Match!
J S Busby
Lancaster University
133Publications
16H-index
1,091Citations
Publications 133
Newest
Abstract The primary concern in the resource-based view of the firm has been competition. For many firms, however, the relevant ecology includes parasites as well as competitors – notably product counterfeiters who parasitically exploit a firm's reputational resource. This parasitic process both diminishes the reputational resource it exploits, and produces significant risk of harm as a by-product. This article extends the resource-based view, presenting an account of the mechanism by which comp...
Jul 12, 2017 in SOUPS (Symposium On Usable Privacy and Security)
#1Alberto Zanutto (Lancaster University)H-Index: 1
Last.Awais Rashid (Lancaster University)H-Index: 34
view all 5 authors...
Modern production processes are heavily reliant on industrial control systems (ICS) to help automate large-scale facilities. The security of these systems is paramount as evidenced by high profile attacks such as those against Iran’s nuclear facilities and the Ukrainian Power Grid. Existing research has largely focused on technical measures against such attacks and little attention has been given to the security challenges and complexities arising from non-technical factors. For instance, cyber ...
#1J S Busby (Lancaster University)H-Index: 16
#2Benjamin Green (Lancaster University)H-Index: 7
Last.David Hutchison (Lancaster University)H-Index: 27
view all 3 authors...
Industrial control systems increasingly use standard communication protocols and are increasingly connected to public networks—creating substantial cybersecurity risks, especially when used in critical infrastructures such as electricity and water distribution systems. Methods of assessing risk in such systems have recognized for some time the way in which the strategies of potential adversaries and risk managers interact in defining the risk to which such systems are exposed. But it is also imp...
#1Bin Ding (USTC: University of Science and Technology of China)H-Index: 2
#2Mark Stevenson (Lancaster University)H-Index: 53
Last.J S Busby (Lancaster University)H-Index: 16
view all 3 authors...
The counterfeiting of safety critical products such as pharmaceuticals is a significant risk to public safety, but the literature suggests that much of the causation of counterfeiting is endogenous: the decisions of legitimate producers and consumers facilitate or incentivize the manufacture of counterfeits. This study examined what effect the perceived causation of counterfeiting risk (both the causes of counterfeiting, and the consequences caused by counterfeiting) had on the risk control impe...
#1Antonios GouglidisH-Index: 5
#2Vincent C. Hu (NIST: National Institute of Standards and Technology)H-Index: 13
Last.David HutchisonH-Index: 27
view all 4 authors...
Access control offers mechanisms to control and limit the actions or operations that are performed by a user on a set of resources in a system. Many access control models exist that are able to support this basic requirement. One of the properties examined in the context of these models is their ability to successfully restrict access to resources. Nevertheless, considering only restriction of access may not be enough in some environments, as in critical infrastructures. The protection of system...
Oct 1, 2016 in SMC (Systems, Man and Cybernetics)
#1J S Busby (Lancaster University)H-Index: 16
#2Antonios Gouglidis (Lancaster University)H-Index: 5
Last.Stefan Rass (Austrian Institute of Technology)H-Index: 10
view all 3 authors...
It becomes essential when reasoning about the security risks to critical utilities such electrical power and water distribution to recognize that the interests of producers and consumers do not fully coincide. They may have incentives to behave strategically towards each other, as well as toward some third party adversary. We therefore argue for the need to extend the prior literature, which has concentrated on the strategic, adaptive game between adversary and defender, towards 3-player games. ...
#1Antonios GouglidisH-Index: 5
#2Benjamin GreenH-Index: 7
Last.Stefan SchauerH-Index: 5
view all 6 authors...
Utility networks are part of every nation’s critical infrastructure, and their protection is now seen as a high priority objective. In this paper, we propose a threat awareness architecture for critical infrastructures, which we believe will raise security awareness and increase resilience in utility networks. We first describe an investigation of trends and threats that may impose security risks in utility networks. This was performed on the basis of a viewpoint approach that is capable of iden...
#1J S Busby (Lancaster University)H-Index: 16
#2Bhakti Stephan Onggo (Lancaster University)H-Index: 8
Last.Yun Liu (Lancaster University)H-Index: 2
view all 3 authors...
A characteristic aspect of risks in a complex, modern society is the nature and degree of the public response – sometimes significantly at variance with objective assessments of risk. A large part of the risk management task involves anticipating, explaining and reacting to this response. One of the main approaches we have for analysing the emergent public response, the social amplification of risk framework, has been the subject of little modelling. The purpose of this paper is to explore how s...
#1J S BusbyH-Index: 16
Regulative rules are central to the efforts made in organizations to ensure orderliness in the presence of physical danger. The reportedly routine violation of safety rules in organizations therefore brings into question the longstanding association of rules with organizational order, and the literature is sharply divided on whether rule violation represents a dangerous disorder or a reasonable way of getting by. This study is an attempt to carry out a more interpretive analysis, looking at how ...
12345678910