By Topic

Analysis of actual IT security incident in an organization by using IT security implementation model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Masashi Sugiura ; University of Electro-Communications, NEC Corporation, Tokyo, Japan ; Hirohiko Suwa ; Toshizumi Ohta

A game-theory-based model of IT-security implementation in an organization was developed. The model consists of two players: an IT-security promotion section and an employee. The model is applied to an actual IT-security incident, the effect of the values of the model parameters on promotion of security implementation is analyzed, and what changes to the parameters are effective are determined. The results showed that this model has the potential for practical use.

Published in:

SICE Annual Conference (SICE), 2011 Proceedings of

Date of Conference:

13-18 Sept. 2011