메뉴 건너뛰기




Volumn 7, Issue 4, 2009, Pages 52-60

Making the best use of cybersecurity economic models

Author keywords

Cybersecurity; Economic models; Security and privacy; Security function; Vulnerability

Indexed keywords

CYBERSECURITY; ECONOMIC MODELS; SECURITY AND PRIVACY; SECURITY FUNCTION; VULNERABILITY;

EID: 67649673141     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.98     Document Type: Article
Times cited : (15)

References (13)
  • 1
    • 67649666107 scopus 로고    scopus 로고
    • A Framework for 1. Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making
    • R. Rue, S.L. Pfleeger, and D. Ortiz, "A Framework for 1. Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making," Proc. WEIS 2007, 2007; http://weis2007.econinfosec. org/papers/76.pdf.
    • (2007) Proc. WEIS 2007
    • Rue, R.1    Pfleeger, S.L.2    Ortiz, D.3
  • 2
    • 39449096290 scopus 로고    scopus 로고
    • Cybersecurity Economic 2. Issues: Clearing the Path to Good Practice
    • S.L. Pfleeger and R. Rue, "Cybersecurity Economic 2. Issues: Clearing the Path to Good Practice," IEEE Software, vol.25, no.1, 2008, pp. 35-42.
    • (2008) IEEE Software , vol.25 , Issue.1 , pp. 35-42
    • Pfleeger, S.L.1    Rue, R.2
  • 3
    • 84944232084 scopus 로고    scopus 로고
    • 3.Interdependence of Reliability and Security
    • P. Honeyman, G.A. Schwartz, and A. Van Assche, 3. "Interdependence of Reliability and Security," Proc. WEIS 2007, 2007; http://weis2007. econinfosec.org/ papers/71.pdf.
    • (2007) Proc. WEIS 2007
    • Honeyman, P.1    Schwartz, G.A.2    Van Assche, A.3
  • 4
    • 67649673142 scopus 로고    scopus 로고
    • Opti- 4. mally Securing Interconnected Information Systems and Assets
    • V. Kumar, R. Telang and T. Mukhopadhyay, "Opti- 4. mally Securing Interconnected Information Systems and Assets," Proc. WEIS 2007, 2007; http://weis2007. econinfosec.org/papers/64.pdf.
    • (2007) Proc. WEIS 2007
    • Kumar, V.1    Telang, R.2    Mukhopadhyay, T.3
  • 5
    • 34248574143 scopus 로고    scopus 로고
    • Asymmetric Conflict: 5. Weakest Link against Best Shot
    • D.J. Clark and K.A. Konrad, "Asymmetric Conflict: 5. Weakest Link against Best Shot," J. Conflict Resolution, vol.51, no.3, 2007, pp. 457-468; http://jcr.sagepub. com/cgi/content/abstract/51/3/457.
    • (2007) J. Conflict Resolution , vol.51 , Issue.3 , pp. 457-468
    • Clark, D.J.1    Konrad, K.A.2
  • 6
    • 4243109556 scopus 로고    scopus 로고
    • A 6. Model for Evaluating IT Security Investments
    • H. Cavusoglu, B. Mishra, and S. Raghunathan, "A 6. Model for Evaluating IT Security Investments," Comm. ACM, vol.47, no.7, 2004; http://info.freeman.tulane. edu/huseyin/paper/investment.pdf.
    • (2004) Comm. ACM , vol.47 , Issue.7
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 7
    • 70350361678 scopus 로고    scopus 로고
    • An Insurance-Style Model for Deter- 7. mining the Appropriate Investment Level against Maximum Loss Arising from an Information Security Breach
    • R. Adkins, "An Insurance-Style Model for Deter- 7. mining the Appropriate Investment Level against Maximum Loss Arising from an Information Security Breach," Proc. WEIS 2004, 2004; www.dtc.umn.edu/ weis2004/adkins.pdf.
    • (2004) Proc. WEIS 2004
    • Adkins, R.1
  • 10
    • 67650197986 scopus 로고    scopus 로고
    • Improving Vulnerability Discovery Mod- 10. els
    • ACM Press
    • A. Ozment, "Improving Vulnerability Discovery Mod- 10. els," Proc. 2007 ACM Workshop on Quality of Protection, ACM Press, 2007, pp. 6-11; http://portal.acm.org/ citation.cfm?id=1314257.1314261.
    • Proc. 2007 ACM Workshop on Quality of Protection , vol.2007 , pp. 6-11
    • Ozment, A.1
  • 13
    • 84869608955 scopus 로고    scopus 로고
    • RAND Corp., 2004; www.rand.org/pubs/monograph-reports/MR1601/.
    • (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.