메뉴 건너뛰기




Volumn 25, Issue 2, 2008, Pages 281-304

Decision-Theoretic and game-theoretic approaches to IT security investment

Author keywords

Decision theory; Game theory; IT security investments

Indexed keywords

CURRENT PRACTICES; DECISION-THEORETIC; INVESTMENT STRATEGY; IT SECURITY INVESTMENTS; LEARNING MODELS; RATE OF CONVERGENCE; RISK MANAGEMENT TECHNIQUES; SECURITY BUDGET; SECURITY INVESTMENTS; SECURITY THREATS;

EID: 66549093519     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.2753/MIS0742-1222250211     Document Type: Article
Times cited : (187)

References (44)
  • 1
    • 0347741428 scopus 로고    scopus 로고
    • Exponentially fading memory learning in forward-looking economic models
    • Barucci, E. Exponentially fading memory learning in forward-looking economic models. Journal of Economic Dynamics and Control, 24, 5 (2000), 1027-1046.
    • (2000) Journal of Economic Dynamics and Control , vol.24 , Issue.5 , pp. 1027-1046
    • Barucci, E.1
  • 2
    • 0002638023 scopus 로고    scopus 로고
    • Securing network software applications: Introduction
    • Bashir, L; Serafini, E.; and Wall, K. Securing network software applications: Introduction. Communications of the ACM, 44, 2 (2001), 28-30.
    • (2001) Communications of the ACM , vol.44 , Issue.2 , pp. 28-30
    • Bashir, L.1    Serafini, E.2    Wall, K.3
  • 3
    • 66549119254 scopus 로고    scopus 로고
    • Berinato, S. Finally, a return on security spending. CIO Magazine (February 2002) (available at www.cio.com.au/index.php/id;557330171;fp;;fpid;).
    • Berinato, S. Finally, a return on security spending. CIO Magazine (February 2002) (available at www.cio.com.au/index.php/id;557330171;fp;;fpid;).
  • 4
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating information security investments using the analytic hierarchy process
    • Bodin, L.D.; Gordon, L.A.; and Loeb, M.P. Evaluating information security investments using the analytic hierarchy process. Communications of the ACM, 48, 2 (2005), 78-83.
    • (2005) Communications of the ACM , vol.48 , Issue.2 , pp. 78-83
    • Bodin, L.D.1    Gordon, L.A.2    Loeb, M.P.3
  • 5
    • 0036497756 scopus 로고    scopus 로고
    • Real options analysis of the timing of IT investment decisions
    • Campbell, J.A. Real options analysis of the timing of IT investment decisions. Information and Management, 39, 5 (2002), 337-344.
    • (2002) Information and Management , vol.39 , Issue.5 , pp. 337-344
    • Campbell, J.A.1
  • 7
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • Cavusoglu, H., and Raghunathan, S. Configuration of detection software: A comparison of decision and game theory approaches. INFORMS Decision Analysis, 1, 3 (2005), 131-148.
    • (2005) INFORMS Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 8
    • 7444242205 scopus 로고    scopus 로고
    • The effect of Internet security breach announcements on market value: Capital market reaction for breached firms and Internet security developers
    • Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The effect of Internet security breach announcements on market value: Capital market reaction for breached firms and Internet security developers. International Journal of Electronic Commerce, 9, 1 (2004), 69-105.
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69-105
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 10
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16, 1 (2005), 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 11
    • 66549117203 scopus 로고    scopus 로고
    • Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
    • forthcoming
    • Cavusoglu, H.; Raghunathan, S.; and H. Cavusoglu. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, forthcoming (2008).
    • (2008) Information Systems Research
    • Cavusoglu, H.1    Raghunathan, S.2    Cavusoglu, H.3
  • 12
    • 0025755093 scopus 로고
    • Evaluation of strategic investments in information technology
    • Clemons, E.K. Evaluation of strategic investments in information technology. Communications of the ACM, 34, 1 (1991), 22-36.
    • (1991) Communications of the ACM , vol.34 , Issue.1 , pp. 22-36
    • Clemons, E.K.1
  • 13
    • 84909999858 scopus 로고    scopus 로고
    • Understanding and influencing attackers' decisions: Implications for security investment strategies
    • Paper presented at the, Cambridge, UK, June 26-28
    • Cremonini, M., and Nizovtsev, D. Understanding and influencing attackers' decisions: Implications for security investment strategies. Paper presented at the Workshop on the Economics of Information Security (WEIS), Cambridge, UK, June 26-28, 2006.
    • (2006) Workshop on the Economics of Information Security (WEIS)
    • Cremonini, M.1    Nizovtsev, D.2
  • 15
    • 0001936936 scopus 로고
    • Strategic considerations in auditing
    • October
    • Fellingham, J.C., and Newman, D.P. Strategic considerations in auditing. Accounting Review, 60, 4 (October 1985), 634-650.
    • (1985) Accounting Review , vol.60 , Issue.4 , pp. 634-650
    • Fellingham, J.C.1    Newman, D.P.2
  • 17
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E.A., and Ghose, A. The economic incentives for sharing security information. Information Systems Research, 16, 2 (2005), 186-208.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.A.1    Ghose, A.2
  • 20
    • 3242665740 scopus 로고    scopus 로고
    • Information exploitation and interorganizational systems ownership
    • Fall
    • Han, K.; Kauffman, R.J.; and Nault, B.R. Information exploitation and interorganizational systems ownership. Journal of Management Information Systems, 21, 2 (Fall 2004), 109-135.
    • (2004) Journal of Management Information Systems , vol.21 , Issue.2 , pp. 109-135
    • Han, K.1    Kauffman, R.J.2    Nault, B.R.3
  • 21
    • 33751256271 scopus 로고    scopus 로고
    • Income, interdependence, and substitution effects affecting incentives for security investment
    • Hausken, K. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25, 6 (2006), 629-665.
    • (2006) Journal of Accounting and Public Policy , vol.25 , Issue.6 , pp. 629-665
    • Hausken, K.1
  • 22
    • 35348950536 scopus 로고    scopus 로고
    • Strategic defense and attack for series and parallel reliability systems
    • Hausken, K. Strategic defense and attack for series and parallel reliability systems. European Journal of Operational Research, 186, 2 (2008), 856-881.
    • (2008) European Journal of Operational Research , vol.186 , Issue.2 , pp. 856-881
    • Hausken, K.1
  • 23
    • 0005788035 scopus 로고    scopus 로고
    • How firms decide on technology
    • R.E. Litan and A.M. Santomero eds, Washington, DC: Brookings Institution Press
    • Hitt, L.M.; Frei, F.X.; and Harker, P.T. How firms decide on technology. In R.E. Litan and A.M. Santomero (eds.), Brookings/Wharton Papers on Financial Services. Washington, DC: Brookings Institution Press, 1999, pp. 93-136.
    • (1999) Brookings/Wharton Papers on Financial Services , pp. 93-136
    • Hitt, L.M.1    Frei, F.X.2    Harker, P.T.3
  • 25
    • 66549098332 scopus 로고    scopus 로고
    • Kaplan, R.S. Must CIM be justified by faith alone. Harvard Business Review, 64, 2 (March-April 1986), 87-95.
    • Kaplan, R.S. Must CIM be justified by faith alone. Harvard Business Review, 64, 2 (March-April 1986), 87-95.
  • 26
    • 3042809894 scopus 로고    scopus 로고
    • Return on security investment: Calculating the security investment equation
    • Karofsky, E. Return on security investment: Calculating the security investment equation. Secure Business Quarterly, 1, 2 (2001).
    • (2001) Secure Business Quarterly , vol.1 , pp. 2
    • Karofsky, E.1
  • 27
    • 0042260582 scopus 로고    scopus 로고
    • Editorial - IT investment payoff in e-business environments: Research issues
    • Kohli, R.; Sherer, S.A.; and Baron, A. Editorial - IT investment payoff in e-business environments: Research issues. Information Systems Frontiers, 5, 3 (2003), 239-247.
    • (2003) Information Systems Frontiers , vol.5 , Issue.3 , pp. 239-247
    • Kohli, R.1    Sherer, S.A.2    Baron, A.3
  • 28
    • 0030307359 scopus 로고    scopus 로고
    • A note on project risk and option values of investments in information technologies
    • Summer
    • Kumar, R.L. A note on project risk and option values of investments in information technologies. Journal of Management Information Systems, 13, 1 (Summer 1996), 187-193.
    • (1996) Journal of Management Information Systems , vol.13 , Issue.1 , pp. 187-193
    • Kumar, R.L.1
  • 31
    • 0034501202 scopus 로고    scopus 로고
    • Are we forgetting the risk of information technology?
    • December
    • Longstaff, T.; Chittister, C.; Pethia, R.; and Haimes, Y. Are we forgetting the risk of information technology? IEEE Computer, 33, 12 (December 2000), 43-51.
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 43-51
    • Longstaff, T.1    Chittister, C.2    Pethia, R.3    Haimes, Y.4
  • 33
    • 0035265977 scopus 로고    scopus 로고
    • CSI/FBI computer crime and security survey
    • Spring
    • Power, R. 2002 CSI/FBI computer crime and security survey. Computer Security Journal, 17, 2 (Spring 2002), 29-51.
    • (2002) Computer Security Journal , vol.17 , Issue.2 , pp. 29-51
    • Power, R.1
  • 36
    • 0002290655 scopus 로고    scopus 로고
    • Eight imperatives for the new IT organization
    • Rockart, J.F.; Earl, M.J.; and Ross, J.W. Eight imperatives for the new IT organization. Sloan Management Review, 38, 1 (1996), 43-55.
    • (1996) Sloan Management Review , vol.38 , Issue.1 , pp. 43-55
    • Rockart, J.F.1    Earl, M.J.2    Ross, J.W.3
  • 37
    • 0034204627 scopus 로고    scopus 로고
    • Rothke, B. Hackers then and now: Answers to some perennial questions. Computer Security Journal, 16, 3 (2000), 11-14.
    • Rothke, B. Hackers then and now: Answers to some perennial questions. Computer Security Journal, 16, 3 (2000), 11-14.
  • 39
    • 0347887514 scopus 로고    scopus 로고
    • Inside the minds of the insider
    • December
    • Shaw, D.S.; Post, J.M.; and Ruby, K.G. Inside the minds of the insider. Security Management, 43, 12 (December 1999), 34-44.
    • (1999) Security Management , vol.43 , Issue.12 , pp. 34-44
    • Shaw, D.S.1    Post, J.M.2    Ruby, K.G.3
  • 40
    • 84868947404 scopus 로고    scopus 로고
    • Hackers shift focus to financial gain
    • available at
    • Sieberg, D. Hackers shift focus to financial gain. CNN.com (available at www.cnn.com/2005/TECH/internet/09/26/identity.hacker/).
    • CNN.com
    • Sieberg, D.1
  • 41
    • 66549096068 scopus 로고    scopus 로고
    • Stoneburner, G.; Goguen, A.; and Feringa, A. Risk management guide for information technology systems. National Institute of Standards and Technology Special Publications 800-30, White Paper, U.S. Department of Commerce, Gaithersburg, MD, 2002.
    • Stoneburner, G.; Goguen, A.; and Feringa, A. Risk management guide for information technology systems. National Institute of Standards and Technology Special Publications 800-30, White Paper, U.S. Department of Commerce, Gaithersburg, MD, 2002.
  • 42
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    • Spring
    • Sun, L.; Srivastava, R.P.; and Mock, T.J. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22, 4 (Spring 2006), 109-142.
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.1    Srivastava, R.P.2    Mock, T.J.3
  • 44
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive response
    • Summer
    • Yue, W, and Çakanyildirim, M. Intrusion prevention in information systems: Reactive and proactive response. Journal of Management Information Systems, 24, 1 (Summer 2007), 329-353.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.1    Çakanyildirim, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.