메뉴 건너뛰기




Volumn 25, Issue 1, 2008, Pages 35-42

Cybersecurity economic issues: Clearing the path to good practice

Author keywords

Cybersecurity; Economics; Models

Indexed keywords

DATA STRUCTURES; ECONOMIC ANALYSIS; SECURITY OF DATA;

EID: 39449096290     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/MS.2008.4     Document Type: Article
Times cited : (21)

References (32)
  • 1
    • 34250015784 scopus 로고    scopus 로고
    • Embedding Information Security Into the Organization
    • M.E. Johnson and E. Goetz, "Embedding Information Security Into the Organization," IEEE Security and Privacy, vol. 5, no. 3, 2007, pp. 16-24.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 16-24
    • Johnson, M.E.1    Goetz, E.2
  • 2
    • 34249986346 scopus 로고    scopus 로고
    • I'll Buy That! Cybersecurity in the Internet Marketplace
    • S.L. Pfleeger, M. Libicki, and M. Webber, "I'll Buy That! Cybersecurity in the Internet Marketplace," IEEE Security and Privacy, vol. 5, no. 3, 2007, pp. 25-31.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 25-31
    • Pfleeger, S.L.1    Libicki, M.2    Webber, M.3
  • 3
    • 84925838576 scopus 로고    scopus 로고
    • Proc. 17th Ann. Computer Security Applications Conf
    • Assoc. for Economic Service
    • R. Anderson, "Why Information Security Is Hard - An Economic Perspective," Proc. 17th Ann. Computer Security Applications Conf. Assoc. for Economic Service, 2001, pp. 358-365.
    • (2001) , pp. 358-365
    • Anderson, R.1
  • 6
    • 0037599474 scopus 로고    scopus 로고
    • The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market
    • Mar
    • K. Campbell et al., "The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market," J. Computer Security, Mar. 2003, pp. 431-448.
    • (2003) J. Computer Security , pp. 431-448
    • Campbell, K.1
  • 7
    • 77952004683 scopus 로고    scopus 로고
    • Impact of Software Vulnerability Announcements on the Market Value of Software Vendors: An Empirical Investigation
    • paper presented at
    • R. Telang and S. Wattal, "Impact of Software Vulnerability Announcements on the Market Value of Software Vendors: An Empirical Investigation," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, www.infosecon.net/workshop/pdf/ telang_wattal.pdf.
    • (2005) 4th Ann. Workshop Economics of Information Security (WEIS 05)
    • Telang, R.1    Wattal, S.2
  • 8
    • 67650336989 scopus 로고    scopus 로고
    • The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting
    • paper presented at
    • A. Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, www.infosecon.net/workshop/pdf/10.pdf.
    • (2005) 4th Ann. Workshop Economics of Information Security (WEIS 05)
    • Ozment, A.1
  • 9
    • 39449093273 scopus 로고    scopus 로고
    • Is Finding Security Holes a Good Idea? paper presented at 3rd Ann
    • E. Rescorla, "Is Finding Security Holes a Good Idea?" paper presented at 3rd Ann. Workshop Economics of Information Security (WEIS 04), 2004, www.dtc.umn.edu/weis2004/rescorla.pdf.
    • (2004) Workshop Economics of Information Security (WEIS 04)
    • Rescorla, E.1
  • 10
    • 0038811652 scopus 로고    scopus 로고
    • Full Disclosure and the Window of Exposure
    • 15 Sept. 2000
    • B. Schneier, "Full Disclosure and the Window of Exposure," Crypto-gram Newsletter, 15 Sept. 2000, www.schneier.com/ crypto-gram-0009.html.
    • Crypto-gram Newsletter
    • Schneier, B.1
  • 11
    • 0344899914 scopus 로고    scopus 로고
    • Sharing Information on Computer Systems: An Economic Analysis
    • L.A. Gordon, M.P. Loeb, and W. Lucyshyn, "Sharing Information on Computer Systems: An Economic Analysis," J. Accounting and Public Policy, vol. 22, no. 6, 2003, pp. 461-485.
    • (2003) J. Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 12
