-
5
-
-
72249093298
-
On the Gordon & Loeb model for information security investment
-
University of Cambridge, UK
-
Willemson, J.: On the Gordon & Loeb model for information security investment. In: Workshop on the Economics of Information Security (WEIS). University of Cambridge, UK (2006)
-
(2006)
Workshop on the Economics of Information Security (WEIS)
-
-
Willemson, J.1
-
6
-
-
33846138611
-
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
-
Hausken, K.: Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers 8(5), 338-349 (2006)
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.5
, pp. 338-349
-
-
Hausken, K.1
-
7
-
-
78650017659
-
Productivity space of information security in an extension of the Gordon-Loeb's investment model
-
Tuck School of Business, Dartmouth College, Hanover, NH
-
Matsuura, K.: Productivity space of information security in an extension of the Gordon-Loeb's investment model. In: Workshop on the Economics of Information Security (WEIS), Tuck School of Business, Dartmouth College, Hanover, NH (2008)
-
(2008)
Workshop on the Economics of Information Security (WEIS)
-
-
Matsuura, K.1
-
8
-
-
84868111975
-
Optimal timing of information security investment: A real options approach
-
University College London, UK
-
Tatsumi, K.i., Goto, M.: Optimal timing of information security investment: A real options approach. In:Workshop on the Economics of Information Security (WEIS). University College London, UK (2009)
-
(2009)
Workshop on the Economics of Information Security (WEIS)
-
-
Tatsumi, K.I.1
Goto, M.2
-
10
-
-
12144285368
-
Vulnerability and information security investment: An empirical analysis of e-local government in Japan
-
Tanaka, H.,Matsuura, K., Sudoh, O.: Vulnerability and information security investment: An empirical analysis of e-local government in Japan. Journal of Accounting and Public Policy 24, 37-59 (2005)
-
(2005)
Journal of Accounting and Public Policy
, vol.24
, pp. 37-59
-
-
Tanaka, H.1
Matsuura, K.2
Sudoh, O.3
-
11
-
-
84870162391
-
Return on security investments. Towards a methodological foundation of measurement systems
-
Brocke, J., Grob, H., Buddendick, C., Strauch, G.: Return on security investments. Towards a methodological foundation of measurement systems. In: Proc. of AMCIS (2007)
-
Proc. of AMCIS (2007)
-
-
Brocke, J.1
Grob, H.2
Buddendick, C.3
Strauch, G.4
-
14
-
-
13444274614
-
Evaluating information security investments using the analytic hierarchy process
-
Bodin, L.D., Gordon, L.A., Loeb, M.P.: Evaluating information security investments using the analytic hierarchy process. Communications of the ACM 48(2), 79-83 (2005)
-
(2005)
Communications of the ACM
, vol.48
, Issue.2
, pp. 79-83
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.P.3
-
16
-
-
45449112776
-
Economic security metrics
-
Eusgeld, I., Freiling, F.C., Reussner, R. (eds.) Dependability Metrics Springer, Heidelberg
-
Böhme, R., Nowey, T.: Economic security metrics. In: Eusgeld, I., Freiling, F.C., Reussner, R. (eds.) Dependability Metrics. LNCS, vol. 4909, pp. 176-187. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4909
, pp. 176-187
-
-
Böhme, R.1
Nowey, T.2
-
17
-
-
78649994653
-
Fuzzy economic decision-models for information security investment
-
Sheen, J.: Fuzzy economic decision-models for information security investment. In: Proc. of IMCAS, Hangzhou, China, pp. 141-147 (2010)
-
(2010)
Proc. of IMCAS, Hangzhou, China
, pp. 141-147
-
-
Sheen, J.1
-
19
-
-
70349726922
-
How much is enough? A risk-management approach to computer security
-
University of California, Berkeley, CA
-
Soo Hoo, K.J.: How much is enough? A risk-management approach to computer security. In: Workshop on Economics and Information Security (WEIS), University of California, Berkeley, CA (2002)
-
(2002)
Workshop on Economics and Information Security (WEIS)
-
-
Soo Hoo, K.J.1
-
21
-
-
67249120924
-
-
Study commissioned by ENISA
-
Anderson, R., Böhme, R., Clayton, R., Moore, T.: Security Economics and the Internal Market. Study commissioned by ENISA (2008)
-
(2008)
Security Economics and the Internal Market
-
-
Anderson, R.1
Böhme, R.2
Clayton, R.3
Moore, T.4
-
22
-
-
33746608318
-
-
Technical report, Centre for Communications Systems Research (CCSR), University of Cambridge, UK
-
Matsuura, K.: Security tokens and their derivatives. Technical report, Centre for Communications Systems Research (CCSR), University of Cambridge, UK (2001)
-
(2001)
Security Tokens and Their Derivatives
-
-
Matsuura, K.1
-
23
-
-
33746613622
-
A comparison of market approaches to software vulnerability disclosure
-
Müller, G. (ed.) ETRICS 2006 Springer, Heidelberg
-
Böhme, R.: A comparison of market approaches to software vulnerability disclosure. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 298-311. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3995
, pp. 298-311
-
-
Böhme, R.1
-
24
-
-
8444250312
-
Improving the ROI of the security management process
-
Purser, S.A.: Improving the ROI of the security management process. Computers & Security 23, 542-546 (2004)
-
(2004)
Computers & Security
, vol.23
, pp. 542-546
-
-
Purser, S.A.1
-
25
-
-
78649992675
-
Security ROI: Fact or fiction?
