메뉴 건너뛰기




Volumn 6434 LNCS, Issue , 2010, Pages 10-24

Security metrics and security investment models

Author keywords

[No Author keywords available]

Indexed keywords

BUDGET CONTROL; INVESTMENTS;

EID: 78650003609     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16825-3_2     Document Type: Conference Paper
Times cited : (53)

References (50)
  • 5
    • 72249093298 scopus 로고    scopus 로고
    • On the Gordon & Loeb model for information security investment
    • University of Cambridge, UK
    • Willemson, J.: On the Gordon & Loeb model for information security investment. In: Workshop on the Economics of Information Security (WEIS). University of Cambridge, UK (2006)
    • (2006) Workshop on the Economics of Information Security (WEIS)
    • Willemson, J.1
  • 6
    • 33846138611 scopus 로고    scopus 로고
    • Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    • Hausken, K.: Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers 8(5), 338-349 (2006)
    • (2006) Information Systems Frontiers , vol.8 , Issue.5 , pp. 338-349
    • Hausken, K.1
  • 7
    • 78650017659 scopus 로고    scopus 로고
    • Productivity space of information security in an extension of the Gordon-Loeb's investment model
    • Tuck School of Business, Dartmouth College, Hanover, NH
    • Matsuura, K.: Productivity space of information security in an extension of the Gordon-Loeb's investment model. In: Workshop on the Economics of Information Security (WEIS), Tuck School of Business, Dartmouth College, Hanover, NH (2008)
    • (2008) Workshop on the Economics of Information Security (WEIS)
    • Matsuura, K.1
  • 8
    • 84868111975 scopus 로고    scopus 로고
    • Optimal timing of information security investment: A real options approach
    • University College London, UK
    • Tatsumi, K.i., Goto, M.: Optimal timing of information security investment: A real options approach. In:Workshop on the Economics of Information Security (WEIS). University College London, UK (2009)
    • (2009) Workshop on the Economics of Information Security (WEIS)
    • Tatsumi, K.I.1    Goto, M.2
  • 10
    • 12144285368 scopus 로고    scopus 로고
    • Vulnerability and information security investment: An empirical analysis of e-local government in Japan
    • Tanaka, H.,Matsuura, K., Sudoh, O.: Vulnerability and information security investment: An empirical analysis of e-local government in Japan. Journal of Accounting and Public Policy 24, 37-59 (2005)
    • (2005) Journal of Accounting and Public Policy , vol.24 , pp. 37-59
    • Tanaka, H.1    Matsuura, K.2    Sudoh, O.3
  • 11
    • 84870162391 scopus 로고    scopus 로고
    • Return on security investments. Towards a methodological foundation of measurement systems
    • Brocke, J., Grob, H., Buddendick, C., Strauch, G.: Return on security investments. Towards a methodological foundation of measurement systems. In: Proc. of AMCIS (2007)
    • Proc. of AMCIS (2007)
    • Brocke, J.1    Grob, H.2    Buddendick, C.3    Strauch, G.4
  • 14
    • 13444274614 scopus 로고    scopus 로고
    • Evaluating information security investments using the analytic hierarchy process
    • Bodin, L.D., Gordon, L.A., Loeb, M.P.: Evaluating information security investments using the analytic hierarchy process. Communications of the ACM 48(2), 79-83 (2005)
    • (2005) Communications of the ACM , vol.48 , Issue.2 , pp. 79-83
    • Bodin, L.D.1    Gordon, L.A.2    Loeb, M.P.3
  • 16
    • 45449112776 scopus 로고    scopus 로고
    • Economic security metrics
    • Eusgeld, I., Freiling, F.C., Reussner, R. (eds.) Dependability Metrics Springer, Heidelberg
    • Böhme, R., Nowey, T.: Economic security metrics. In: Eusgeld, I., Freiling, F.C., Reussner, R. (eds.) Dependability Metrics. LNCS, vol. 4909, pp. 176-187. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4909 , pp. 176-187
    • Böhme, R.1    Nowey, T.2
  • 17
    • 78649994653 scopus 로고    scopus 로고
    • Fuzzy economic decision-models for information security investment
    • Sheen, J.: Fuzzy economic decision-models for information security investment. In: Proc. of IMCAS, Hangzhou, China, pp. 141-147 (2010)
    • (2010) Proc. of IMCAS, Hangzhou, China , pp. 141-147
    • Sheen, J.1
  • 19
    • 70349726922 scopus 로고    scopus 로고
    • How much is enough? A risk-management approach to computer security
    • University of California, Berkeley, CA
    • Soo Hoo, K.J.: How much is enough? A risk-management approach to computer security. In: Workshop on Economics and Information Security (WEIS), University of California, Berkeley, CA (2002)
    • (2002) Workshop on Economics and Information Security (WEIS)
    • Soo Hoo, K.J.1
  • 22
    • 33746608318 scopus 로고    scopus 로고
    • Technical report, Centre for Communications Systems Research (CCSR), University of Cambridge, UK
    • Matsuura, K.: Security tokens and their derivatives. Technical report, Centre for Communications Systems Research (CCSR), University of Cambridge, UK (2001)
    • (2001) Security Tokens and Their Derivatives
    • Matsuura, K.1
  • 23
    • 33746613622 scopus 로고    scopus 로고
    • A comparison of market approaches to software vulnerability disclosure
    • Müller, G. (ed.) ETRICS 2006 Springer, Heidelberg
    • Böhme, R.: A comparison of market approaches to software vulnerability disclosure. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 298-311. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3995 , pp. 298-311
    • Böhme, R.1
  • 24
    • 8444250312 scopus 로고    scopus 로고
    • Improving the ROI of the security management process
    • Purser, S.A.: Improving the ROI of the security management process. Computers & Security 23, 542-546 (2004)
    • (2004) Computers & Security , vol.23 , pp. 542-546
    • Purser, S.A.1
  • 25
