메뉴 건너뛰기




Volumn 35, Issue 2, 2011, Pages 397-422

Correlated failures, diversification, and information security risk management

Author keywords

Correlated failures; Diversification; Downtime loss; Network effects; Risk management; Security; Software allocation

Indexed keywords

INFORMATION SERVICES; QUEUEING THEORY; REPAIR; RISK ASSESSMENT; RISK MANAGEMENT;

EID: 80051749786     PISSN: 02767783     EISSN: None     Source Type: Journal    
DOI: 10.2307/23044049     Document Type: Article
Times cited : (99)

References (36)
  • 1
    • 77954250852 scopus 로고    scopus 로고
    • An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure
    • Arora, A., Krishnan, R., Telang, R., and Yang, Y. 2010. "An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure," Information Systems Research. (21:1), pp. 115-132.
    • (2010) Information Systems Research , vol.21 , Issue.1 , pp. 115-132
    • Arora, A.1    Krishnan, R.2    Telang, R.3    Yang, Y.4
  • 2
    • 0003217728 scopus 로고
    • The methodology of n-Version programming
    • M. R. Lyu (ed.), New York: Wiley
    • Avizienis, A. 1995. "The Methodology of n-Version Programming," Chapter 2 in Software Fault Tolerance, M. R. Lyu (ed.), New York: Wiley.
    • (1995) Chapter 2 in Software Fault Tolerance
    • Avizienis, A.1
  • 4
    • 21844470195 scopus 로고    scopus 로고
    • On correlated failures in survivable storage systems, 2002
    • Carnegie Mellon University, School of Computer Science, Pittsburgh, PA
    • Bakkaloglu, M., Wylie, J., Wang, C., and Ganger, G. 2002. "On Correlated Failures in Survivable Storage Systems, 2002," Technical Report CMU-CS-02-129, Carnegie Mellon University, School of Computer Science, Pittsburgh, PA.
    • (2002) Technical Report CMU-CS-02-129
    • Bakkaloglu, M.1    Wylie, J.2    Wang, C.3    Ganger, G.4
  • 6
    • 0006298293 scopus 로고    scopus 로고
    • Network externalities in microcomputer software: An econometric analysis of the spreadsheet market
    • Brynjolfsson, E., and Kemerer, C. 1996. "Network Externalities in Microcomputer Software: An Econometric Analysis of the Spreadsheet Market," Management Science (42:12), pp. 1627-2647.
    • (1996) Management Science , vol.42 , Issue.12 , pp. 1627-2647
    • Brynjolfsson, E.1    Kemerer, C.2
  • 7
    • 80051762247 scopus 로고    scopus 로고
    • A model for opportunistic network exploits: The case of P2P worms
    • June 26-28, University of Cambridge, UK, available online
    • Collins, M., Gates, C., and Kataria, G. 2006. "A Model for Opportunistic Network Exploits: The Case of P2P Worms," in Proceedings of the Fifth Workshop on the Economics of Information Security, June 26-28, University of Cambridge, UK (available online, http://weis2006.econinfosec.org/ docs/16.pdf).
    • (2006) Proceedings of the Fifth Workshop on the Economics of Information Security
    • Collins, M.1    Gates, C.2    Kataria, G.3
  • 9
    • 3042705697 scopus 로고
    • Approximation for bursty (and Smoothed) arrival queuing delays based on generalized peakedness
    • Kyoto
    • Eckberg, A. 1985. "Approximation for Bursty (and Smoothed) Arrival Queuing Delays Based on Generalized Peakedness," in Proceedings of the 11th International Teletraffic Congress, Kyoto.
    • (1985) Proceedings of the 11th International Teletraffic Congress
    • Eckberg, A.1
  • 11
    • 66049101414 scopus 로고    scopus 로고
    • Coordination and lock-in: Competition with switching costs and network effects
    • M. Armstrong and R. Porter (eds.), Amsterdam: North Holland
    • Farrell, J., and Klemperer, P. 2001. "Coordination and Lock-In: Competition with Switching Costs and Network Effects," Chapter 31 in Handbook of Industrial Organization (Volume 3), M. Armstrong and R. Porter (eds.), Amsterdam: North Holland.
    • (2001) Chapter 31 in Handbook of Industrial Organization , vol.3
    • Farrell, J.1    Klemperer, P.2
  • 13
    • 0002942943 scopus 로고
    • Rules for ordering uncertain prospects
    • Hadar, J., and Russell, W. 1969. "Rules for Ordering Uncertain Prospects," American Economic Review (59), pp. 25-34.
    • (1969) American Economic Review , vol.59 , pp. 25-34
    • Hadar, J.1    Russell, W.2
  • 14
    • 84858940547 scopus 로고    scopus 로고
    • Honeynet Project, available online
    • Honeynet Project. 2004. "Know Your Enemy: Trends" (available online, http://old.honeynet.org/papers/enemy/).
    • (2004) Know Your Enemy: Trends
  • 16
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities? Think again
    • Kannan, K., and Telang, R. "Market for Software Vulnerabilities? Think Again," Management Science (51:5), pp. 726-740.
    • Management Science , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 17
    • 85020616309 scopus 로고
    • Network externalities, competition, and compatibility
    • Katz, M. L., and Shapiro, C. 1985. "Network Externalities, Competition, and Compatibility," American Economic Review (75:3), pp. 424-440.
    • (1985) American Economic Review , vol.75 , Issue.3 , pp. 424-440
    • Katz, M.L.1    Shapiro, C.2
  • 18
    • 84936407456 scopus 로고
    • Technology adoption in the presence of network externalities
