메뉴 건너뛰기




Volumn 19, Issue 1, 2008, Pages 106-120

A value-at-risk approach to information security investment

Author keywords

Extreme value analysis; Information assurance; Security investment; Value at risk (VaR)

Indexed keywords

DECISION MAKING; INVESTMENTS; RISK ASSESSMENT; RISK PERCEPTION; SECURITY OF DATA;

EID: 61349180141     PISSN: 10477047     EISSN: 15265536     Source Type: Journal    
DOI: 10.1287/isre.1070.0143     Document Type: Article
Times cited : (100)

References (44)
  • 6
    • 0035239243 scopus 로고    scopus 로고
    • An extreme-value model of concept testing
    • Dahan, E., H. Mendelson. 2001. An extreme-value model of concept testing. Management Sci. 47(1) 102-116.
    • (2001) Management Sci , vol.47 , Issue.1 , pp. 102-116
    • Dahan, E.1    Mendelson, H.2
  • 7
    • 0000617024 scopus 로고
    • Models for exceedances over high thresholds (with discussion)
    • Davison, A. C., R. L. Smith. 1990. Models for exceedances over high thresholds (with discussion). J. Roy. Statist. Soc. 52 393-442.
    • (1990) J. Roy. Statist. Soc , vol.52 , pp. 393-442
    • Davison, A.C.1    Smith, R.L.2
  • 9
    • 18544363967 scopus 로고    scopus 로고
    • Prentice Hall, Upper Saddle River, NJ
    • Devaraj, S., R. Kohli. 2002. The IT Payoff. Prentice Hall, Upper Saddle River, NJ.
    • (2002) The IT Payoff
    • Devaraj, S.1    Kohli, R.2
  • 10
    • 85036258669 scopus 로고
    • Distribution of the estimators for autoregressive time series with a unit root
    • Dickey, D., W. Fuller. 1979. Distribution of the estimators for autoregressive time series with a unit root. J. Amer. Statist. Assoc. 74 427-431.
    • (1979) J. Amer. Statist. Assoc , vol.74 , pp. 427-431
    • Dickey, D.1    Fuller, W.2
  • 11
    • 0000472488 scopus 로고
    • Likelihood ratio tests for autoregressive time series with a unit root
    • Dickey, D., W. Fuller. 1981. Likelihood ratio tests for autoregressive time series with a unit root. Econometrica 49 1057-1072.
    • (1981) Econometrica , vol.49 , pp. 1057-1072
    • Dickey, D.1    Fuller, W.2
  • 13
    • 85008765609 scopus 로고    scopus 로고
    • An overview of value at risk
    • Duffie, D., J. Pan. 1997. An overview of value at risk. J. Derivatives 4(3) 7-49.
    • (1997) J. Derivatives , vol.4 , Issue.3 , pp. 7-49
    • Duffie, D.1    Pan, J.2
  • 14
    • 0041685498 scopus 로고    scopus 로고
    • Working paper, The Wharton School, Philadelphia. Available at
    • Embrechts, P. 1996. Actuarial versus financial pricing of insurance. Working paper, The Wharton School, Philadelphia. Available at http://fic.wharton.upenn.edu/fic/papers/96/9617.pdf.
    • (1996) Actuarial versus financial pricing of insurance
    • Embrechts, P.1
  • 18
    • 19544371722 scopus 로고    scopus 로고
    • A mana6gement perspective on risk of security threats to information systems
    • Farahmand, F., S. B. Navathe, G. P. Sharp, P. H. Enslow. 2005. A mana6gement perspective on risk of security threats to information systems. Inform. Tech. Management 6(2-3) 203-255.
    • (2005) Inform. Tech. Management , vol.6 , Issue.2-3 , pp. 203-255
    • Farahmand, F.1    Navathe, S.B.2    Sharp, G.P.3    Enslow, P.H.4
  • 20
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-or, E., A. Ghose. 2005. The economic incentives for sharing security information. Inform. Systems Res. 16(2) 186-208.
    • (2005) Inform. Systems Res , vol.16 , Issue.2 , pp. 186-208
    • Gal-or, E.1    Ghose, A.2
  • 21
    • 3042720722 scopus 로고    scopus 로고
    • Information security: Why the future belongs to the quants
    • Geer, D., K. S. Hoo, A. Jaquith. 2003. Information security: Why the future belongs to the quants. IEEE Security & Privacy 1 32-40.
    • (2003) IEEE Security & Privacy , vol.1 , pp. 32-40
    • Geer, D.1    Hoo, K.S.2    Jaquith, A.3
  • 22
    • 84990029315 scopus 로고    scopus 로고
    • The economics of information security investment
    • Gordon, L. A., M. P. Loeb. 2002. The economics of information security investment. ACM Trans. Inform. Systems Secur. 5(4) 438-457.
    • (2002) ACM Trans. Inform. Systems Secur , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.A.1    Loeb, M.P.2
  • 24
    • 0004296209 scopus 로고    scopus 로고
    • Prentice Hall, Upper Saddle River, NJ
    • Greene, W. H. 2000. Econometric Analysis. Prentice Hall, Upper Saddle River, NJ.
    • (2000) Econometric Analysis
    • Greene, W.H.1
  • 28
    • 32644456297 scopus 로고    scopus 로고
    • Working paper, Center for International Security and Cooperation, Stanford University. Available at
    • Hoo, K. J. S. 2000. How much is enough? A risk-management approach to computer security. Working paper, Center for International Security and Cooperation, Stanford University. Available at http://iis-db.stanford.edu/pubs/ 11900/soohoo.pdf
    • (2000) How much is enough? A risk-management approach to computer security
    • Hoo, K.J.S.1
  • 29
  • 30
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities? Think again
    • Kannan, K., R. Telang. 2005. Market for software vulnerabilities? Think again. Management Sci. 51(5) 726-740.
    • (2005) Management Sci , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 33
    • 0034501202 scopus 로고    scopus 로고
    • Are we forgetting the risks of information technology?
    • Longstaff, T. A., C. Chittister, R. Pethia, Y. Y. Haimes. 2000. Are we forgetting the risks of information technology? IEEE Comput. 33(12) 43-51.
    • (2000) IEEE Comput , vol.33 , Issue.12 , pp. 43-51
    • Longstaff, T.A.1    Chittister, C.2    Pethia, R.3    Haimes, Y.Y.4
  • 35
    • 4243150787 scopus 로고    scopus 로고
    • Analyzing security costs
    • Mercuri, R. T. 2003. Analyzing security costs. Comm. ACM 46(6) 15-18.
    • (2003) Comm. ACM , vol.46 , Issue.6 , pp. 15-18
    • Mercuri, R.T.1
  • 36
    • 18844424363 scopus 로고    scopus 로고
    • Stochastic traffic engineering for demand uncertainty and risk-aware network revenue management
    • Mitra, D., Q. Wang. 2005. Stochastic traffic engineering for demand uncertainty and risk-aware network revenue management. IEEE/ACM Trans. Networking 13(2) 221-233.
    • (2005) IEEE/ACM Trans. Networking , vol.13 , Issue.2 , pp. 221-233
    • Mitra, D.1    Wang, Q.2
  • 37
    • 0001075431 scopus 로고
    • Statistical inference using extreme order statistics
    • Pickands, J. 1975, Statistical inference using extreme order statistics. Ann. Statist, 3 119-131.
    • (1975) Ann. Statist , vol.3 , pp. 119-131
    • Pickands, J.1
  • 38
    • 35248853499 scopus 로고    scopus 로고
    • How much security is enough to stop a thief? The economics of outsider theft via computer systems networks
    • Guadeloupe, French West Indies
    • Schecter, S. E., M. D. Smith. 2003. How much security is enough to stop a thief? The economics of outsider theft via computer systems networks, Proc. 7th Financial Cryptography Conf., Guadeloupe, French West Indies. 122-137.
    • (2003) Proc. 7th Financial Cryptography Conf , pp. 122-137
    • Schecter, S.E.1    Smith, M.D.2
  • 39
    • 84876596907 scopus 로고    scopus 로고
    • Shaw, E. D., K. G. Ruby, J. M. Post. 1998. The insider threat to information systems. Security Awareness Butt. 2-98.
    • Shaw, E. D., K. G. Ruby, J. M. Post. 1998. The insider threat to information systems. Security Awareness Butt. 2-98.
  • 40
    • 84972496066 scopus 로고
    • Extreme value analysis of enviromental time series: An example based on ozone data (with discussion)
    • Smith, R. L. 1989. Extreme value analysis of enviromental time series: An example based on ozone data (with discussion). Statist. Sci. 4 367-393.
    • (1989) Statist. Sci , vol.4 , pp. 367-393
    • Smith, R.L.1
  • 42
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under Dcmpster-Shafer theory of belief functions
    • Sun, L., R. P. Srivastava, T. J. Mock. 2006. An information systems security risk assessment model under Dcmpster-Shafer theory of belief functions. J. Management Inform. Systems 22(3) 190-142.
    • (2006) J. Management Inform. Systems , vol.22 , Issue.3 , pp. 190-142
    • Sun, L.1    Srivastava, R.P.2    Mock, T.J.3
  • 43
    • 0024165315 scopus 로고    scopus 로고
    • Tawn, J. A. 1988. An extreme value theory model for dependent observations. J. Hydrology 101 227-250.
    • Tawn, J. A. 1988. An extreme value theory model for dependent observations. J. Hydrology 101 227-250.
  • 44
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • L. J. Camp, S. Lewis, eds, Kluwer Academic Publishers, Boston/Dordrecht/London
    • Varian, H. R. 2004. System reliability and free riding. L. J. Camp, S. Lewis, eds. Economics of Information Security. Kluwer Academic Publishers, Boston/Dordrecht/London, 1-15.
    • (2004) Economics of Information Security , pp. 1-15
    • Varian, H.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.