دانلود مقاله انگلیسی رایگان:اسرار ربوده شده: جرایم سایبری و اسرار تجاری مدل سازی تصمیم یک شرکت برای گزارش سرقت اسرار تجاری - 2019
دانلود بهترین مقالات isi همراه با ترجمه فارسی
دانلود مقاله انگلیسی حقوق جرم و جزا رایگان
  • Snatched secrets: Cybercrime and trade secrets modelling a firms decision to report a theft of trade secrets Snatched secrets: Cybercrime and trade secrets modelling a firms decision to report a theft of trade secrets
    Snatched secrets: Cybercrime and trade secrets modelling a firms decision to report a theft of trade secrets

    سال انتشار:

    2019


    عنوان انگلیسی مقاله:

    Snatched secrets: Cybercrime and trade secrets modelling a firms decision to report a theft of trade secrets


    ترجمه فارسی عنوان مقاله:

    اسرار ربوده شده: جرایم سایبری و اسرار تجاری مدل سازی تصمیم یک شرکت برای گزارش سرقت اسرار تجاری


    منبع:

    Sciencedirect - Elsevier - Computers & Security, 87 (2019) 101591: doi:10:1016/j:cose:2019:101591


    نویسنده:

    Atin Basuchoudhary a , Nicola Searle b , ∗


    چکیده انگلیسی:

    Cybercrime and economic espionage are increasing problems for firms. We build on US FBI policy to frame the interaction between a cybercrime victim firm and a government security agency. We bring together several strands in the literature to model the strategies of the firm, which has suffered a cy- ber breach and theft of trade secrets, and the government security agency, which must investigate and prosecute crimes. We investigate the interactions between these two players, in which the firm has pri- vate information about its cybersecurity investment. This investment level is unknown to the security agency, which must nonetheless decide how to prioritize reported crime. We model this asymmetric in- formation problem within a game theoretic signaling framework derived from Becker’s work in crime and punishment. We suggest that such a framework can inform policy to encourage security investments by firms and more efficient resource utilization by security agencies. We particularly focus on an illustrative stylized example to highlight how our modelling approach can be helpful. In this example we compare two worlds; one where all security breaches become public knowledge and another where only reported breaches become public knowledge. We then formulate two potentially testable Hypotheses and several implications of these Hypotheses. Case studies and a policy analysis further highlight how our framework plays out in reality
    Keywords: Cyber security | Cybercrime | Trade secrets | Economic espionage | Cyber breaches


    سطح: متوسط
    تعداد صفحات فایل pdf انگلیسی: 13
    حجم فایل: 736 کیلوبایت

    قیمت: رایگان


    توضیحات اضافی:




اگر این مقاله را پسندیدید آن را در شبکه های اجتماعی به اشتراک بگذارید (برای به اشتراک گذاری بر روی ایکن های زیر کلیک کنید)

تعداد نظرات : 0

الزامی
الزامی
الزامی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی