-
1
-
-
84925838576
-
-
Anderson R. Why information security is hard - an economic perspective. In: IEEE Proceedings of the 17th Annual Computer Security Applications Conference; 2001. p. 358-65.
-
Anderson R. Why information security is hard - an economic perspective. In: IEEE Proceedings of the 17th Annual Computer Security Applications Conference; 2001. p. 358-65.
-
-
-
-
2
-
-
3142656206
-
Portfolio choice and equilibrium in capital markets with safety-first investors
-
Arzac E., and Bawa V. Portfolio choice and equilibrium in capital markets with safety-first investors. Journal of Financial Economics 14 3 (1977) 277-288
-
(1977)
Journal of Financial Economics
, vol.14
, Issue.3
, pp. 277-288
-
-
Arzac, E.1
Bawa, V.2
-
3
-
-
0242665376
-
-
Blakley B, McDermott E, Greer D. Information security is information risk management. In: ACM proceedings of the workshop on new security paradigms; 2001. p. 97-104.
-
Blakley B, McDermott E, Greer D. Information security is information risk management. In: ACM proceedings of the workshop on new security paradigms; 2001. p. 97-104.
-
-
-
-
5
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu H., Mishra B., and Raghunathan S. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16 l (2005) 28-46
-
(2005)
Information Systems Research
, vol.16
, Issue.l
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
6
-
-
0034158883
-
Information security management: a hierarchical framework for various approaches
-
Eloff M.M., and von Solms S.H. Information security management: a hierarchical framework for various approaches. Computers and Security 19 3 (2000) 243-256
-
(2000)
Computers and Security
, vol.19
, Issue.3
, pp. 243-256
-
-
Eloff, M.M.1
von Solms, S.H.2
-
7
-
-
9744234714
-
one approach to risk assessment
-
Farquhar B. one approach to risk assessment. Computers and Security 10 l (1991) 21-23
-
(1991)
Computers and Security
, vol.10
, Issue.l
, pp. 21-23
-
-
Farquhar, B.1
-
8
-
-
0034159453
-
Information systems risk management: key concepts and business processes
-
Finne T. Information systems risk management: key concepts and business processes. Computers and Security 19 3 (2000) 234-242
-
(2000)
Computers and Security
, vol.19
, Issue.3
, pp. 234-242
-
-
Finne, T.1
-
9
-
-
44849091397
-
-
Gehani A. Performance-sensitive real-time risk management is NP-Hard. In: Proceedings of the workshop on foundations of computer security affiliated with 19th IEEE symposium on logic in computer science (LICS); 2004. p. 1-12.
-
Gehani A. Performance-sensitive real-time risk management is NP-Hard. In: Proceedings of the workshop on foundations of computer security affiliated with 19th IEEE symposium on logic in computer science (LICS); 2004. p. 1-12.
-
-
-
-
10
-
-
0035149661
-
From risk analysis to security requirements
-
Gerber M., and von Solms R. From risk analysis to security requirements. Computers and Security 20 7 (2001) 577-584
-
(2001)
Computers and Security
, vol.20
, Issue.7
, pp. 577-584
-
-
Gerber, M.1
von Solms, R.2
-
11
-
-
15744404682
-
Management of risk in the information age
-
Gerber M., and von Solms R. Management of risk in the information age. Computers and Security 24 l (2005) 16-30
-
(2005)
Computers and Security
, vol.24
, Issue.l
, pp. 16-30
-
-
Gerber, M.1
von Solms, R.2
-
12
-
-
0030367193
-
Risk vulnerability and the tempering effect of background risk
-
Gollier C., and Pratt J.W. Risk vulnerability and the tempering effect of background risk. Econometrica 64 5 (1996) 1109-1123
-
(1996)
Econometrica
, vol.64
, Issue.5
, pp. 1109-1123
-
-
Gollier, C.1
Pratt, J.W.2
-
14
-
-
33745210521
-
Budgeting process for information security expenditures
-
Gordon L.A., and Loeb M.P. Budgeting process for information security expenditures. Communications of the ACM 49 1 (2006) 121-125
-
(2006)
Communications of the ACM
, vol.49
, Issue.1
, pp. 121-125
-
-
Gordon, L.A.1
Loeb, M.P.2
-
16
-
-
0024606973
-
Risk analysis and computer security: towards a theory at last
-
Hoffman L.J. Risk analysis and computer security: towards a theory at last. Computers and Security 8 l (1989) 23-24
-
(1989)
Computers and Security
, vol.8
, Issue.l
, pp. 23-24
-
-
Hoffman, L.J.1
-
17
-
-
18844431067
-
Information systems security policies: a contextual perspective
-
Karyda M., Kiountouzis E., and Kokolakis S. Information systems security policies: a contextual perspective. Computers and Security 24 3 (2005) 246-260
-
(2005)
Computers and Security
, vol.24
, Issue.3
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
18
-
-
0000455156
-
Strategic risk and corporate performance: an analysis of alternative risk
-
Miller K.D., and Bromiley P. Strategic risk and corporate performance: an analysis of alternative risk. Academy of Management Journal 33 4 (1990) 756-779
-
(1990)
Academy of Management Journal
, vol.33
, Issue.4
, pp. 756-779
-
-
Miller, K.D.1
Bromiley, P.2
-
21
-
-
84994734251
-
Risk analysis and risk management
-
Peltier T.R. Risk analysis and risk management. Information Systems Security 13 4 (2004) 44-56
-
(2004)
Information Systems Security
, vol.13
, Issue.4
, pp. 44-56
-
-
Peltier, T.R.1
-
22
-
-
35548954034
-
Building E-enterprise security: a business view
-
Shih S.C., and Wen H.J. Building E-enterprise security: a business view. Information Systems Security 12 4 (2003) 41-49
-
(2003)
Information Systems Security
, vol.12
, Issue.4
, pp. 41-49
-
-
Shih, S.C.1
Wen, H.J.2
-
23
-
-
44849098825
-
Economic models and approaches in information security for computer networks
-
Sklovos N., and Souros P. Economic models and approaches in information security for computer networks. International Journal of Network Security 2 1 (2006) 243-256
-
(2006)
International Journal of Network Security
, vol.2
, Issue.1
, pp. 243-256
-
-
Sklovos, N.1
Souros, P.2
-
25
-
-
17844396492
-
The economic approach of information security
-
Tsiakis T., and Stephanides G. The economic approach of information security. Computers and Security 24 2 (2005) 105-108
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 105-108
-
-
Tsiakis, T.1
Stephanides, G.2
-
26
-
-
0001371984
-
Rational choice and the framing of decisions
-
Tversky A., and Kahneman D. Rational choice and the framing of decisions. The Journal of Business 59 4 part 2 (1986) S251-S278
-
(1986)
The Journal of Business
, vol.59
, Issue.4 PART 2
-
-
Tversky, A.1
Kahneman, D.2
-
28
-
-
0006291871
-
-
Report of defense science board task force on computer security, The RAND Corporation, Santa Monica, CA
-
Ware W. Security controls for computer systems (U). Report of defense science board task force on computer security (Feb 1970), The RAND Corporation, Santa Monica, CA
-
(1970)
Security controls for computer systems (U)
-
-
Ware, W.1
-
29
-
-
44849136347
-
managing risks at the enterprise level
-
Woodlock P., and Ross R. managing risks at the enterprise level. National Public Accountant 46 9 (2001) 19-21
-
(2001)
National Public Accountant
, vol.46
, Issue.9
, pp. 19-21
-
-
Woodlock, P.1
Ross, R.2
|