    • 30344462995 scopus 로고    scopus 로고
    • The Economic Incentives for Sharing Security Information
    • E. Gal-Or and A. Ghose, "The Economic Incentives for Sharing Security Information," Information Systems Research, vol. 16, no. 2, 2005, pp. 186-208.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 13
    • 39449117271 scopus 로고    scopus 로고
    • R. Anderson, Unsettling Parallels between Security and the Environment, paper presented at the Workshop Economics of Information Security (WEIS), 2002, www2.sims.berkeley.edu/resources/affiliates/ workshops/econsecurity/econws/37.txt.
    • R. Anderson, "Unsettling Parallels between Security and the Environment," paper presented at the Workshop Economics of Information Security (WEIS), 2002, www2.sims.berkeley.edu/resources/affiliates/ workshops/econsecurity/econws/37.txt.
  • 14
    • 39449107930 scopus 로고    scopus 로고
    • S. Schechter, Computer Security Strength and Risk: A Quantitative Approach, doctoral dissertation, Division of Eng. and Applied Science, Harvard Univ., 2004.
    • S. Schechter, "Computer Security Strength and Risk: A Quantitative Approach," doctoral dissertation, Division of Eng. and Applied Science, Harvard Univ., 2004.
  • 16
    • 20944441343 scopus 로고    scopus 로고
    • Market for Software Vulnerabilities? Think Again
    • K. Kannan and R. Telang, "Market for Software Vulnerabilities? Think Again," Management Science, vol. 51, no. 5, 2005, pp. 726-740.
    • (2005) Management Science , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 17
    • 32644482367 scopus 로고    scopus 로고
    • Avoiding Liability: An Alternative Route to More Secure Products
    • paper presented at
    • A. Shostack, "Avoiding Liability: An Alternative Route to More Secure Products," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, www.infosecon.net/workshop/pdf/ 44.pdf.
    • (2005) 4th Ann. Workshop Economics of Information Security (WEIS 05)
    • Shostack, A.1
  • 18
    • 84900406382 scopus 로고    scopus 로고
    • CyberInsurance as a Market-Based Solution to the Problem of Cybersecurity - A Case Study
    • paper presented at
    • J. Kesan, R. Majuca, and W. Yurcik, "CyberInsurance as a Market-Based Solution to the Problem of Cybersecurity - A Case Study," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, http://infosecon.net/workshop/pdf/42.pdf.
    • (2005) 4th Ann. Workshop Economics of Information Security (WEIS 05)
    • Kesan, J.1    Majuca, R.2    Yurcik, W.3
  • 19
    • 34250009730 scopus 로고    scopus 로고
    • Cyberinsurance in IT Security Management
    • W.S. Baer and A. Parkinson, "Cyberinsurance in IT Security Management," IEEE Security and Privacy, vol. 5, no. 3, 2007, pp. 50-56.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 50-56
    • Baer, W.S.1    Parkinson, A.2
  • 20
    • 4944234006 scopus 로고    scopus 로고
    • Return on Information Security Investments: Myths versus Realities
    • L. Gordon and M. Loeb, "Return on Information Security Investments: Myths versus Realities," Strategic Finance, vol. 84, no. 5, 2002, pp. 26-31.
    • (2002) Strategic Finance , vol.84 , Issue.5 , pp. 26-31
    • Gordon, L.1    Loeb, M.2
  • 21
    • 7444242205 scopus 로고    scopus 로고
    • The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers
    • H. Cavusoglu, B. Mishra, and S. Raghunathan, "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers," Int'l J. Electronic Commerce, vol. 9, no. 1, 2004, p. 70-104.
    • (2004) Int'l J. Electronic Commerce , vol.9 , Issue.1 , pp. 70-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 22
    • 19544371722 scopus 로고    scopus 로고
    • A Management Perspective on Risk of Security Threats to Information Systems
    • F. Farahmand et al., "A Management Perspective on Risk of Security Threats to Information Systems," Information Technology and Management, vol. 6, nos. 2-3, 2005, pp. 203-225.
