메뉴 건너뛰기




Volumn 27, Issue 5, 2007, Pages 1283-1297

A framework for linking cybersecurity metrics to the modeling of macroeconomic interdependencies

Author keywords

Cybersecurity; Disaster analysis; Dynamic modeling; Input output analysis; Interdependencies; Metrics; Risk management

Indexed keywords

DISASTER ANALYSIS; METRICS;

EID: 36849039045     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/j.1539-6924.2007.00957.x     Document Type: Review
Times cited : (61)

References (45)
  • 3
    • 34548047217 scopus 로고    scopus 로고
    • American National Standards Institute/Instrumentation, Systems, and Automation (ANSI/ISA). ANSI/ISA-TR99.00.02-2004. Research Triangle Park, NC.
    • American National Standards Institute/Instrumentation, Systems, and Automation (ANSI/ISA) 2004). Integrating Electronic Security into the Manufacturing and Control Systems Environment. ANSI/ISA-TR99.00.02-2004. Research Triangle Park, NC.
    • (2004) Integrating Electronic Security into the Manufacturing and Control Systems Environment.
  • 4
    • 4043163566 scopus 로고    scopus 로고
    • American Petroleum Institute (API). Available at
    • American Petroleum Institute (API) 2003). Security Guidelines for the Petroleum Industry. Available at http://api-ec.api.org/filelibrary/ Security_Guidance2003.pdf.
    • (2003) Security Guidelines for the Petroleum Industry.
  • 9
    • 0035688342 scopus 로고    scopus 로고
    • Integrating transportation network and regional economic models to estimate the costs of a large urban earthquake
    • &
    • Cho, S., Gordon, P., Moore, J. E. II., Richardson, H. W., Shinozuka, M., & Chang, S. (2001). Integrating transportation network and regional economic models to estimate the costs of a large urban earthquake. Journal of Regional Science, 41, 39 65.
    • (2001) Journal of Regional Science , vol.41 , pp. 39-65
    • Cho, S.1    Gordon, P.2    Moore, I.I.J.E.3    Richardson, H.W.4    Shinozuka, M.5    Chang, S.6
  • 11
    • 84858508868 scopus 로고
    • Department of the Army. FM 34-36: Special Operations Forces Intelligence and Electronic Warfare Operations. Army Headquarters, Washington DC. Available at
    • Department of the Army 1991). FM 34-36: Special Operations Forces Intelligence and Electronic Warfare Operations. Army Headquarters, Washington DC. Available at http://www.fas.org/irp/doddir/army/fm34 - 36/appd.htm.
    • (1991)
  • 12
    • 84858510914 scopus 로고    scopus 로고
    • Department of the Army. Joint Tactics, Techniques, and Procedures for Special Operations Targeting Mission Planning. Joint Publication 3-05.2. Washington, DC: Joint Chiefs of Staff. Available at
    • Department of the Army 2003). Joint Tactics, Techniques, and Procedures for Special Operations Targeting Mission Planning. Joint Publication 3-05.2. Washington, DC: Joint Chiefs of Staff. Available at http://www.dtic.mil/ doctrine/jel/new_pubs/jp3_05_2print.pdf.
    • (2003)
  • 13
    • 84858511651 scopus 로고    scopus 로고
    • Department of Homeland Security (DHS). National Infrastructure Protection Plan. Available at
    • Department of Homeland Security (DHS) 2006). National Infrastructure Protection Plan. Available at http://www.dhs.gov/interweb/assetlibrary/ NIPP_Plan.pdf.
    • (2006)
  • 15
    • 84858511649 scopus 로고    scopus 로고
    • Study: Spam Costing Companies $22 Billion a Year. Available at
    • Edwards, K. (2005). Study: Spam Costing Companies $22 Billion a Year. Available at http://blogcritics.org/archives/2005/02/05/010437.php.
    • (2005)
    • Edwards, K.1
  • 16
    • 36849022225 scopus 로고    scopus 로고
    • Government Accountability Office (GAO). GAO.
    • Government Accountability Office (GAO) 2002). Review of Studies of the Economic Impact of the September 11, 2001 Terrorist Attacks on the World Trade Center. Washington, DC : GAO.
    • (2002)
  • 17
    • 0036609708 scopus 로고    scopus 로고
    • Roadmap for modeling risks of terrorism to the homeland
    • Haimes, Y. Y. (2002). Roadmap for modeling risks of terrorism to the homeland. Journal of Infrastructure Systems, 8 (2 35 41.
    • (2002) Journal of Infrastructure Systems , vol.8 , Issue.2 , pp. 35-41
    • Haimes, Y.Y.1
  • 20
    • 0035281847 scopus 로고    scopus 로고
    • Leontief-based model of risk in complex interconnected infrastructures
    • &
    • Haimes Y. Y., & Jiang, P. (2001). Leontief-based model of risk in complex interconnected infrastructures. Journal of Infrastructure Systems, 7, 1 12.
    • (2001) Journal of Infrastructure Systems , vol.7 , pp. 1-12
    • Haimes, Y.Y.1    Jiang, P.2
  • 21
    • 0036090498 scopus 로고    scopus 로고
    • Risk filtering, ranking, and management framework using hierarchical holographic modeling
    • &
    • Haimes, Y. Y., Kaplan, S., & Lambert, J. H. (2002). Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Analysis, 22 (2 383 397.
    • (2002) Risk Analysis , vol.22 , Issue.2 , pp. 383-397
    • Haimes, Y.Y.1    Kaplan, S.2    Lambert, J.H.3
  • 22
    • 0003531721 scopus 로고    scopus 로고
    • Ph.D. Dissertation, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, PA.
    • Howard J. (1997). An Analysis of Security Incidents on the Internet, 1989-1995. Ph.D. Dissertation, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, PA.
    • (1997) An Analysis of Security Incidents on the Internet, 1989-1995.
    • Howard, J.1
  • 24
    • 84859206460 scopus 로고    scopus 로고
    • Homeland Security Presidential Directive-5 (HSPD-5). Retrieved April 3, 2006 from
    • Homeland Security Presidential Directive-5 (HSPD-5) 2003). Management of Domestic Incidents. Retrieved April 3, 2006 from http://www.whitehouse.gov/news/ releases/2003/02/20030228-9.html.
    • (2003) Management of Domestic Incidents.
  • 27
    • 0003234739 scopus 로고    scopus 로고
    • Benchmark input-output accounts for the US economy
    • Lawson, A. M. (1997). Benchmark input-output accounts for the US economy. Survey of Current Business, 77, 36 82.
    • (1997) Survey of Current Business , vol.77 , pp. 36-82
    • Lawson, A.M.1
  • 28
    • 0002312931 scopus 로고
    • Input-output economics
    • Leontief, W. W. (1951a). Input-output economics. Scientific American, 10, 15 21.
    • (1951) Scientific American , vol.10 , pp. 15-21
    • Leontief, W.W.1
  • 32
    • 36849009848 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST). Security Metrics Guide for Information Technology Systems. NIST Special Publication 800-55. Gaithersburg, MD: National Institute of Standards and Technology.
    • National Institute of Standards and Technology (NIST) 2003). Security Metrics Guide for Information Technology Systems. NIST Special Publication 800-55. Gaithersburg, MD: National Institute of Standards and Technology.
    • (2003)
  • 33
    • 0003714340 scopus 로고    scopus 로고
    • National Research Council (NRC). Committee on Information System Trustworthiness, National Research Council. Washington, DC: National Academy Press.
    • National Research Council (NRC) 1999). Trust in Cyberspace. Committee on Information System Trustworthiness, National Research Council. Washington, DC : National Academy Press.
    • (1999) Trust in Cyberspace.
  • 34
    • 36849058279 scopus 로고    scopus 로고
    • National Transportation Safety Board (NTSB). Washington, DC: National Transportation Safety Board.
    • National Transportation Safety Board (NTSB) 2002). Pipeline Accident Report: Pipeline Rupture and Subsequent Fire in Bellingham, Washington, June 10, 1999. Washington, DC : National Transportation Safety Board.
    • (2002)
  • 35
    • 0004225134 scopus 로고    scopus 로고
    • NRC. Washington, DC: National Academy Press.
    • NRC 2002). Making the Nation Safer. Washington, DC : National Academy Press.
    • (2002) Making the Nation Safer.
  • 36
    • 84858508869 scopus 로고    scopus 로고
    • RAND. Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology. Document information available at
    • RAND 2003). Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology. Document information available at http://www.rand.org/pubs/monograph_reports/MR1601/.
