A consolidated approach for estimation of data security breach costs

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

25 Scopus citations

Abstract

Many security breaches have been reported in the past few years impacting both large and small organizations. There has often been considerable disagreement about the overall cost of such breaches. No significant formal studies have yet addressed this issue, though some proprietary approaches exist. A few computational models for evaluating partial data breach costs have been implemented, but these approaches have not been formally compared and have not been systematically optimized. There is a need to develop a more complete and formal model that will minimize redundancy among the factors considered and will confirm with the available data regarding the costs of data breaches. Existing approaches also need to be validated using the data for some of the well documented breaches. It is noted that the existing models yield widely different estimates. The reasons for this variation are examined, and the need for better models is identified.

Original languageEnglish
Title of host publicationProceedings of 2016 International Conference on Information Management, ICIM 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages26-39
Number of pages14
ISBN (Electronic)9781509014705
DOIs
StatePublished - 23 May 2016
Externally publishedYes
EventInternational Conference on Information Management, ICIM 2016 - London, United Kingdom
Duration: 7 May 20168 May 2016

Publication series

NameProceedings of 2016 International Conference on Information Management, ICIM 2016

Conference

ConferenceInternational Conference on Information Management, ICIM 2016
Country/TerritoryUnited Kingdom
CityLondon
Period7/05/168/05/16

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Keywords

  • Information security
  • data breach cost
  • market valuation
  • risk assessment

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'A consolidated approach for estimation of data security breach costs'. Together they form a unique fingerprint.

Cite this