메뉴 건너뛰기




Volumn 216, Issue 2, 2012, Pages 434-444

Information security trade-offs and optimal patching policies

Author keywords

Information security; Optimal policy; Risk reduction; Stochastic processes

Indexed keywords

COMMERCE; RANDOM PROCESSES; SECURITY OF DATA; STOCHASTIC MODELS; STOCHASTIC SYSTEMS;

EID: 84857187741     PISSN: 03772217     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ejor.2011.05.050     Document Type: Article
Times cited : (34)

References (34)
  • 3
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Extended version available at
    • R. Anderson, T. Moore, The economics of information security. Science 314 (2006) 610-613. Extended version available at .
    • (2006) Science , vol.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 5
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for software vulnerability disclosure
    • A. Arora, R. Telang, H. Xu, Optimal policy for software vulnerability disclosure, Management Science 54 (4) (2008) 642-656.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 6
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • T. August, T. Tunca, Network software security and user incentives, Management Science 52 (11) (2006) 1703-1720.
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.2
  • 10
    • 77957917091 scopus 로고    scopus 로고
    • Decision support for systems security investment
    • doi:10.1109/NOMSW.2010.5486590, ISBN: 978-1-4244-6037-3 INSPEC Accession Number: 11502735
    • Y. Beres, D. Pym, S. Shiu, Decision support for systems security investment, in: Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP, 2010, pp. 118-125. doi:10.1109/NOMSW.2010.5486590, ISBN: 978-1-4244-6037-3 (INSPEC Accession Number: 11502735).
    • (2010) Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP , pp. 118-125
    • Beres, Y.1    Pym, D.2    Shiu, S.3
  • 12
    • 61849135265 scopus 로고    scopus 로고
    • Security patch management: Share the burden or share the damage
    • H. Cavusoglu, H. Cavusoglu, J. Zhang, Security patch management: Share the burden or share the damage, Management Science 54 (4) (2008) 657-670.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 657-670
    • Cavusoglu, H.1    Cavusoglu, H.2    Zhang, J.3
  • 16
    • 85030498505 scopus 로고    scopus 로고
    • Demos2k. .
  • 19
    • 85030486325 scopus 로고    scopus 로고
    • Gnosis. .
  • 20
    • 0041766623 scopus 로고    scopus 로고
    • Information security expenditures and real options: A wait-and-see approach
    • L. Gordon, M. Loeb, W. Lucyshyn, Information security expenditures and real options: A wait-and-see approach, Computer Security Journal 19 (2) (2003) 1-7.
    • (2003) Computer Security Journal , vol.19 , Issue.2 , pp. 1-7
    • Gordon, L.1    Loeb, M.2    Lucyshyn, W.3
  • 24
    • 0020168283 scopus 로고
    • Sources of bias in assessment procedures for utility functions
    • J. C. Hersey, H. C. Kunreuther, P. J. Shoemaker, Sources of bias in assessment procedures for utility functions, Management Science 28 (1982) 936-953.
    • (1982) Management Science , vol.28 , pp. 936-953
    • Hersey, J.C.1    Kunreuther, H.C.2    Shoemaker, P.J.3
  • 25
    • 70350359511 scopus 로고    scopus 로고
    • Investments and trade-offs in the economics of information security
    • Roger Dingledine, Philippe Golle Eds., Springer, Preprint available at
    • C. Ioannidis, D. Pym, J. Williams, Investments and trade-offs in the economics of information security, in: Roger Dingledine, Philippe Golle (Eds.), Proceedings of Financial Cryptography and Data Security '09, LNCS, vol. 5628, Springer, 2009, pp. 148-166. Preprint available at .
    • (2009) Proceedings of Financial Cryptography and Data Security '09, LNCS , vol.5628 , pp. 148-166
    • Ioannidis, C.1    Pym, D.2    Williams, J.3
  • 26
    • 0024607197 scopus 로고
    • Some experimental findings on decision-making under risk and their implications
    • J. Y. Jaffrey, Some experimental findings on decision-making under risk and their implications, European Journal of Operational Research 38 (1989) 301-306.
    • (1989) European Journal of Operational Research , vol.38 , pp. 301-306
    • Jaffrey, J.Y.1
  • 27
    • 0037911569 scopus 로고    scopus 로고
    • A decision support system for multiattribute utility evaluation based on imprecise assignments
    • A. Jimenéz, S. Ros-Insua, A. Mateos, A decision support system for multiattribute utility evaluation based on imprecise assignments, Decision Support Systems 36 (2003) 65-79.
    • (2003) Decision Support Systems , vol.36 , pp. 65-79
    • Jimenéz, A.1    Ros-Insua, S.2    Mateos, A.3
  • 28
    • 0031123773 scopus 로고    scopus 로고
    • Quantitative model of the security intrusion process based on attacker behaviour
    • E. Jonsson, A. Olovsson, Quantitative model of the security intrusion process based on attacker behaviour, IEEE Transactions on Software Engineering 23 (4) (1997) 235-245.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, A.2
  • 30
    • 0003148796 scopus 로고
    • Lottery equivalents: Reduction of the certainty effect problem in utility assessment
    • M. McCord, R. de Neufville, Lottery equivalents: Reduction of the certainty effect problem in utility assessment, Management Science 32 (1986) 56-61.
    • (1986) Management Science , vol.32 , pp. 56-61
    • McCord, M.1    De Neufville, R.2
  • 31
    • 0042074663 scopus 로고    scopus 로고
    • Optimal discretionary monetary policy in a model of asymmetric bank preferences
    • R. A. Nobay, D. A. Peel, Optimal discretionary monetary policy in a model of asymmetric bank preferences, Economic Journal 113 (489) (2003) 657-665.
    • (2003) Economic Journal , vol.113 , Issue.489 , pp. 657-665
    • Nobay, R.A.1    Peel, D.A.2
  • 32
    • 0034230419 scopus 로고    scopus 로고
    • Market entry, phased rollout or abandonment? A real option approach
    • Enrico Pennings, Onno Lint, Market entry, phased rollout or abandonment? a real option approach, European Journal of Operational Research 124 (1) (2000) 125-138.
    • (2000) European Journal of Operational Research , vol.124 , Issue.1 , pp. 125-138
    • Pennings, E.1    Lint, O.2
  • 33
    • 0031514913 scopus 로고    scopus 로고
    • The Euler scheme for levy driven stochastic differential equations
    • P. Protter, D. Talay, The Euler scheme for levy driven stochastic differential equations, The Annals of Probability 25 (1) (1997) 393-423.
    • (1997) The Annals of Probability , vol.25 , Issue.1 , pp. 393-423
    • Protter, P.1    Talay, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.