    • 78649992675 scopus 로고    scopus 로고
    • Security ROI: Fact or fiction?
    • September
    • Schneier, B.: Security ROI: Fact or fiction? CSO Magazine (September 2008)
    • (2008) CSO Magazine
    • Schneier, B.1
  • 26
    • 0041766623 scopus 로고    scopus 로고
    • Information security expenditures and real options: A wait-and-see approach
    • Gordon, L.A., Loeb, M.P., Lucyshyn, W.: Information security expenditures and real options: A wait-and-see approach. Computer Security Journal 14(2), 1-7 (2003)
    • (2003) Computer Security Journal , vol.14 , Issue.2 , pp. 1-7
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 27
    • 66549117052 scopus 로고    scopus 로고
    • Investments in information security: A real options perspective with Bayesian postaudit
    • Herath, H.S.B., Herath, T.C.: Investments in information security: A real options perspective with Bayesian postaudit. Journal of Management Information Systems 25(3), 337-375 (2008)
    • (2008) Journal of Management Information Systems , vol.25 , Issue.3 , pp. 337-375
    • Herath, H.S.B.1    Herath, T.C.2
  • 28
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive responses
    • Yue, W.T., Çakanyildirim, M.: Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems 24(1), 329-353 (2007)
    • (2007) Journal of Management Information Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.T.1    Çakanyildirim, M.2
  • 31
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • DOI 10.1287/isre.1050.0053
    • Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005) (Pubitemid 43057222)
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Chose, A.2
  • 32
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Lee,W., Fan,W., Miller, M., Stolfo, S.J., Zadok, E.: Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 10(1-2), 5-22 (2002) (Pubitemid 34531411)
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.J.4    Zadok, E.5
  • 33
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • DOI 10.1287/isre.1050.0041
    • Cavusoglu, H., Mishra, B., Raghunathan, S.: The value of intrusion detection systems in information technology security architecture. Information Systems Research 16(1), 28-46 (2005) (Pubitemid 40701107)
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 34
  • 36
    • 44649197264 scopus 로고
    • Theory of the firm: Managerial behavior, agency costs and ownership structure
    • Jensen, M.C., Meckling, W.H.: Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of Financial Economics 3(4), 305-360 (1976)
    • (1976) Journal of Financial Economics , vol.3 , Issue.4 , pp. 305-360
    • Jensen, M.C.1    Meckling, W.H.2
  • 37
    • 33744922914 scopus 로고    scopus 로고
    • Outsourcing internet security: Economic analysis of incentives for managed security service providers
    • Deng, X., Ye, Y. (eds.) WINE 2005 Springer, Heidelberg
    • Ding, W., Yurcik, W., Yin, X.: Outsourcing internet security: Economic analysis of incentives for managed security service providers. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 947-958. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3828 , pp. 947-958
    • Ding, W.1    Yurcik, W.2    Yin, X.3
  • 38
    • 33744922914 scopus 로고    scopus 로고
    • Outsourcing internet security: The effect of transaction costs o managed service providers
    • Ding, W., Yurcik, W.: Outsourcing internet security: The effect of transaction costs o managed service providers. In: Prof. of Intl. Conf.on Telecomm. Systems, pp. 947-958 (2005)
    • (2005) Prof. of Intl. Conf.on Telecomm. Systems , pp. 947-958
    • Ding, W.1    Yurcik, W.2
  • 39
    • 78650028086 scopus 로고    scopus 로고
    • Will outsourcing IT security lead to a higher social level of security?
    • Carnegie Mellon University, Pittsburgh, PA
    • Rowe, B.R.: Will outsourcing IT security lead to a higher social level of security? In: Workshop on the Economics of Information Security (WEIS), Carnegie Mellon University, Pittsburgh, PA (2007)
    • (2007) Workshop on the Economics of Information Security (WEIS)
    • Rowe, B.R.1
  • 43
    • 84870958312 scopus 로고    scopus 로고
    • Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling
    • Zhao, X., Xue, L., Whinston, A.B.: Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling. In: Proc. of ICIS (2009)
    • Proc. of ICIS (2009)
    • Zhao, X.1    Xue, L.2    Whinston, A.B.3
  • 45
    • 0000071449 scopus 로고
    • From weakest-link to best-shot: The voluntary provision of public goods
    • Hirshleifer, J.: From weakest-link to best-shot: The voluntary provision of public goods. Public Choice 41, 371-386 (1983)
    • (1983) Public Choice , vol.41 , pp. 371-386
    • Hirshleifer, J.1
  • 48
    • 84909999858 scopus 로고    scopus 로고
    • Understanding and influencing attackers' decisions: Implications for security investment strategies
    • University of Cambridge, UK
    • Cremonini, M., Nizovtsev, D.: Understanding and influencing attackers' decisions: Implications for security investment strategies. In: Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK (2006)
    • (2006) Workshop on the Economics of Information Security (WEIS)
    • Cremonini, M.1    Nizovtsev, D.2
  • 49
    • 78650018495 scopus 로고    scopus 로고
    • An empirical analysis of security investment in countermeasures based on an enterprise survey in Japan
    • University of Cambridge, UK
    • Liu, W., Tanaka, H., Matsuura, K.: An empirical analysis of security investment in countermeasures based on an enterprise survey in Japan. In: Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK (2006)
    • (2006) Workshop on the Economics of Information Security (WEIS)
    • Liu, W.1    Tanaka, H.2    Matsuura, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.