메뉴 건너뛰기




Volumn 232, Issue , 2007, Pages 25-35

Value creation and return on security investments (ROSI)

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS SEGMENTS; IT SECURITY; PRODUCTIVITY PARADOX; SECURITY INVESTMENTS; SHAREHOLDER VALUES; VALUE CREATION;

EID: 36248980334     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-72367-9_3     Document Type: Conference Paper
Times cited : (11)

References (18)
  • 1
    • 0003543183 scopus 로고
    • Valuation, Measuring and Managing the value of companies
    • second edition, John Wiley & Sons, Inc
    • T. Copeland, T. Koller, and J. Murrin, Valuation, Measuring and Managing the value of companies, second edition, McKinsey & Company, Inc. (John Wiley & Sons, Inc, 1995).
    • (1995) McKinsey & Company, Inc
    • Copeland, T.1    Koller, T.2    Murrin, J.3
  • 3
    • 36249030480 scopus 로고    scopus 로고
    • C. Alberts and A. Dorofee, Managing Information Security Risks, The OCTAVE Approach, Carnegie Mellon Software Engineering Institute, USA (Addison Wesley, 2003).
    • C. Alberts and A. Dorofee, Managing Information Security Risks, The OCTAVE Approach, Carnegie Mellon Software Engineering Institute, USA (Addison Wesley, 2003).
  • 5
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • ISSN 0167 -4048
    • B. V. Solms and R. V. Solms, The 10 deadly sins of information security management, in: Computers & Security, Vol.23 No 5 (ISSN 0167 -4048, 2004), pp. 371-376.
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 371-376
    • Solms, B.V.1    Solms, R.V.2
  • 6
    • 36248933604 scopus 로고    scopus 로고
    • Tactical level - an overview of the latest trends in risk analysis, certification, best practices and international standards
    • Fribourg, Switzerland, February
    • J.H.P. Eloff, Tactical level - an overview of the latest trends in risk analysis, certification, best practices and international standards. Information Security Architectures Workshop, Fribourg, Switzerland, February 2002.
    • (2002) Information Security Architectures Workshop
    • Eloff, J.H.P.1
  • 7
    • 36249012487 scopus 로고    scopus 로고
    • P.A. David, The Dynamo and the Computer: An Historical Perspective on the Modern Productivity Paradox, (American Economic Review, 1990).
    • P.A. David, The Dynamo and the Computer: An Historical Perspective on the Modern Productivity Paradox, (American Economic Review, 1990).
  • 11
    • 36248970070 scopus 로고    scopus 로고
    • K.J. Soo Hoo, A.W. Sudbury, A.R. Jaquith, Tangible ROI through Secure Software Engineering (Secure Business Quarterly, 4th Quarter 2001).
    • K.J. Soo Hoo, A.W. Sudbury, A.R. Jaquith, Tangible ROI through Secure Software Engineering (Secure Business Quarterly, 4th Quarter 2001).
  • 12
    • 36248935119 scopus 로고    scopus 로고
    • The CERT® Coordination Center April 30
    • The CERT® Coordination Center (April 30, 2003); http://www.cert.org.
    • (2003)
  • 13
    • 36249020356 scopus 로고    scopus 로고
    • S.D. Moitra and S.L. Konda, A Simulation Model for Managing Survivability of Networked Information Systems, Technical Report CMU/ SEI-2000-TR-020, Carnegie Mellon Software Engineering Institute, 2000.
    • S.D. Moitra and S.L. Konda, A Simulation Model for Managing Survivability of Networked Information Systems, Technical Report CMU/ SEI-2000-TR-020, Carnegie Mellon Software Engineering Institute, 2000.
  • 14
    • 36249016798 scopus 로고    scopus 로고
    • D.W. Straub and R.J. Welke, Coping With Systems Risk: Security Planning Models for Management Decision Making (MIS Quarterly, December 1998).
    • D.W. Straub and R.J. Welke, Coping With Systems Risk: Security Planning Models for Management Decision Making (MIS Quarterly, December 1998).
  • 16
    • 33750949223 scopus 로고    scopus 로고
    • M. K. Nalla, K. Christian, M. Morash, and P. Schram, Practitioners' perceptions of graduate curriculum in security education (Security Journal, 6, 1995), pp. 93-99.
    • M. K. Nalla, K. Christian, M. Morash, and P. Schram, Practitioners' perceptions of graduate curriculum in security education (Security Journal, 6, 1995), pp. 93-99.
  • 18
    • 36249014802 scopus 로고    scopus 로고
    • Eleventh Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute
    • Eleventh Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2006; www.gocsi.com.
    • (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.