메뉴 건너뛰기




Volumn , Issue , 2010, Pages 118-125

Decision support for systems security investment

Author keywords

Decision support; Economics; Information security; Risk management; Systems modelling

Indexed keywords

BUSINESS OBJECTIVES; DECISION SUPPORTS; FIXED BUDGET; INFORMATION SECURITY; IT SUPPORT SERVICES; LARGE ORGANIZATIONS; MULTI-ATTRIBUTE UTILITY; SECURITY INVESTMENTS; SECURITY MANAGER; SECURITY MEASURE; STATE OF THE ART; SYSTEMATIC METHODOLOGY; SYSTEMS MODELLING; SYSTEMS SECURITY;

EID: 77957917091     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOMSW.2010.5486590     Document Type: Conference Paper
Times cited : (31)

References (30)
  • 2
    • 57649097311 scopus 로고    scopus 로고
    • Information security management: "A human challenge?"
    • doi: 10.1016/j.istr.2008.10.006
    • Ashenden, D. Information Security Management: "A Human Challenge?" Information Security Technical Report (2008), doi: 10.1016/j.istr.2008.10.006.
    • (2008) Information Security Technical Report
    • Ashenden, D.1
  • 8
    • 72649084291 scopus 로고    scopus 로고
    • A logical and computational theory of located resource
    • doi:10.1093/logcom/exp021
    • Collinson, M., Monahan, B., Pym, D.: A Logical and Computational Theory of Located Resource. Journal of Logic and Computation, 19(6): 1207-1244, 2009. doi:10.1093/logcom/exp021.
    • (2009) Journal of Logic and Computation , vol.19 , Issue.6 , pp. 1207-1244
    • Collinson, M.1    Monahan, B.2    Pym, D.3
  • 9
    • 74149091842 scopus 로고    scopus 로고
    • Algebra and logic for resource-based systems modelling
    • Collinson, M., Pym, D.: Algebra and logic for resource-based systems modelling. Math. Struct. Comp. Sci. 19:959-1027, 2009.
    • (2009) Math. Struct. Comp. Sci. , vol.19 , pp. 959-1027
    • Collinson, M.1    Pym, D.2
  • 12
    • 0020168283 scopus 로고
    • Sources of bias in assessment procedures for utility functions
    • Hersey, J.C., Kunreuther, H.C., Shoemaker, P.J.: Sources of bias in assessment procedures for utility functions. Management Science 28, 936-953, 1982.
    • (1982) Management Science , vol.28 , pp. 936-953
    • Hersey, J.C.1    Kunreuther, H.C.2    Shoemaker, P.J.3
  • 13
    • 70350359511 scopus 로고    scopus 로고
    • Investments and trade-offs in the economics of information security
    • Dingledine, R. and Golle, P. (editors), LNCS 5628 Springer
    • Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. Proc. Financial Cryptography and Data Security, Dingledine, R. and Golle, P. (editors), LNCS 5628: 148 - 166, Springer, 2009.
    • (2009) Proc. Financial Cryptography and Data Security , pp. 148-166
    • Ioannidis, C.1    Pym, D.2    Williams, J.3
  • 14
    • 0024607197 scopus 로고
    • Some experimental findings on decision-making under risk and their implications
    • Jaffrey, J.Y.: Some experimental findings on decision-making under risk and their implications. European Journal of Operational Research 38, 301-306, 1989.
    • (1989) European Journal of Operational Research , vol.38 , pp. 301-306
    • Jaffrey, J.Y.1
  • 15
    • 0037911569 scopus 로고    scopus 로고
    • A decision support system for multi-attribute utility evaluation based on imprecise assignments
    • Jimenéz, A., Ríos-Insua, S. Mateos, A.: A decision support system for multi-attribute utility evaluation based on imprecise assignments. Dec. Supp. Syst. 36, 65-79, 2003.
    • (2003) Dec. Supp. Syst. , vol.36 , pp. 65-79
    • Jimenéz, A.1    Ríos-Insua, S.2    Mateos, A.3
  • 16
    • 0031123773 scopus 로고    scopus 로고
    • Quantitative model of the security intrusion process based on attacker behaviour
