database of 15,000 cyber incidents in Japan and report
on the accuracy of the model. We also compare our
model with the JO model and clarify the relationship
between them.
The remainder of our paper is organized as fol-
lows. In Section 2, we briefly review some related
studies including the JO model. After we define the
proposed model mathematically in Section 3, we eval-
uate its accuracy in Section 4. In Section 5, we discuss
our results, and we conclude the work in Section 6.
2 PREVIOUS STUDIES
2.1 The JO Model
The JNSA Security Damage Investigation Working
Group collected public information of cyber incidents
reported in newspapers, Internet news, and documents
related to incidents published by organizations since
2002. They classified incidents by the type of busi-
ness of the organizations, the number of customers,
the leakage source, and the number of records com-
promised in the incident. The JNSA dataset consists
of attributes including “date,” “information manage-
ment and holding officer,” “industry type,” “social
contribution degree,” “number of victims,” “classi-
fied leakage information,” “incident cause,” “leakage
route,” “incident handling quality,” and “kinds of in-
formation leaked (Name, address, phone number, or,
date of birth).” Table 1 shows the statistics of cyber
incidents occurring in Japan from 2005 through 2016.
The JNSA Damage Operation Model for Personal
Information Leakage (JO model) calculates the cost
to each company from these information leakages
(Japan Network Security Association, 2016) as fol-
lows.
cost = constant × sensitivity × identifiability (1)
× responsibility × handling
where constant is 500 JPY (equivalent to 5 USD),
and sensitivity is defined with the features of compro-
mised personal information as
sensitivity = max(10
max(x)−1
+ 5
max(y)−1
)
where x is a set of constants that are specified by the
mental impact on the individual who suffers the data
breach, and y is a set of constants defined by the fi-
nancial impact of a cyber incident. The range of x
and y is {1,2,3}, and the assignment is predetermined
by a common table. responsibility is defined as 2 if
the company is large or governmental; 1 otherwise.
identifiability is defined as follows.
identifiability =
6 if a record contains both name
and mailing address ,
3 if a record contains name
or (address and telephone number),
1 otherwise.
2.2 Romanosky’s Model
Romanosky proposes a model to estimate the total
cost incurred by a company in each year based on
11,705 incident reports of American companies from
2005 to 2014 obtained from Advicen
1
as follows (Ro-
manosky, 2016).
log(cost
i,t
) = β
0
+ β
1
· log(revenue
i,t
) +β
2
· log(records
i,t
)
+ β
3
· repeat
i,t
+ β
4
· malicious
i,t
+ β
5
· lawsuit
i,t
+ α· FirmType
i,t
+ λ
t
+ ρ
ind
+ µ
i,t
.
(2)
The values of each coefficient are shown in Table 2.
Variable i, t refers to the data of company i in year
t, and “records” shows the number of compromised
personal information records. “repeat” and “lawsuit”
are Boolean values, and “Firm Type” is a dummy vari-
able, defined as 1 if it is applicable, whether the event
is filed in the past, whether it was sued for the inci-
dent, whether it is a government agency or a general
company, otherwise 0, respectively.
However, note that Romanosky’s model is a re-
gression expression based on information from com-
panies in the US, and it is not clear whether the same
model can be applied to Japanese companies.
2.3 Other Studies
In the United States, identity theft resulted in cor-
porate and consumer losses of $56 billion dollars in
2005, with up to 35 percent of known identity thefts
caused by corporate data breaches. Romanosky et
al. estimated the impact of data breach disclosure
laws on identity theft from 2002 to 2009 (Romanosky
et al., 2011). They found that adoption of data breach
disclosure laws reduce identity theft caused by data
breaches by 6.1 percent, on average.
The odds of a firm being sued are 3.5 times greater
when individuals suffer financial harm, but 6 times
lower when the firm provides free credit monitoring.
Moreover, defendants settle 30 percent more often
when plaintiffs allege financial loss, or when faced
with a certified class action suit (Romanosky et al., ).
Gordon proposed a model that determines the op-
timal amount to invest to protect a given set of in-
formation (Gordon and Loeb, 2002) (Gordon et al.,
1
https://www.advisenltd.com/
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
354