    • Katz, M. L., and Shapiro, C. 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy (94:4), pp. 822-841.
    • (1986) Journal of Political Economy , vol.94 , Issue.4 , pp. 822-841
    • Katz, M.L.1    Shapiro, C.2
  • 19
    • 0002981164 scopus 로고
    • Systems competition and network effects
    • Katz, M. L., and Shapiro, C. 1994. "Systems Competition and Network Effects," Journal of Economic Perspectives (8:2), pp. 93-115.
    • (1994) Journal of Economic Perspectives , vol.8 , Issue.2 , pp. 93-115
    • Katz, M.L.1    Shapiro, C.2
  • 21
    • 0041755428 scopus 로고
    • New York: John Wiley and Sons
    • Kleinrock, L. 1975. Queuing Theory (Volume 1), New York: John Wiley and Sons.
    • (1975) Queuing Theory , vol.1
    • Kleinrock, L.1
  • 23
    • 35548965096 scopus 로고    scopus 로고
    • An examination of private intermediaries' roles in software vulnerabilities disclosure
    • DOI 10.1007/s10796-007-9047-2
    • Li, P., and Rao, H. R. 2007. "An Examination of Private Intermediaries' Roles in Software Vulnerabilities Disclosure," Information Systems Frontiers (9:5), pp. 531-539. (Pubitemid 350007347)
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 531-539
    • Li, P.1    Rao, H.R.2
  • 24
    • 0025400024 scopus 로고
    • Modeling of correlated failures and community error recovery in multiversion software
    • DOI 10.1109/32.48942
    • Nicola, V. F., and Goyal, A. 1990. "Modeling of Correlated Failures and Community Error Recovery in Multiversion Software," IEEE Transactions on Software Engineering (16:3), pp. 350-359. (Pubitemid 20678681)
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.3 , pp. 350-359
    • Nicola Victor, F.1    Goyal Ambuj2
  • 25
    • 80455162753 scopus 로고    scopus 로고
    • Cyber insurance and IT security investment: Impact of independent risk
    • Harvard University, Cambridge, MA (available online)
    • Ogut, H., Menon, N., and Ragunathan, S. 2005. "Cyber Insurance and IT Security Investment: Impact of Independent Risk," in Proceedings of the Workshop on the Economics of Information Security (WEIS), Harvard University, Cambridge, MA (available online, http://infosecon.net/workshop/pdf/56.pdf)
    • (2005) Proceedings of the Workshop on the Economics of Information Security (WEIS)
    • Ogut, H.1    Menon, N.2    Ragunathan, S.3
  • 26
    • 33947496984 scopus 로고    scopus 로고
    • Short Term and Total Life Impact analysis of email worms in computer systems
    • DOI 10.1016/j.dss.2006.12.014, PII S0167923607000036, Integrated Decision Support
    • Park, I., Sharman, R., Rao, H. R., and Upadhyaya, S. 2007. "Short Term and Total Life Impact Analysis of Email Worms in Computer Systems," Decision Support Systems (43), pp. 827-841. (Pubitemid 46466992)
    • (2007) Decision Support Systems , vol.43 , Issue.3 , pp. 827-841
    • Park, I.1    Sharman, R.2    Rao, H.R.3    Upadhyaya, S.4
  • 27
    • 12344299716 scopus 로고    scopus 로고
    • unpublished paper, University of California, Berkeley (available online)
    • Patterson, D. 2002. "A Simple Way to Estimate the Cost of Downtime," unpublished paper, University of California, Berkeley (available online, http://roc.cs.berkeley.edu/projects/downtime).
    • (2002) A Simple Way to Estimate the Cost of Downtime
    • Patterson, D.1
  • 29
    • 49649157588 scopus 로고
    • Increasing risk: II. Its economics consequences
    • Rothschild, M., and Stiglitz, J. 1971. "Increasing Risk: II. Its Economics Consequences," Journal of Economic Theory (3), pp. 66-84.
    • (1971) Journal of Economic Theory , vol.3 , pp. 66-84
    • Rothschild, M.1    Stiglitz, J.2
  • 32
    • 0024942312 scopus 로고
    • Delay analysis of a single server queue with Poisson cluster arrival process arising in ATM networks
    • Sohraby, K. 1989. "Delay Analysis of a Single Server Queue with Poisson Cluster Arrival Process Arising in ATM Networks," in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), November 27-30, pp. 611-616. (Pubitemid 20702437)
    • (1989) IEEE Global Telecommunications Conference and Exhibition , vol.1 , pp. 611-616
    • Sohraby Khosrow1
  • 33
    • 85106078759 scopus 로고    scopus 로고
    • Framing of information security policies and practices
    • D. Straub, S. Goodman and R. Baskerville (eds.), Armonk, NY: M. E. Sharpe
    • Straub, D., Goodman, S., and Baskerville, R. 2008. "Framing of Information Security Policies and Practices," in Information Security Policies, Processes, and Practices, D. Straub, S. Goodman and R. Baskerville (eds.), Armonk, NY: M. E. Sharpe, pp. 5-12.
    • (2008) Information Security Policies, Processes, and Practices , pp. 5-12
    • Straub, D.1    Goodman, S.2    Baskerville, R.3
  • 34
    • 80051757742 scopus 로고    scopus 로고
    • Symantec internet security threat report volume IX
    • Symantec Corporation, 20330 Stevens Creek Road, Cupertino CA, 2006
    • Symantec Corporation. 2006. "Symantec Internet Security Threat Report, Volume IX," The Symantec Corporation, 20330 Stevens Creek Road, Cupertino CA, 2006.
    • (2006) The Symantec Corporation


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.