    • Jonsson, E., Olovsson, A.: Quantitative Model of the Security Intrusion Process Based on Attacker Behaviour. IEEE Transactions on Software Engineering 23(4), 235 - 245, 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, A.2
  • 18
    • 0003148796 scopus 로고
    • Lottery equivalents: Reduction of the certainty effect problem in utility assessment
    • McCord, M., de Neufville, R.: Lottery equivalents: reduction of the certainty effect problem in utility assessment. Management Science 32, 56-61, 1986.
    • (1986) Management Science , vol.32 , pp. 56-61
    • McCord, M.1    De Neufville, R.2
  • 22
    • 33644694176 scopus 로고    scopus 로고
    • Complementarity in systems modelling
    • (M. Pidd, editor), Wiley
    • Pidd, M.: Complementarity in systems modelling. In: Systems Modelling: Theory and Practice (M. Pidd, editor), Wiley, 2004.
    • (2004) Systems Modelling: Theory and Practice
    • Pidd, M.1
  • 24
    • 77957927313 scopus 로고    scopus 로고
    • Where security reports reflects expanded role and responsibilities
    • Rasmussen M, Stamp P.: Where Security Reports Reflects Expanded Role And Responsibilities. Forrester 2005.
    • (2005) Forrester
    • Rasmussen, M.1    Stamp, P.2
  • 25
    • 77957914736 scopus 로고    scopus 로고
    • Jericho forum looks to bring network walls tumbling down
    • 8 July
    • Stamp, P.: Jericho Forum Looks To Bring Network Walls Tumbling Down. Forrester, 8 July, 2005.
    • (2005) Forrester
    • Stamp, P.1
  • 26
    • 0001892893 scopus 로고
    • A Bayesian approach to real estate management
    • S.E. Feinberg and A. Zellner, editors North Holland
    • Varian, H.: A bayesian approach to real estate management. In S.E. Feinberg and A. Zellner, editors, Studies in Bayesian Economics in Honour of L.J. Savage, 195-208, North Holland, 1974.
    • (1974) Studies in Bayesian Economics in Honour of L.J. Savage , pp. 195-208
    • Varian, H.1
  • 27
    • 77957929413 scopus 로고    scopus 로고
    • Predictive modelling for security operations economics
    • Presented at 23 - 24 October Washington DC. Available as HP Labs Technical Report HPL-2006-125
    • Yearworth, M., Monahan, B., Pym, D.: Predictive Modelling for Security Operations Economics. Presented at the Workshop on the Economics of Securing the Information Infrastructure (WESII), 23 - 24 October, 2006, Washington DC. Available as HP Labs Technical Report HPL-2006-125.
    • (2006) The Workshop on the Economics of Securing the Information Infrastructure (WESII)
    • Yearworth, M.1    Monahan, B.2    Pym, D.3
  • 28
    • 84950930899 scopus 로고
    • Bayesian prediction and estimation using asymmetric loss functions
    • Zellner, A.: Bayesian prediction and estimation using asymmetric loss functions. J. American Statistical Association 81:446-451, 1986.
    • (1986) J. American Statistical Association , vol.81 , pp. 446-451
    • Zellner, A.1
  • 29
    • 84922948907 scopus 로고    scopus 로고
    • Semantics for structured systems modelling and simulation
    • ICST: ACM Digital Library and EU Digital Library ISBN: 78-963-9799-87-5
    • Collinson, M., Monahan, B., and Pym, D.: Semantics for Structured Systems Modelling and Simulation. In Proc. Simutools 2010. ICST: ACM Digital Library and EU Digital Library, 2010. ISBN: 78-963-9799-87-5.
    • (2010) Proc. Simutools 2010
    • Collinson, M.1    Monahan, B.2    Pym, D.3
  • 30
    • 77957901765 scopus 로고    scopus 로고
    • Gnosis. http://www.hpl.hp.com/research/systems-security/gnosis.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.