law, Working Paper (November 2004)

    Google Scholar 

  7. Naldi, M., Flamini, M., D’Acquisto, G.: A revenue-based sanctioning procedure for data breaches. In: The 7th International Conference on Network and System Security NSS, Madrid, June 3-4. LNCS. Springer (2013)

    Google Scholar 

  8. Rustad, M.L., Koenig, T.H.: Extending Learned Hands Negligence Formula To Information Security Breaches. I/S: A Journal on Law and Policy for the Information Society 3(2), 236–270 (2007)

    Google Scholar 

  9. Schneider, J.W.: Preventing Data Breaches: Alternative Approaches to Deter Negligent Handling of Consumer Data. Journal of Science & Technology Law 15(2), 279–332 (2009), Boston University School of Law

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Naldi, M., Flamini, M., D’Acquisto, G. (2013). Information Security Investments: When Being Idle Equals Negligence. In: Altmann, J., Vanmechelen, K., Rana, O.F. (eds) Economics of Grids, Clouds, Systems, and Services. GECON 2013. Lecture Notes in Computer Science, vol 8193. Springer, Cham. https://doi.org/10.1007/978-3-319-02414-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02414-1_20

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02413-4

  • Online ISBN: 978-3-319-02414-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics