-
1
-
-
7444259766
-
Prioritizing a portfolio of information technology investment projects
-
Fall
-
Bardhan, I.; Bagchi, S.; and Sougstad, R. Prioritizing a portfolio of information technology investment projects. Journal of Management Information Systems, 21, 2 (Fall 2004), 33-60.
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.2
, pp. 33-60
-
-
Bardhan, I.1
Bagchi, S.2
Sougstad, R.3
-
2
-
-
0036754796
-
Managing information technology investment risk: A real options perspective
-
Fall
-
Benaroch, M. Managing information technology investment risk: A real options perspective. Journal of Management Information Systems, 19, 2 (Fall 2002), 43-84.
-
(2002)
Journal of Management Information Systems
, vol.19
, Issue.2
, pp. 43-84
-
-
Benaroch, M.1
-
3
-
-
0033437913
-
A case for using real options pricing analysis to evaluate information technology project investments
-
Benaroch, M., and Kauffman, R. A case for using real options pricing analysis to evaluate information technology project investments. Information Systems Research, 10, 1 (1999), 70-86.
-
(1999)
Information Systems Research
, vol.10
, Issue.1
, pp. 70-86
-
-
Benaroch, M.1
Kauffman, R.2
-
4
-
-
33845779035
-
On the valuation of multistage information technology investments embedding nested real options
-
Summer
-
Benaroch, M.; Shah, S.; and Jeffery, M. On the valuation of multistage information technology investments embedding nested real options. Journal of Management Information Systems, 23, 1 (Summer 2006), 239-261.
-
(2006)
Journal of Management Information Systems
, vol.23
, Issue.1
, pp. 239-261
-
-
Benaroch, M.1
Shah, S.2
Jeffery, M.3
-
5
-
-
66549121879
-
-
Bierman, H., jr., and Rao, V. Investment decisions with sampling. Financial Management, 7, 7 (1978), 19-24.
-
Bierman, H., jr., and Rao, V. Investment decisions with sampling. Financial Management, 7, 7 (1978), 19-24.
-
-
-
-
6
-
-
66549109675
-
-
Bridwell, L. ICSA Labs 10th annual computer virus prevalence survey 2004. Mechanicsburg, Pa: ICSa Labs, 2005 (available at www.icsalabs.com/ icsa/docs/html/library/whitepapers/ VPS2004.pdf).
-
Bridwell, L. ICSA Labs 10th annual computer virus prevalence survey 2004. Mechanicsburg, Pa: ICSa Labs, 2005 (available at www.icsalabs.com/ icsa/docs/html/library/whitepapers/ VPS2004.pdf).
-
-
-
-
7
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu, H., and raghunathan, S. Configuration of detection software: A comparison of decision and game theory approaches. Decision Analysis, 1, 3 (2004), 131-148.
-
(2004)
Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
raghunathan, S.2
-
8
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16, 1 (2005), 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
9
-
-
66549100385
-
-
Conrad, J.R. analyzing the risks of information security investments with Monte-Carlo simulations. Paper presented at the Fourth Workshop on the Economics of Information Security (WEIS), Harvard University, June 1-3, 2005 (available at http://infosecon.net/workshop/ pdf/13.pdf).
-
Conrad, J.R. analyzing the risks of information security investments with Monte-Carlo simulations. Paper presented at the Fourth Workshop on the Economics of Information Security (WEIS), Harvard University, June 1-3, 2005 (available at http://infosecon.net/workshop/ pdf/13.pdf).
-
-
-
-
12
-
-
70449807130
-
Justifying investments in new information technologies
-
Spring
-
Dos Santos, B.L. Justifying investments in new information technologies. Journal of Management Information Systems, 7, 4 (Spring 1991), 71-90.
-
(1991)
Journal of Management Information Systems
, vol.7
, Issue.4
, pp. 71-90
-
-
Dos Santos, B.L.1
-
13
-
-
4043130906
-
-
Fichman, R.G. real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15, 2 (2004), 132-152.
-
Fichman, R.G. real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15, 2 (2004), 132-152.
-
-
-
-
15
-
-
84990029315
-
the economics of information security investment
-
Gordon, L. A., and Loeb, M.P. the economics of information security investment. ACM Transactions on Information and Systems Security, 5, 4 (2002), 438-457.
-
(2002)
ACM Transactions on Information and Systems Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
16
-
-
33847304296
-
Postauditing capital projects: Are you in step with the competition?
-
Gordon, L.A., and Myers, M.D. Postauditing capital projects: Are you in step with the competition? Management Accounting, 72, 7 (1991), 39-42.
-
(1991)
Management Accounting
, vol.72
, Issue.7
, pp. 39-42
-
-
Gordon, L.A.1
Myers, M.D.2
-
17
-
-
0041766623
-
Information security expenditures and real options: A wait and see approach
-
Gordon, L.A.; Loeb, M.P.; and Lucyshyn, W. Information security expenditures and real options: A wait and see approach. Computer Security Journal, 19, 2 (2003), 1-7.
-
(2003)
Computer Security Journal
, vol.19
, Issue.2
, pp. 1-7
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
18
-
-
3242808612
-
-
Computer Security Institute, San Francisco, available at
-
Gordon, L.A.; Loeb, M.P.; Lucyshyn, W.; and richardson, R. 2006 CSI/FBI computer crime and security survey. Computer Security Institute, San Francisco, 2006 (available at www. gocsi.com/forms/fbi/csi-fbi-survey.jhtml).
