메뉴 건너뛰기




Volumn 25, Issue 3, 2009, Pages 337-375

Investments in information security: A real options perspective with Bayesian postaudit

Author keywords

Bayesian revisions; Conjugate prior distributions; Economics of information security; Information security investments; Postaudit; Real options; Return on investment; ROC curves

Indexed keywords

BAYESIAN REVISIONS; CONJUGATE PRIOR DISTRIBUTIONS; ECONOMICS OF INFORMATION SECURITY; INFORMATION SECURITY INVESTMENTS; POSTAUDIT; REAL OPTIONS; RETURN ON INVESTMENT; ROC CURVES;

EID: 66549117052     PISSN: 07421222     EISSN: None     Source Type: Journal    
DOI: 10.2753/MIS0742-1222250310     Document Type: Article
Times cited : (72)

References (35)
  • 1
    • 7444259766 scopus 로고    scopus 로고
    • Prioritizing a portfolio of information technology investment projects
    • Fall
    • Bardhan, I.; Bagchi, S.; and Sougstad, R. Prioritizing a portfolio of information technology investment projects. Journal of Management Information Systems, 21, 2 (Fall 2004), 33-60.
    • (2004) Journal of Management Information Systems , vol.21 , Issue.2 , pp. 33-60
    • Bardhan, I.1    Bagchi, S.2    Sougstad, R.3
  • 2
    • 0036754796 scopus 로고    scopus 로고
    • Managing information technology investment risk: A real options perspective
    • Fall
    • Benaroch, M. Managing information technology investment risk: A real options perspective. Journal of Management Information Systems, 19, 2 (Fall 2002), 43-84.
    • (2002) Journal of Management Information Systems , vol.19 , Issue.2 , pp. 43-84
    • Benaroch, M.1
  • 3
    • 0033437913 scopus 로고    scopus 로고
    • A case for using real options pricing analysis to evaluate information technology project investments
    • Benaroch, M., and Kauffman, R. A case for using real options pricing analysis to evaluate information technology project investments. Information Systems Research, 10, 1 (1999), 70-86.
    • (1999) Information Systems Research , vol.10 , Issue.1 , pp. 70-86
    • Benaroch, M.1    Kauffman, R.2
  • 4
    • 33845779035 scopus 로고    scopus 로고
    • On the valuation of multistage information technology investments embedding nested real options
    • Summer
    • Benaroch, M.; Shah, S.; and Jeffery, M. On the valuation of multistage information technology investments embedding nested real options. Journal of Management Information Systems, 23, 1 (Summer 2006), 239-261.
    • (2006) Journal of Management Information Systems , vol.23 , Issue.1 , pp. 239-261
    • Benaroch, M.1    Shah, S.2    Jeffery, M.3
  • 5
    • 66549121879 scopus 로고    scopus 로고
    • Bierman, H., jr., and Rao, V. Investment decisions with sampling. Financial Management, 7, 7 (1978), 19-24.
    • Bierman, H., jr., and Rao, V. Investment decisions with sampling. Financial Management, 7, 7 (1978), 19-24.
  • 6
    • 66549109675 scopus 로고    scopus 로고
    • Bridwell, L. ICSA Labs 10th annual computer virus prevalence survey 2004. Mechanicsburg, Pa: ICSa Labs, 2005 (available at www.icsalabs.com/ icsa/docs/html/library/whitepapers/ VPS2004.pdf).
    • Bridwell, L. ICSA Labs 10th annual computer virus prevalence survey 2004. Mechanicsburg, Pa: ICSa Labs, 2005 (available at www.icsalabs.com/ icsa/docs/html/library/whitepapers/ VPS2004.pdf).
  • 7
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of detection software: A comparison of decision and game theory approaches
    • Cavusoglu, H., and raghunathan, S. Configuration of detection software: A comparison of decision and game theory approaches. Decision Analysis, 1, 3 (2004), 131-148.
    • (2004) Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    raghunathan, S.2
  • 8
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16, 1 (2005), 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 9
    • 66549100385 scopus 로고    scopus 로고
    • Conrad, J.R. analyzing the risks of information security investments with Monte-Carlo simulations. Paper presented at the Fourth Workshop on the Economics of Information Security (WEIS), Harvard University, June 1-3, 2005 (available at http://infosecon.net/workshop/ pdf/13.pdf).
    • Conrad, J.R. analyzing the risks of information security investments with Monte-Carlo simulations. Paper presented at the Fourth Workshop on the Economics of Information Security (WEIS), Harvard University, June 1-3, 2005 (available at http://infosecon.net/workshop/ pdf/13.pdf).
  • 12
    • 70449807130 scopus 로고
    • Justifying investments in new information technologies
    • Spring
    • Dos Santos, B.L. Justifying investments in new information technologies. Journal of Management Information Systems, 7, 4 (Spring 1991), 71-90.
    • (1991) Journal of Management Information Systems , vol.7 , Issue.4 , pp. 71-90
    • Dos Santos, B.L.1
  • 13
    • 4043130906 scopus 로고    scopus 로고
    • Fichman, R.G. real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15, 2 (2004), 132-152.
    • Fichman, R.G. real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15, 2 (2004), 132-152.
  • 16
    • 33847304296 scopus 로고
    • Postauditing capital projects: Are you in step with the competition?
    • Gordon, L.A., and Myers, M.D. Postauditing capital projects: Are you in step with the competition? Management Accounting, 72, 7 (1991), 39-42.
    • (1991) Management Accounting , vol.72 , Issue.7 , pp. 39-42
    • Gordon, L.A.1    Myers, M.D.2
  • 17
    • 0041766623 scopus 로고    scopus 로고
    • Information security expenditures and real options: A wait and see approach
    • Gordon, L.A.; Loeb, M.P.; and Lucyshyn, W. Information security expenditures and real options: A wait and see approach. Computer Security Journal, 19, 2 (2003), 1-7.
    • (2003) Computer Security Journal , vol.19 , Issue.2 , pp. 1-7
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 19
    • 66549122613 scopus 로고    scopus 로고
    • Multinomial approximation models for options
    • C.F. Lee and A.C. Lee eds, North Brunswick, NJ: Center for Pacific Basin Business, Economic and Finance Research
    • Herath, H.S.B., and Kumar, P. Multinomial approximation models for options. In C.F. Lee and A.C. Lee (eds.), Advances in Investment Analysis and Portfolio Management, New Series, vol. 2. North Brunswick, NJ: Center for Pacific Basin Business, Economic and Finance Research, 2006, 199-226.
    • (2006) Advances in Investment Analysis and Portfolio Management, New Series , vol.2 , pp. 199-226
    • Herath, H.S.B.1    Kumar, P.2
  • 20
    • 84888397791 scopus 로고    scopus 로고
    • Real option valuation and its relationship to Bayesian decision-making methods
    • Herath, H.S.B., and Park, C.S. Real option valuation and its relationship to Bayesian decision-making methods. Engineering Economist, 46, 1 (2001), 1-32.
    • (2001) Engineering Economist , vol.46 , Issue.1 , pp. 1-32
    • Herath, H.S.B.1    Park, C.S.2
  • 21
    • 19644369611 scopus 로고    scopus 로고
    • Multi-stage capital investment opportunities as compound real options
    • Herath, H.S.B., and Park, C.S. Multi-stage capital investment opportunities as compound real options. Engineering Economist, 47, 1 (2002), 1-27.
    • (2002) Engineering Economist , vol.47 , Issue.1 , pp. 1-27
    • Herath, H.S.B.1    Park, C.S.2
  • 24
    • 7444249783 scopus 로고    scopus 로고
    • a framework for assessing the business value of information technology infrastructures
    • Fall
    • Kumar, R.L. a framework for assessing the business value of information technology infrastructures. Journal of Management Information Systems, 21, 2 (Fall 2004), 11-32.
    • (2004) Journal of Management Information Systems , vol.21 , Issue.2 , pp. 11-32
    • Kumar, R.L.1
  • 26
    • 0034501202 scopus 로고    scopus 로고
    • are we forgetting the risks of information technology?
    • Longstaff, T.A.; Chittister, C.; Pethia, R.; and Haimes, Y.Y. are we forgetting the risks of information technology? IEEE Computer, 33, 12 (2000), 43-51.
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 43-51
    • Longstaff, T.A.1    Chittister, C.2    Pethia, R.3    Haimes, Y.Y.4
  • 28
    • 0034228564 scopus 로고    scopus 로고
    • assessing technology projects using real options reasoning
    • McGrath, R.G., and MacMillan, I.C. assessing technology projects using real options reasoning. Research Technology Management, 43, 4 (2000), 35-49.
    • (2000) Research Technology Management , vol.43 , Issue.4 , pp. 35-49
    • McGrath, R.G.1    MacMillan, I.C.2
  • 29
    • 66549097081 scopus 로고    scopus 로고
    • Over-confidence is pervasive amongst security professionals. CSO magazine in cooperation with U.S. Secret Service, Computer Emergency response team (CERT) Coordination Center, and Microsoft Corporation, 2007 (available at www.cert.org/archive/pdf/ecrimesum-mary07.pdf).
    • Over-confidence is pervasive amongst security professionals. CSO magazine in cooperation with U.S. Secret Service, Computer Emergency response team (CERT) Coordination Center, and Microsoft Corporation, 2007 (available at www.cert.org/archive/pdf/ecrimesum-mary07.pdf).
  • 33
    • 0000832328 scopus 로고    scopus 로고
    • Options analysis of software platform decisions: A case study
    • Taudes, A.; Feurstein, M.; and Mild, A. Options analysis of software platform decisions: A case study. MIS Quarterly, 24, 2 (2000), 227-243.
    • (2000) MIS Quarterly , vol.24 , Issue.2 , pp. 227-243
    • Taudes, A.1    Feurstein, M.2    Mild, A.3
  • 34
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • Ulvila, J.W., and Gaffney, J.E., Jr. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis, 1, 1 (2004), 35-50.
    • (2004) Decision Analysis , vol.1 , Issue.1 , pp. 35-50
    • Ulvila, J.W.1    Gaffney Jr., J.E.2
  • 35
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive responses
    • Summer
    • Yue, W., and Çakanyildirim, M. Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24, 1 (Summer 2007), 329-353.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.1    Çakanyildirim, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.