-
September
-
Schneier, B.: Security ROI: Fact or fiction? CSO Magazine (September 2008)
-
(2008)
CSO Magazine
-
-
Schneier, B.1
-
26
-
-
0041766623
-
Information security expenditures and real options: A wait-and-see approach
-
Gordon, L.A., Loeb, M.P., Lucyshyn, W.: Information security expenditures and real options: A wait-and-see approach. Computer Security Journal 14(2), 1-7 (2003)
-
(2003)
Computer Security Journal
, vol.14
, Issue.2
, pp. 1-7
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
27
-
-
66549117052
-
Investments in information security: A real options perspective with Bayesian postaudit
-
Herath, H.S.B., Herath, T.C.: Investments in information security: A real options perspective with Bayesian postaudit. Journal of Management Information Systems 25(3), 337-375 (2008)
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.3
, pp. 337-375
-
-
Herath, H.S.B.1
Herath, T.C.2
-
28
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive responses
-
Yue, W.T., Çakanyildirim, M.: Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems 24(1), 329-353 (2007)
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.T.1
Çakanyildirim, M.2
-
29
-
-
70349977415
-
Uncertainty in the weakest-link security game
-
IEEE Press, Los Alamitos
-
Grossklags, J., Johnson, B.: Uncertainty in the weakest-link security game. In: Proceedings of the International Conference on Game Theory for Networks (GameNets 2009), Istanbul, Turkey, pp. 673-682. IEEE Press, Los Alamitos (2009)
-
(2009)
Proceedings of the International Conference on Game Theory for Networks (GameNets 2009), Istanbul, Turkey
, pp. 673-682
-
-
Grossklags, J.1
Johnson, B.2
-
30
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
Gordon, L.A., Loeb, M.P., Lucysshyn, W.: Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy 22(6) (2003)
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucysshyn, W.3
-
31
-
-
30344462995
-
The economic incentives for sharing security information
-
DOI 10.1287/isre.1050.0053
-
Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005) (Pubitemid 43057222)
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Chose, A.2
-
32
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee,W., Fan,W., Miller, M., Stolfo, S.J., Zadok, E.: Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 10(1-2), 5-22 (2002) (Pubitemid 34531411)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
33
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
DOI 10.1287/isre.1050.0041
-
Cavusoglu, H., Mishra, B., Raghunathan, S.: The value of intrusion detection systems in information technology security architecture. Information Systems Research 16(1), 28-46 (2005) (Pubitemid 40701107)
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
34
-
-
85050728749
-
Optimal information security investment with penetration testing
-
Berlin, Germany to appear
-
Böhme, R., Félegyházi, M.: Optimal information security investment with penetration testing. In: Decision and Game Theory for Security (GameSec), Berlin, Germany (to appear, 2010)
-
(2010)
Decision and Game Theory for Security (GameSec)
-
-
Böhme, R.1
Félegyházi, M.2
-
35
-
-
33749469503
-
-
Carnegie Mellon Software Engineering Institute, Pittsburgh
-
Allen, J., Gabbard, D., May, C.: Outsourcing managed Security Services. Carnegie Mellon Software Engineering Institute, Pittsburgh (2003)
-
(2003)
Outsourcing Managed Security Services
-
-
Allen, J.1
Gabbard, D.2
May, C.3
-
36
-
-
44649197264
-
Theory of the firm: Managerial behavior, agency costs and ownership structure
-
Jensen, M.C., Meckling, W.H.: Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics 3(4), 305-360 (1976)
-
(1976)
Journal of Financial Economics
, vol.3
, Issue.4
, pp. 305-360
-
-
Jensen, M.C.1
Meckling, W.H.2
-
37
-
-
33744922914
-
Outsourcing internet security: Economic analysis of incentives for managed security service providers
-
Deng, X., Ye, Y. (eds.) WINE 2005 Springer, Heidelberg
-
Ding, W., Yurcik, W., Yin, X.: Outsourcing internet security: Economic analysis of incentives for managed security service providers. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 947-958. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3828
, pp. 947-958
-
-
Ding, W.1
Yurcik, W.2
Yin, X.3
-
38
-
-
33744922914
-
Outsourcing internet security: The effect of transaction costs o managed service providers
-
Ding, W., Yurcik, W.: Outsourcing internet security: The effect of transaction costs o managed service providers. In: Prof. of Intl. Conf.on Telecomm. Systems, pp. 947-958 (2005)
-
(2005)
Prof. of Intl. Conf.on Telecomm. Systems
, pp. 947-958
-
-
Ding, W.1
Yurcik, W.2
-
39
-
-
78650028086
-
Will outsourcing IT security lead to a higher social level of security?
