메뉴 건너뛰기




Volumn 27, Issue 1-2, 2008, Pages 22-29

Enterprise information security strategies

Author keywords

Best practices; Enterprise security requirements; Information security; Models of risk management; Security costs and benefits

Indexed keywords

AEROSPACE APPLICATIONS; BUDGET CONTROL; COMPENSATION (PERSONNEL); COMPUTER NETWORKS; INFORMATION SERVICES; PROBLEM SOLVING; TECHNOLOGY;

EID: 44849144759     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.03.002     Document Type: Article
Times cited : (62)

References (29)
  • 1
    • 84925838576 scopus 로고    scopus 로고
    • Anderson R. Why information security is hard - an economic perspective. In: IEEE Proceedings of the 17th Annual Computer Security Applications Conference; 2001. p. 358-65.
    • Anderson R. Why information security is hard - an economic perspective. In: IEEE Proceedings of the 17th Annual Computer Security Applications Conference; 2001. p. 358-65.
  • 2
    • 3142656206 scopus 로고
    • Portfolio choice and equilibrium in capital markets with safety-first investors
    • Arzac E., and Bawa V. Portfolio choice and equilibrium in capital markets with safety-first investors. Journal of Financial Economics 14 3 (1977) 277-288
    • (1977) Journal of Financial Economics , vol.14 , Issue.3 , pp. 277-288
    • Arzac, E.1    Bawa, V.2
  • 3
    • 0242665376 scopus 로고    scopus 로고
    • Blakley B, McDermott E, Greer D. Information security is information risk management. In: ACM proceedings of the workshop on new security paradigms; 2001. p. 97-104.
    • Blakley B, McDermott E, Greer D. Information security is information risk management. In: ACM proceedings of the workshop on new security paradigms; 2001. p. 97-104.
  • 5
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu H., Mishra B., and Raghunathan S. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16 l (2005) 28-46
    • (2005) Information Systems Research , vol.16 , Issue.l , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 6
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: a hierarchical framework for various approaches
    • Eloff M.M., and von Solms S.H. Information security management: a hierarchical framework for various approaches. Computers and Security 19 3 (2000) 243-256
    • (2000) Computers and Security , vol.19 , Issue.3 , pp. 243-256
    • Eloff, M.M.1    von Solms, S.H.2
  • 7
    • 9744234714 scopus 로고
    • one approach to risk assessment
    • Farquhar B. one approach to risk assessment. Computers and Security 10 l (1991) 21-23
    • (1991) Computers and Security , vol.10 , Issue.l , pp. 21-23
    • Farquhar, B.1
  • 8
    • 0034159453 scopus 로고    scopus 로고
    • Information systems risk management: key concepts and business processes
    • Finne T. Information systems risk management: key concepts and business processes. Computers and Security 19 3 (2000) 234-242
    • (2000) Computers and Security , vol.19 , Issue.3 , pp. 234-242
    • Finne, T.1
  • 9
    • 44849091397 scopus 로고    scopus 로고
    • Gehani A. Performance-sensitive real-time risk management is NP-Hard. In: Proceedings of the workshop on foundations of computer security affiliated with 19th IEEE symposium on logic in computer science (LICS); 2004. p. 1-12.
    • Gehani A. Performance-sensitive real-time risk management is NP-Hard. In: Proceedings of the workshop on foundations of computer security affiliated with 19th IEEE symposium on logic in computer science (LICS); 2004. p. 1-12.
  • 10
    • 0035149661 scopus 로고    scopus 로고
    • From risk analysis to security requirements
    • Gerber M., and von Solms R. From risk analysis to security requirements. Computers and Security 20 7 (2001) 577-584
    • (2001) Computers and Security , vol.20 , Issue.7 , pp. 577-584
    • Gerber, M.1    von Solms, R.2
  • 11
    • 15744404682 scopus 로고    scopus 로고
    • Management of risk in the information age
    • Gerber M., and von Solms R. Management of risk in the information age. Computers and Security 24 l (2005) 16-30
    • (2005) Computers and Security , vol.24 , Issue.l , pp. 16-30
    • Gerber, M.1    von Solms, R.2
  • 12
    • 0030367193 scopus 로고    scopus 로고