    • (2005) Information Technology and Management , vol.6 , Issue.2-3 , pp. 203-225
    • Farahmand, F.1
  • 23
    • 32644481396 scopus 로고    scopus 로고
    • Quantitatively Differentiating System Security
    • paper presented at
    • S. Schechter, "Quantitatively Differentiating System Security," paper presented at 1st Workshop Economics of Information Security, 2002, www2.sims.berkeley.edu/resources/affiliates/workshops/ econsecurity/econws/31.pdf.
    • (2002) 1st Workshop Economics of Information Security
    • Schechter, S.1
  • 24
    • 33750950152 scopus 로고    scopus 로고
    • Evaluating Information Security Investments from Attackers Perspective: The Return-on-Attack
    • paper presented at
    • M. Cremonini and P. Martini, "Evaluating Information Security Investments from Attackers Perspective: The Return-on-Attack," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005; www.infosecon.net/workshop/pdf/23.pdf.
    • (2005) 4th Ann. Workshop Economics of Information Security (WEIS 05)
    • Cremonini, M.1    Martini, P.2
  • 25
    • 4243121902 scopus 로고    scopus 로고
    • A Framework for Using Insurance for Cyber-Risk Management
    • L. Gordon, M. Loeb, and S. Tashfeen, "A Framework for Using Insurance for Cyber-Risk Management," Comm. ACM, vol. 46, no. 3, 2003, pp. 81-85.
    • (2003) Comm. ACM , vol.46 , Issue.3 , pp. 81-85
    • Gordon, L.1    Loeb, M.2    Tashfeen, S.3
  • 26
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating Information Security Investments Using the Analytical Hierarchy Process
    • L. Gordon and M. Loeb, "Evaluating Information Security Investments Using the Analytical Hierarchy Process," Comm. ACM, vol. 48, no. 2, 2005, pp. 78-83.
    • (2005) Comm. ACM , vol.48 , Issue.2 , pp. 78-83
    • Gordon, L.1    Loeb, M.2
  • 28
    • 34147094836 scopus 로고    scopus 로고
    • Analyzing the Risks of Information Security Investments with Monte-Carlo Simulations
    • paper presented at
    • J. Conrad, "Analyzing the Risks of Information Security Investments with Monte-Carlo Simulations," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, http://infosecon.net/ workshop/pdf/13.pdf.
    • (2005) 4th Ann. Workshop Economics of Information Security (WEIS 05)
    • Conrad, J.1
  • 30
    • 32644477861 scopus 로고    scopus 로고
    • Assessing Damages of Information Security Incidents and Selecting Control Measures: A Case Study Approach
    • paper presented at
    • F. Farahmand et al., "Assessing Damages of Information Security Incidents and Selecting Control Measures: A Case Study Approach," paper presented at 4th Ann. Workshop Economics of Information Security (WEIS 05), 2005, www.infosecon.net/workshop/pdf/39.pdf.
    • (2005) 4th Ann. Workshop Economics of Information Security (WEIS 05)
    • Farahmand, F.1
  • 31
    • 4243109556 scopus 로고    scopus 로고
    • A Model for Evaluating: IT Security Investments
    • H. Cavusoglu, B. Mishra, and S. Raghunathan, "A Model for Evaluating: IT Security Investments," Comm. ACM, vol. 47, no. 7, 2004, pp. 87-92.
    • (2004) Comm. ACM , vol.47 , Issue.7 , pp. 87-92
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 32
    • 67649666107 scopus 로고    scopus 로고
    • A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision Making
    • paper presented at
    • R. Rue, S.L. Pfleeger, and D. Ortiz, "A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision Making," paper presented at 2007 Workshop Economics of Information Security (WEIS 07), 2007, http://weis07.infosecon.net/ papers/76.pdf.
    • (2007) 2007 Workshop Economics of Information Security (WEIS 07)
    • Rue, R.1    Pfleeger, S.L.2    Ortiz, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.