Patrick Amon’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Figure 1. Idealized Probability Distribution for an Enterprise's Total Cost of (In)security 
Incentive-based Cyber Trust – A Call to Action
  • Thesis
  • Full-text available

October 2007

·

1,146 Reads

·

2 Citations

·

Patrick Amon

Many problems in cyber trust exist at least partially because the people and institutions involved are not properly motivated to solve them. The incentives are often perverse, misaligned, or missing. By improving economic, social, and personal incentives, cyber trust can be significantly improved. The incentive-based approach is based on modern enterprise risk management methods and experiences. Incentive-based cyber trust includes usability, risk information systems, risk communications, social knowledge, markets, and incentive instruments, along with enabling technology and a supporting legal/ regulatory/institutional framework. While there is research underway into these problems, it is not happening on sufficient scale, scope, or timeframe necessary to deliver breakthrough commercial solutions soon enough. We propose an initiative to drive breakthroughs for incentive-based cyber trust. An initiative will mobilize more resources (money and people) and create new synergies between existing academic disciplines, institutions, consortia, and interest groups. Most important, it will create a critical mass of the brightest thinkers across the globe, provide platforms for collaboration and innovation, and set bold, motivating goals and targets.

Download

Citations (1)


... In the case of the Internet, the SP is best positioned to detect malicious activity; hence, they would be the practical choice for taking on the responsibility for controlling malicious activity originating from their customers. The intention should not be to advocate legal sanctions, rather, to answer the growing call to action for incentive-based trust in the cyberinfrastructure (Thomas and Amon, 2007). ...

Reference:

Incentive Mechanisms for Internet Security
Incentive-based Cyber Trust – A Call to Action