메뉴 건너뛰기




Volumn 44, Issue 1, 2007, Pages 1-16

Network externalities, layered protection and IT security risk management

Author keywords

IT risk analysis; IT risk management; IT risk mitigation; Security investments; Security resource planning

Indexed keywords

INFORMATION THEORY; RESOURCE ALLOCATION; RISK ANALYSIS; SECURITY OF DATA;

EID: 34548477450     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2006.08.009     Document Type: Article
Times cited : (43)

References (36)
  • 3
    • 0018481721 scopus 로고
    • Assessing project implementation risk: a methodological approach
    • Anderson J., and Narasimhan R. Assessing project implementation risk: a methodological approach. Management Science 25 6 (1979) 512-521
    • (1979) Management Science , vol.25 , Issue.6 , pp. 512-521
    • Anderson, J.1    Narasimhan, R.2
  • 4
    • 0028731436 scopus 로고
    • The effect of intrusion detection management methods on the return on investment
    • Badenhorst K.P., and Eloff J.H.P. The effect of intrusion detection management methods on the return on investment. Computers & Security 13 5 (1994) 411-435
    • (1994) Computers & Security , vol.13 , Issue.5 , pp. 411-435
    • Badenhorst, K.P.1    Eloff, J.H.P.2
  • 5
    • 0000111181 scopus 로고    scopus 로고
    • Controlling prototype development through risk analysis
    • Baskerville R.L., and Stage J. Controlling prototype development through risk analysis. MIS Quarterly 20 4 (1996) 481-501
    • (1996) MIS Quarterly , vol.20 , Issue.4 , pp. 481-501
    • Baskerville, R.L.1    Stage, J.2
  • 7
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: a comparison of decision and game theory approaches
    • Cavusoglu H., and Raghunathan S. Configuration of detection software: a comparison of decision and game theory approaches. Decision Analysis 1 3 (2004) 131-148
    • (2004) Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 9
    • 0029718539 scopus 로고    scopus 로고
    • Risk analysis modelling with the use of fuzzy logic
    • de Ru W.G., and Eloff J.H.P. Risk analysis modelling with the use of fuzzy logic. Computers & Security 15 3 (1996) 239-248
    • (1996) Computers & Security , vol.15 , Issue.3 , pp. 239-248
    • de Ru, W.G.1    Eloff, J.H.P.2
  • 11
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • Gaffney Jr. J.E., and Ulvila J.W. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis 1 1 (2004) 39-54
    • (2004) Decision Analysis , vol.1 , Issue.1 , pp. 39-54
    • Gaffney Jr., J.E.1    Ulvila, J.W.2
  • 13
    • 30744472925 scopus 로고
    • Principles and procedures of the lram approach to information systems risk analysis and management
    • Guarro S.B. Principles and procedures of the lram approach to information systems risk analysis and management. Computer & Security 6 6 (1987) 493-504
    • (1987) Computer & Security , vol.6 , Issue.6 , pp. 493-504
    • Guarro, S.B.1
  • 14
    • 32544451794 scopus 로고    scopus 로고
    • Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
    • Gupta M., Rees J., Chaturvedi A., and Chi J. Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decision Support Systems 41 3 (2006) 592-603
    • (2006) Decision Support Systems , vol.41 , Issue.3 , pp. 592-603
    • Gupta, M.1    Rees, J.2    Chaturvedi, A.3    Chi, J.4
  • 18
    • 0000133760 scopus 로고
    • Threats to information systems: today's reality, yesterday's understanding
    • Loch K.D., Carr H.H., and Warkentin M.E. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 16 2 (1992) 173-186
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 19
    • 0032348156 scopus 로고    scopus 로고
    • Attention shaping and software risk - a categorical analysis of four classical risk management approaches
    • Lyytinen K., Mathiassen L., and Ropponen J. Attention shaping and software risk - a categorical analysis of four classical risk management approaches. Information Systems Research 9 3 (1998) 233-255
    • (1998) Information Systems Research , vol.9 , Issue.3 , pp. 233-255
    • Lyytinen, K.1    Mathiassen, L.2    Ropponen, J.3
  • 20
    • 0001591897 scopus 로고
    • Portfolio approach to information systems
    • McFarlan F.W. Portfolio approach to information systems. Harvard Business Review 59 5 (1981) 142-150
    • (1981) Harvard Business Review , vol.59 , Issue.5 , pp. 142-150
    • McFarlan, F.W.1
  • 22
    • 34548512776 scopus 로고    scopus 로고
    • Dominance approach to risk analysis of computer systems
    • Ngai E.W.T., and Wat F.K.T. Dominance approach to risk analysis of computer systems. Decision Support Systems 37 4 (2004) 485-500
    • (2004) Decision Support Systems , vol.37 , Issue.4 , pp. 485-500
    • Ngai, E.W.T.1    Wat, F.K.T.2
  • 24
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo R., Deswarte Y., and Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25 5 (1999) 633-650
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 26
    • 55249117122 scopus 로고
    • Dominance approach to risk analysis of computer systems
    • Post G.V., and Diltz J.D. Dominance approach to risk analysis of computer systems. MIS Quarterly 10 4 (1986) 363-375
    • (1986) MIS Quarterly , vol.10 , Issue.4 , pp. 363-375
    • Post, G.V.1    Diltz, J.D.2
  • 28
    • 0041766619 scopus 로고    scopus 로고
    • 2003 CSI/FBI computer crime and security survey
    • Tech. Rep.
    • Richardson R. 2003 CSI/FBI computer crime and security survey. Computer Security Journal (2003) Tech. Rep.
    • (2003) Computer Security Journal
    • Richardson, R.1
  • 29
  • 32
    • 0000280419 scopus 로고
    • Effective is security: an empirical study
    • Straub D.W. Effective is security: an empirical study. Information Systems Research 1 3 (1990) 255-276
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 33
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: security planning models for management decision-making
    • Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision-making. MIS Quarterly 22 4 (1998) 441-469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 34
    • 25444498268 scopus 로고    scopus 로고
    • Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis
    • Tanna G.B., Gupta M., Rao H.R., and Upadhyaya S. Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis. Decision Support Systems 41 1 (2005) 242-261
    • (2005) Decision Support Systems , vol.41 , Issue.1 , pp. 242-261
    • Tanna, G.B.1    Gupta, M.2    Rao, H.R.3    Upadhyaya, S.4
  • 36
    • 34548477863 scopus 로고    scopus 로고
    • Management of information security
    • Thompson, Boston, Massachusetts
    • Whitman M.E., and Mattord H.J. Management of information security. Course Technology (2004), Thompson, Boston, Massachusetts
    • (2004) Course Technology
    • Whitman, M.E.1    Mattord, H.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.