    • Risk vulnerability and the tempering effect of background risk
    • Gollier C., and Pratt J.W. Risk vulnerability and the tempering effect of background risk. Econometrica 64 5 (1996) 1109-1123
    • (1996) Econometrica , vol.64 , Issue.5 , pp. 1109-1123
    • Gollier, C.1    Pratt, J.W.2
  • 14
    • 33745210521 scopus 로고    scopus 로고
    • Budgeting process for information security expenditures
    • Gordon L.A., and Loeb M.P. Budgeting process for information security expenditures. Communications of the ACM 49 1 (2006) 121-125
    • (2006) Communications of the ACM , vol.49 , Issue.1 , pp. 121-125
    • Gordon, L.A.1    Loeb, M.P.2
  • 16
    • 0024606973 scopus 로고
    • Risk analysis and computer security: towards a theory at last
    • Hoffman L.J. Risk analysis and computer security: towards a theory at last. Computers and Security 8 l (1989) 23-24
    • (1989) Computers and Security , vol.8 , Issue.l , pp. 23-24
    • Hoffman, L.J.1
  • 17
    • 18844431067 scopus 로고    scopus 로고
    • Information systems security policies: a contextual perspective
    • Karyda M., Kiountouzis E., and Kokolakis S. Information systems security policies: a contextual perspective. Computers and Security 24 3 (2005) 246-260
    • (2005) Computers and Security , vol.24 , Issue.3 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 18
    • 0000455156 scopus 로고
    • Strategic risk and corporate performance: an analysis of alternative risk
    • Miller K.D., and Bromiley P. Strategic risk and corporate performance: an analysis of alternative risk. Academy of Management Journal 33 4 (1990) 756-779
    • (1990) Academy of Management Journal , vol.33 , Issue.4 , pp. 756-779
    • Miller, K.D.1    Bromiley, P.2
  • 21
    • 84994734251 scopus 로고    scopus 로고
    • Risk analysis and risk management
    • Peltier T.R. Risk analysis and risk management. Information Systems Security 13 4 (2004) 44-56
    • (2004) Information Systems Security , vol.13 , Issue.4 , pp. 44-56
    • Peltier, T.R.1
  • 22
    • 35548954034 scopus 로고    scopus 로고
    • Building E-enterprise security: a business view
    • Shih S.C., and Wen H.J. Building E-enterprise security: a business view. Information Systems Security 12 4 (2003) 41-49
    • (2003) Information Systems Security , vol.12 , Issue.4 , pp. 41-49
    • Shih, S.C.1    Wen, H.J.2
  • 23
    • 44849098825 scopus 로고    scopus 로고
    • Economic models and approaches in information security for computer networks
    • Sklovos N., and Souros P. Economic models and approaches in information security for computer networks. International Journal of Network Security 2 1 (2006) 243-256
    • (2006) International Journal of Network Security , vol.2 , Issue.1 , pp. 243-256
    • Sklovos, N.1    Souros, P.2
  • 25
    • 17844396492 scopus 로고    scopus 로고
    • The economic approach of information security
    • Tsiakis T., and Stephanides G. The economic approach of information security. Computers and Security 24 2 (2005) 105-108
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 105-108
    • Tsiakis, T.1    Stephanides, G.2
  • 26
    • 0001371984 scopus 로고
    • Rational choice and the framing of decisions
    • Tversky A., and Kahneman D. Rational choice and the framing of decisions. The Journal of Business 59 4 part 2 (1986) S251-S278
    • (1986) The Journal of Business , vol.59 , Issue.4 PART 2
    • Tversky, A.1    Kahneman, D.2
  • 28
    • 0006291871 scopus 로고
    • Report of defense science board task force on computer security, The RAND Corporation, Santa Monica, CA
    • Ware W. Security controls for computer systems (U). Report of defense science board task force on computer security (Feb 1970), The RAND Corporation, Santa Monica, CA
    • (1970) Security controls for computer systems (U)
    • Ware, W.1
  • 29
    • 44849136347 scopus 로고    scopus 로고
    • managing risks at the enterprise level
    • Woodlock P., and Ross R. managing risks at the enterprise level. National Public Accountant 46 9 (2001) 19-21
    • (2001) National Public Accountant , vol.46 , Issue.9 , pp. 19-21
    • Woodlock, P.1    Ross, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.