-
Carnegie Mellon University, Pittsburgh, PA
-
Rowe, B.R.: Will outsourcing IT security lead to a higher social level of security? In: Workshop on the Economics of Information Security (WEIS), Carnegie Mellon University, Pittsburgh, PA (2007)
-
(2007)
Workshop on the Economics of Information Security (WEIS)
-
-
Rowe, B.R.1
-
41
-
-
85036474464
-
Outsourcing information security: Contracting issues and security implications
-
Harvard University, Cambridge, MA
-
Cezar, A., Cavusoglu, H., Raghunathan, S.: Outsourcing information security: Contracting issues and security implications. In: Workshop on the Economics of Information Security (WEIS), Harvard University, Cambridge, MA (2010)
-
(2010)
Workshop on the Economics of Information Security (WEIS)
-
-
Cezar, A.1
Cavusoglu, H.2
Raghunathan, S.3
-
42
-
-
79959243929
-
Modeling cyber-insurance: Towards a unifying framework
-
Harvard University, Cambridge, MA
-
Böhme, R., Schwartz, G.: Modeling cyber-insurance: Towards a unifying framework. In: Workshop on the Economics of Information Security (WEIS), Harvard University, Cambridge, MA (2010)
-
(2010)
Workshop on the Economics of Information Security (WEIS)
-
-
Böhme, R.1
Schwartz, G.2
-
43
-
-
84870958312
-
Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling
-
Zhao, X., Xue, L., Whinston, A.B.: Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling. In: Proc. of ICIS (2009)
-
Proc. of ICIS (2009)
-
-
Zhao, X.1
Xue, L.2
Whinston, A.B.3
-
45
-
-
0000071449
-
From weakest-link to best-shot: The voluntary provision of public goods
-
Hirshleifer, J.: From weakest-link to best-shot: The voluntary provision of public goods. Public Choice 41, 371-386 (1983)
-
(1983)
Public Choice
, vol.41
, pp. 371-386
-
-
Hirshleifer, J.1
-
47
-
-
57349198694
-
Secure or insure? A game-theoretic analysis of information security games
-
ACM Press, New York
-
Grossklags, J., Christin, N., Chuang, J.: Secure or insure? A game-theoretic analysis of information security games. In: Proceeding of the International Conference on World Wide Web (WWW), Beijing, China, pp. 209-218. ACM Press, New York (2008)
-
(2008)
Proceeding of the International Conference on World Wide Web (WWW), Beijing, China
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
48
-
-
84909999858
-
Understanding and influencing attackers' decisions: Implications for security investment strategies
-
University of Cambridge, UK
-
Cremonini, M., Nizovtsev, D.: Understanding and influencing attackers' decisions: Implications for security investment strategies. In: Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK (2006)
-
(2006)
Workshop on the Economics of Information Security (WEIS)
-
-
Cremonini, M.1
Nizovtsev, D.2
-
49
-
-
78650018495
-
An empirical analysis of security investment in countermeasures based on an enterprise survey in Japan
-
University of Cambridge, UK
-
Liu, W., Tanaka, H., Matsuura, K.: An empirical analysis of security investment in countermeasures based on an enterprise survey in Japan. In: Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK (2006)
-
(2006)
Workshop on the Economics of Information Security (WEIS)
-
-
Liu, W.1
Tanaka, H.2
Matsuura, K.3
|