    • (2003)
  • 37
    • 33644672855 scopus 로고    scopus 로고
    • Economic principles, issues, and research priorities in hazard loss estimation
    • In. Y. Okuyama. & S. Chang (. Eds. pp.). New York: Springer-Verlag.
    • Rose, A. (2004). Economic principles, issues, and research priorities in hazard loss estimation. In Y. Okuyama & S. Chang (Eds. Modeling Spatial and Economic Impacts of Disasters (pp. 13 36). New York : Springer-Verlag.
    • (2004) Modeling Spatial and Economic Impacts of Disasters , pp. 13-36
    • Rose, A.1
  • 38
    • 14744293206 scopus 로고    scopus 로고
    • Modeling regional economic resilience to disasters: A computable general equilibrium analysis of water service disruptions
    • &
    • Rose, A., & Liao, S. (2005). Modeling regional economic resilience to disasters: A computable general equilibrium analysis of water service disruptions. Journal of Regional Science, 45, 75 112.
    • (2005) Journal of Regional Science , vol.45 , pp. 75-112
    • Rose, A.1    Liao, S.2
  • 39
    • 33644665618 scopus 로고    scopus 로고
    • Inoperability input-output modeling of disruptions to interdependent economic systems
    • Santos, J. R. (2006). Inoperability input-output modeling of disruptions to interdependent economic systems. Systems Engineering, 9 (1 20 34.
    • (2006) Systems Engineering , vol.9 , Issue.1 , pp. 20-34
    • Santos, J.R.1
  • 40
    • 8844234423 scopus 로고    scopus 로고
    • Modeling the demand reduction input-output inoperability due to terrorism of interconnected infrastructures
    • &
    • Santos, J. R., & Haimes, Y. Y. (2004). Modeling the demand reduction input-output inoperability due to terrorism of interconnected infrastructures. Risk Analysis, 24, 1437 1451.
    • (2004) Risk Analysis , vol.24 , pp. 1437-1451
    • Santos, J.R.1    Haimes, Y.Y.2
  • 41
    • 0346060803 scopus 로고    scopus 로고
    • The modified star graph and the petal diagram: Two new visual aids for discrete alternative multicriteria decision making
    • &
    • Tan, Y. S., & Fraser, N. M. (1998). The modified star graph and the petal diagram: Two new visual aids for discrete alternative multicriteria decision making. Journal of Multicriteria Decision Analysis, 7, 20 33.
    • (1998) Journal of Multicriteria Decision Analysis , vol.7 , pp. 20-33
    • Tan, Y.S.1    Fraser, N.M.2
  • 42
    • 84858511647 scopus 로고    scopus 로고
    • & Proceedings of 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY. Available at
    • Tidwell T., Larson, R., Fitch, K., & Hale, J. (2001). Modeling internet attacks. Proceedings of 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY. Available at http://www.itoc.usma.edu/Workshop/2001/Authors/SubmittedAbstracts/paperT1C1(50). pdf.
    • (2001) Modeling Internet Attacks
    • Tidwell, T.1    Larson, R.2    Fitch, K.3    Hale, J.4
  • 43
    • 36849082635 scopus 로고
    • Simulated nation-wide consequences of disruptions to the petroleum industry in the western US gulf coast
    • & In. National Petroleum Council.
    • Turk, A., Raynor, R., Corbet, T., Conrad, S., Beyeler, W., & Brown, T. (1989). Simulated nation-wide consequences of disruptions to the petroleum industry in the western US gulf coast. In Petroleum Storage & Transportation. National Petroleum Council.
    • (1989) Petroleum Storage & Transportation.
    • Turk, A.1    Raynor, R.2    Corbet, T.3    Conrad, S.4    Beyeler, W.5    Brown, T.6
  • 44
    • 33845443202 scopus 로고    scopus 로고
    • A perspective on cybersecurity research in the United States
    • & In. Washington, DC: National Research Council of the National Academies.
    • Wulf, W., & Jones, A. (2004). A perspective on cybersecurity research in the United States. In Terrorism: Reducing Vulnerabilities and Improving Responses. Washington, DC : National Research Council of the National Academies.
    • (2004) Terrorism: Reducing Vulnerabilities and Improving Responses.
    • Wulf, W.1    Jones, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.