메뉴 건너뛰기




Volumn 50, Issue 10, 2007, Pages 101-106

Necessary measures: Metric-driven information security risk assessment and decision making

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; DATA ACQUISITION; DECISION MAKING; MATHEMATICAL MODELS; RISK ASSESSMENT;

EID: 34848920878     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/1290958.1290969     Document Type: Article
Times cited : (37)

References (11)
  • 1
    • 34848836808 scopus 로고    scopus 로고
    • The state of information security 2003
    • Oct. 15
    • Berinato, S. The state of information security 2003. CIO Magazine 17, 2 (Oct. 15, 2003).
    • (2003) CIO Magazine , vol.17 , pp. 2
    • Berinato, S.1
  • 2
    • 7444242205 scopus 로고    scopus 로고
    • The effect of information security breach announcements on shareholder wealth: Capital market reactions for breached firms and Internet security developers
    • Fall
    • Cavusoglu, H., Mishra, B., and Rathunathan, S. The effect of information security breach announcements on shareholder wealth: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce 9, 1 (Fall 2004), 69-104.
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69-104
    • Cavusoglu, H.1    Mishra, B.2    Rathunathan, S.3
  • 3
    • 4243109556 scopus 로고    scopus 로고
    • A model for evaluating IT security investments
    • July
    • Cavusoglu, H., Mishra, B., and Raghunathan, S. A model for evaluating IT security investments. Commun. ACM 47, 7 (July 2004), 87-92.
    • (2004) Commun. ACM , vol.47 , Issue.7 , pp. 87-92
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 4
    • 0001229241 scopus 로고
    • Organizational information requirements, media richness, and structural design
    • May
    • Daft, R. and Lengel, R. Organizational information requirements, media richness, and structural design. Management Science 32, 4 (May 1986), 554-569.
    • (1986) Management Science , vol.32 , Issue.4 , pp. 554-569
    • Daft, R.1    Lengel, R.2
  • 6
    • 0003615205 scopus 로고    scopus 로고
    • A Common Language for Computer Security Incidents
    • SAND98-8667, Oct. 1998;
    • Howard, J. and Longstaff, T. A Common Language for Computer Security Incidents. Sandia National Laboratories Report SAND98-8667, Oct. 1998; www.cert.org/research/taxonomy_988667.pdf.
    • Sandia National Laboratories Report
    • Howard, J.1    Longstaff, T.2
  • 8
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Dec
    • Straub, D. and Welke, R. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22, 4 (Dec. 1998), 441-470.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-470
    • Straub, D.1    Welke, R.2
  • 10
    • 34848926387 scopus 로고    scopus 로고
    • Verton, D. DHS seeks real-world data on security breaches, Sept. 20
    • Verton, D. DHS seeks real-world data on security breaches. Computerworld (Sept. 20, 2004).
    • (2004) Computerworld
  • 11
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • Aug
    • Whitman, M. Enemy at the gate: Threats to information security. Commun. ACM 46, 8 (Aug. 2003), 91-95.
    • (2003) Commun. ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.