메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Information security investment game with penalty parameter

Author keywords

[No Author keywords available]

Indexed keywords

COST BENEFIT ANALYSIS; DECISION MAKING; FINANCE; INFORMATION SERVICES; INVESTMENTS; LAWS AND LEGISLATION; TELECOMMUNICATION NETWORKS;

EID: 52449134487     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICICIC.2008.319     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 1
    • 52449102467 scopus 로고    scopus 로고
    • The global survey of information security 2007
    • July, 5
    • Qiang Tian, "The global survey of information security 2007", Information Weekly, July, 5, 2007.
    • (2007) Information Weekly
    • Tian, Q.1
  • 2
    • 33747053670 scopus 로고    scopus 로고
    • Information Security - The Fourth Wave
    • Elsevier Science, Netherlands
    • Basie von Solms, "Information Security - The Fourth Wave", Computers &Security, Elsevier Science, Netherlands, 2006, pp. 165-168.
    • (2006) Computers &Security , pp. 165-168
    • Basie von Solms1
  • 3
    • 33751416458 scopus 로고    scopus 로고
    • A common criteria based security requirements engineering process for the development of secure information systems
    • Elsevier Science, Netherlands
    • Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini, "A common criteria based security requirements engineering process for the development of secure information systems", Computer Standards & Interfaces, Elsevier Science, Netherlands, 2007, pp. 244-253.
    • (2007) Computer Standards & Interfaces , pp. 244-253
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 4
    • 33751540986 scopus 로고    scopus 로고
    • Editorial for v.11 n.4 of the Information Security Technical Report: 'Windows Security Revisited'
    • Elsevier Science, Netherlands
    • G. Price, "Editorial for v.11 n.4 of the Information Security Technical Report: 'Windows Security Revisited'", Information Security Technical Report, Elsevier Science, Netherlands, 2006, pp. 159.
    • (2006) Information Security Technical Report , pp. 159
    • Price, G.1
  • 5
    • 33947117497 scopus 로고    scopus 로고
    • Information security in networkable Windows-based operating system devices: Challenges and solutions
    • Elsevier Science, Netherlands
    • Ilan Oshri, Julia Kotlarsky, Corey Hirsch, "Information security in networkable Windows-based operating system devices: Challenges and solutions", Computers & Security, Elsevier Science, Netherlands, 2007, pp. 177-182.
    • (2007) Computers & Security , pp. 177-182
    • Oshri, I.1    Kotlarsky, J.2    Hirsch, C.3
  • 8
    • 33750715221 scopus 로고    scopus 로고
    • Working paper, Economics of Information Security, University of California, Berkeley, CA
    • Hal R. Varian, "System reliability and free riding", Working paper, Economics of Information Security, University of California, Berkeley, CA. 2004.
    • (2004) System reliability and free riding
    • Varian, H.R.1
  • 11
    • 0141615031 scopus 로고    scopus 로고
    • Introductory remarks on the history of game theory
    • Elsevier Science, Netherlands
    • Kenneth J. Arrow, "Introductory remarks on the history of game theory", Games and Economic Behavior, Elsevier Science, Netherlands, 2003, pp. 15-18.
    • (2003) Games and Economic Behavior , pp. 15-18
    • Arrow, K.J.1
  • 12
    • 0141838157 scopus 로고    scopus 로고
    • A computer scientist looks at game theory
    • Elsevier Science, Netherlands
    • Joseph Y. Halpern, "A computer scientist looks at game theory", Games and Economic Behavior, Elsevier Science, Netherlands, 2003, pp. 114-131.
    • (2003) Games and Economic Behavior , pp. 114-131
    • Halpern, J.Y.1
  • 13
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Blackwell Publishing, UK
    • Dhillon, J. Backhouse, "Current directions in IS security research: towards socio-organizational perspectives", Information Systems Journal, Blackwell Publishing, UK, 2001, pp. 127-153.
    • (2001) Information Systems Journal , pp. 127-153
    • Dhillon, J.B.1
  • 14
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • ACM, USA
    • Dhillon, J. Backhouse, "Information system security management in the new millennium", Communications of the ACM, ACM, USA, 2000, pp. 125-128.
    • (2000) Communications of the ACM , pp. 125-128
    • Dhillon, J.B.1
  • 15
    • 33847325783 scopus 로고    scopus 로고
    • A game theory approach for the allocation of risks in transport public private partnerships
    • Elsevier Science, Netherlands
    • Francesca Medda, "A game theory approach for the allocation of risks in transport public private partnerships", International Journal of Project Management, Elsevier Science, Netherlands, 2007, pp. 213-218.
    • (2007) International Journal of Project Management , pp. 213-218
    • Medda, F.1
  • 16
    • 67649323413 scopus 로고    scopus 로고
    • Game theory and experimental gaming
    • Elsevier Science, Netherlands
    • Martin Shubik, "Game theory and experimental gaming", Handbook of Game Theory with Economic Applications, Elsevier Science, Netherlands, 2002, pp. 2327-2351.
    • (2002) Handbook of Game Theory with Economic Applications , pp. 2327-2351
    • Shubik, M.1
  • 17
    • 2342469291 scopus 로고    scopus 로고
    • Software security
    • IEEE, USA
    • McGraw, "Software security", IEEE Security & Privacy, IEEE, USA, 2004, pp. 80-83.
    • (2004) IEEE Security & Privacy , pp. 80-83
    • McGraw1
  • 18
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • Elsevier Science, Netherlands
    • H.A. Kruger, W.D. Kearney, "A prototype for assessing information security awareness", Computers & Security, Elsevier Science, Netherlands, 2006, pp. 289-296.
    • (2006) Computers & Security , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 19
    • 33751177800 scopus 로고    scopus 로고
    • Information security in the knowledge economy
    • Elsevier Science, Netherlands
    • Ajay S. Vinze, "Information security in the knowledge economy", International Journal of Human-Computer Studies, Elsevier Science, Netherlands, 2007, pp. 1-2.
    • (2007) International Journal of Human-Computer Studies , pp. 1-2
    • Vinze, A.S.1
  • 20
    • 33750923703 scopus 로고    scopus 로고
    • Kerry-Lynn Thomson, Rossouw von Solms and Lynette Louw, Cultivating an organizational information security culture, Computer Fraud & Security, Elsevier Science, Netherlands, 2006, pp. 7-11.
    • Kerry-Lynn Thomson, Rossouw von Solms and Lynette Louw, "Cultivating an organizational information security culture", Computer Fraud & Security, Elsevier Science, Netherlands, 2006, pp. 7-11.
  • 21
    • 33644654726 scopus 로고    scopus 로고
    • Preparing Information Security for legal and regulatory compliance
    • Elsevier Science, Netherlands
    • Phil Pinder, "Preparing Information Security for legal and regulatory compliance", Information Security Technical Report, Elsevier Science, Netherlands, 2006, pp. 32-38.
    • (2006) Information Security Technical Report , pp. 32-38
    • Pinder, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.