skip to main content
research-article
Free access

Opportunity Cost and Missed Chances in Optimizing Cybersecurity

Published: 22 June 2023 Publication History

Abstract

The loss of potential gain from other alternatives when one alternative is chosen.

References

[1]
Arora, A., Caulkins, J.P., and Telang, R. Research note---sell first, fix later: Impact of patching on software quality. Mgmt. Sci. 52, 3 (2006), 465--471
[2]
Cybersecurity and Infrastructure Security Agency, U.S. Digital Service, and Federal Risk and Authorization Management Program. CISA cloud security technical reference architecture, 2021; https://bit.ly/3IXmNIt.
[3]
Forsgren, N., Humble, J., and Kim, G. Accelerate---The Science of Lean Software and DevOps: Building and scaling high-performing technology organizations. IT Revolution Press, 2018.
[4]
Forsgren, N., et al. The SPACE of developer productivity: There's more to it than you think. acmqueue 19, 1 (2021), 20--48
[5]
Hough, S. Predicting the Unpredictable: The Tumultuous Science of Earthquake Prediction. Princeton University Press, Princeton, NJ, 2010.
[6]
Huynh, T.N., Kleerup, E.C., Raj, P.P., and Wenger, N.S. The opportunity cost of futile treatment in the intensive care unit. Critical Care Medicine 42, 9 (2014), 1977--1982; http://bit.ly/3kObdat.
[7]
Kahneman, D. Thinking, Fast and Slow. Macmillan, 2011.
[8]
Kurowski, S., Fähnrich, N., and Roßnagel, H. On the possible impact of security technology design on policy adherent user behavior---Results from a controlled empirical experiment. SICHERHEIT. H. Langweg, M. Meier, B.C. Witt, and D. Reinhardt, eds. Gesellschaft für Informatik e.V., Bonn, Germany, 2018, 145--158; https://dl.gi.de/handle/20.500.12116/16276.
[9]
Lain, D., Kostiainen, K., and Capkun, S. Phishing in organizations: Findings from a large-scale and long-term study, 2021; https://arxiv.org/abs/2112.07498.
[10]
Loewenstein, G. and Lerner, J.S. The role of affect in decision making. Handbook of Affective Science. R. Davidson, H. Goldsmith, and K. Scherer, eds. Oxford University Press, Oxford, U.K., 619--664; https://bit.ly/3yh6X6s.
[11]
McKenzie, C.R.M. Taking into account the strength of an alternative hypothesis. J. Experimental Psychology: Learning, Memory, and Cognition 24, 3 (1998), 771--792; https://bit.ly/3ZAUENY.
[12]
Organization for Economic Cooperation and Development. Externalities---OECD. Glossary of statistical terms, 2003; https://www.oecd.org/regreform/sectors/2376087.pdf.
[13]
Podkul, C. Despite decades of hacking attacks, companies leave vast amounts of sensitive data unprotected. ProPublica (Jan. 25, 2022); http://bit.ly/3JhmFot.
[14]
Poirier, G. Die softwareherkunft (software provenance): an opera in two acts. Why would anyone do that? (Jan. 14, 2022); https://grepory.substack.com/p/der-softwareherkunft-software-provenance.
[15]
Russell, G. et al. Multiple-category decision making: review and synthesis. Marketing Letters 10, 3 (1999), 319--332; https://link.springer.com/article/10.1023/A:1008143526174#article-info.
[16]
Shortridge, K. and Rinehart, A. Security Chaos Engineering: Sustaining Resilience in Software and Systems. O'Reilly Media, Sebastopol, CA, 2022.
[17]
van Stralen, D. and Mercer, T.A. Ambiguity in the operator's sense. J. Contingencies and Crisis Mgmt. 23, 2 (2015), 54--58

Cited By

View all
  • (2024)Optimization of network security protection posture based on data clusteringApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-03449:1Online publication date: 26-Feb-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 66, Issue 7
July 2023
126 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3605915
  • Editor:
  • James Larus
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 June 2023
Published in CACM Volume 66, Issue 7

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)756
  • Downloads (Last 6 weeks)83
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Optimization of network security protection posture based on data clusteringApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-03449:1Online publication date: 26-Feb-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media