-
(2006)
CSI/FBI computer crime and security survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
richardson, R.4
-
19
-
-
66549122613
-
Multinomial approximation models for options
-
C.F. Lee and A.C. Lee eds, North Brunswick, NJ: Center for Pacific Basin Business, Economic and Finance Research
-
Herath, H.S.B., and Kumar, P. Multinomial approximation models for options. In C.F. Lee and A.C. Lee (eds.), Advances in Investment Analysis and Portfolio Management, New Series, vol. 2. North Brunswick, NJ: Center for Pacific Basin Business, Economic and Finance Research, 2006, 199-226.
-
(2006)
Advances in Investment Analysis and Portfolio Management, New Series
, vol.2
, pp. 199-226
-
-
Herath, H.S.B.1
Kumar, P.2
-
20
-
-
84888397791
-
Real option valuation and its relationship to Bayesian decision-making methods
-
Herath, H.S.B., and Park, C.S. Real option valuation and its relationship to Bayesian decision-making methods. Engineering Economist, 46, 1 (2001), 1-32.
-
(2001)
Engineering Economist
, vol.46
, Issue.1
, pp. 1-32
-
-
Herath, H.S.B.1
Park, C.S.2
-
21
-
-
19644369611
-
Multi-stage capital investment opportunities as compound real options
-
Herath, H.S.B., and Park, C.S. Multi-stage capital investment opportunities as compound real options. Engineering Economist, 47, 1 (2002), 1-27.
-
(2002)
Engineering Economist
, vol.47
, Issue.1
, pp. 1-27
-
-
Herath, H.S.B.1
Park, C.S.2
-
23
-
-
0003203226
-
Strategic management of information technology investments: An options perspective
-
R.D. Banker, R.J. Kauffman, and M.A. Mahmood eds, Middletown, PA: Idea Group
-
Kambil, a.; Henderson, J.; and Mohensadeh, H. Strategic management of information technology investments: an options perspective. In R.D. Banker, R.J. Kauffman, and M.A. Mahmood (eds.), Strategic Information Technology Management: Perspectives on Organizational Growth and Competitive Advantage. Middletown, PA: Idea Group, 1993, pp. 161-178.
-
(1993)
Strategic Information Technology Management: Perspectives on Organizational Growth and Competitive Advantage
, pp. 161-178
-
-
Kambil, A.1
Henderson, J.2
Mohensadeh, H.3
-
24
-
-
7444249783
-
a framework for assessing the business value of information technology infrastructures
-
Fall
-
Kumar, R.L. a framework for assessing the business value of information technology infrastructures. Journal of Management Information Systems, 21, 2 (Fall 2004), 11-32.
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.2
, pp. 11-32
-
-
Kumar, R.L.1
-
26
-
-
0034501202
-
are we forgetting the risks of information technology?
-
Longstaff, T.A.; Chittister, C.; Pethia, R.; and Haimes, Y.Y. are we forgetting the risks of information technology? IEEE Computer, 33, 12 (2000), 43-51.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 43-51
-
-
Longstaff, T.A.1
Chittister, C.2
Pethia, R.3
Haimes, Y.Y.4
-
28
-
-
0034228564
-
assessing technology projects using real options reasoning
-
McGrath, R.G., and MacMillan, I.C. assessing technology projects using real options reasoning. Research Technology Management, 43, 4 (2000), 35-49.
-
(2000)
Research Technology Management
, vol.43
, Issue.4
, pp. 35-49
-
-
McGrath, R.G.1
MacMillan, I.C.2
-
29
-
-
66549097081
-
-
Over-confidence is pervasive amongst security professionals. CSO magazine in cooperation with U.S. Secret Service, Computer Emergency response team (CERT) Coordination Center, and Microsoft Corporation, 2007 (available at www.cert.org/archive/pdf/ecrimesum-mary07.pdf).
-
Over-confidence is pervasive amongst security professionals. CSO magazine in cooperation with U.S. Secret Service, Computer Emergency response team (CERT) Coordination Center, and Microsoft Corporation, 2007 (available at www.cert.org/archive/pdf/ecrimesum-mary07.pdf).
-
-
-
-
33
-
-
0000832328
-
Options analysis of software platform decisions: A case study
-
Taudes, A.; Feurstein, M.; and Mild, A. Options analysis of software platform decisions: A case study. MIS Quarterly, 24, 2 (2000), 227-243.
-
(2000)
MIS Quarterly
, vol.24
, Issue.2
, pp. 227-243
-
-
Taudes, A.1
Feurstein, M.2
Mild, A.3
-
34
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Ulvila, J.W., and Gaffney, J.E., Jr. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis, 1, 1 (2004), 35-50.
-
(2004)
Decision Analysis
, vol.1
, Issue.1
, pp. 35-50
-
-
Ulvila, J.W.1
Gaffney Jr., J.E.2
-
35
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive responses
-
Summer
-
Yue, W., and Çakanyildirim, M. Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24, 1 (Summer 2007), 329-353.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.1
Çakanyildirim, M.2
|