메뉴 건너뛰기




Volumn 22, Issue 3, 2011, Pages 606-623

When hackers talk: Managing information security under variable attack rates and knowledge dissemination

Author keywords

Hacker learning; Optimal security management; Security shocks; Variable attack rates

Indexed keywords

INDUSTRIAL MANAGEMENT; SECURITY OF DATA;

EID: 84865104895     PISSN: 10477047     EISSN: 15265536     Source Type: Journal    
DOI: 10.1287/isre.1100.0341     Document Type: Article
Times cited : (66)

References (24)
  • 1
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • Arbaugh, W., W. Fithen, J. McHugh. 2000. Windows of vulnerability: A case study analysis. Computer 33(3) 52-59.
    • (2000) Computer , vol.33 , Issue.3 , pp. 52-59
    • Arbaugh, W.1    Fithen, W.2    McHugh, J.3
  • 2
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for software vulnerability disclosure
    • Arora, A., R. Telang, H. Xu. 2008. Optimal policy for software vulnerability disclosure. Management Sci. 54(4) 642-656.
    • (2008) Management Sci , vol.54 , Issue.4 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 3
    • 67649964750 scopus 로고    scopus 로고
    • Maintaining diagnositic knowledge-based systems, a control theoretic approach
    • Bensoussan, A., R. Mookerjee, V. Mookerjee, W. Yue. 2009. Maintaining diagnositic knowledge-based systems, a control theoretic approach. Management Sci. 55(2) 294-310.
    • (2009) Management Sci , vol.55 , Issue.2 , pp. 294-310
    • Bensoussan, A.1    Mookerjee, R.2    Mookerjee, V.3    Yue, W.4
  • 4
  • 5
    • 67649529385 scopus 로고    scopus 로고
    • Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
    • Cavusoglu, H., S. Raghunathan, H. Cavusoglu. 2009. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Inform. Systems Res. 20(2) 198-217.
    • (2009) Inform. Systems Res , vol.20 , Issue.2 , pp. 198-217
    • Cavusoglu, H.1    Raghunathan, S.2    Cavusoglu, H.3
  • 7
    • 33744996371 scopus 로고    scopus 로고
    • Moving beyond compliance. Ernst & Young's 2008 global information security survey
    • Technical report. Ernst & Young
    • Ernst & Young. 2008. Moving beyond compliance. Ernst & Young's 2008 global information security survey. Technical report. Ernst & Young. http://www.ey.com/Global/assets.nsf/ International/TSRS_Global_Information_Security_Survey_2008/ $file/TSRS_Global_Information_Security_Survey_2008.pdf.
    • (2008)
    • Ernst1    Young2
  • 8
    • 52049095294 scopus 로고    scopus 로고
    • Hacking for dollars
    • CNET News
    • Evers, J. 2005. Hacking for dollars. CNET News. http://news .cnet.com/Hacking-for-dollars/2100-7349_3-5772238.html
    • (2005)
    • Evers, J.1
  • 9
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • Gordon, L. A., M. P. Loeb, W. Lucyshyn. 2003. Sharing information on computer systems security: An economic analysis. J. Accounting Public Policy 22 461-485.
    • (2003) J. Accounting Public Policy , vol.22 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 10
    • 34547981657 scopus 로고    scopus 로고
    • Using attack graphs to design systems
    • Gupta, S., J. Winstead. 2007. Using attack graphs to design systems. IEEE Security Privacy 5(4) 80-83.
    • (2007) IEEE Security Privacy , vol.5 , Issue.4 , pp. 80-83
    • Gupta, S.1    Winstead, J.2
  • 11
    • 84876694249 scopus 로고    scopus 로고
    • Imprivata PCI data security standard. Imprivata
    • Imprivata. 2007. PCI data security standard. Imprivata. http:// www.computerworld.com/pdfs/Imprivita_A_Pathway_to _PCI_Compliance.pdf.
    • (2007)
  • 13
    • 0042855099 scopus 로고    scopus 로고
    • A sociology of hackers
    • Jordan, T., P. Taylor. 1998. A sociology of hackers. Sociol. Rev. 46(4) 757-780.
    • (1998) Sociol. Rev , vol.46 , Issue.4 , pp. 757-780
    • Jordan, T.1    Taylor, P.2
  • 14
    • 84940104123 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models. IEEE Sympos. Security and Privacy 01-20
    • Oakland, CA
    • Lee, W., S. Stolfo, K. Mok. 1999. A data mining framework for building intrusion detection models. IEEE Sympos. Security and Privacy 01-20. IEEE Conference Proceedings, Oakland, CA.
    • (1999) IEEE Conference Proceedings
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 18
    • 42449117164 scopus 로고    scopus 로고
    • Guide to intrusion detection and prevention systems (idps)
    • Special Publication 800-30, National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce
    • Scarfone, K., P. Mell. 2007. Guide to intrusion detection and prevention systems (idps). Special Publication 800-30, National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, http:// csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf.
    • (2007)
    • Scarfone, K.1    Mell, P.2
  • 19
    • 33646430608 scopus 로고    scopus 로고
    • Converting website visitors into buyers: How website investment increases consumer trusting beliefs and online purchase intentions
    • Schlosser, A. E., T. B. White, S. M. Lloyd. 2006. Converting website visitors into buyers: How website investment increases consumer trusting beliefs and online purchase intentions. J. Marketing 70 133-148.
    • (2006) J. Marketing , vol.70 , pp. 133-148
    • Schlosser, A.E.1    White, T.B.2    Lloyd, S.M.3
  • 20
    • 85041845600 scopus 로고    scopus 로고
    • Sophos security threat report 2008
    • Sophos Technical report
    • Sophos. 2008. Sophos security threat report 2008. Technical report. http://www.rsaconference.com/uploadedFiles/RSA365/Security_Topics/Hackers_and_Threats/White_Papers/Sophos/sophos-security-report-08.pdf.
    • (2008)
  • 21
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • Ulvila, J., J. Gaffney, Jr. 2004. A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1(1) 35-50.
    • (2004) Decision Anal , vol.1 , Issue.1 , pp. 35-50
    • Ulvila, J.1    Gaffney Jr., J.2
  • 22
    • 84876677542 scopus 로고    scopus 로고
    • United States Government Accountability Office (U.S.Govt.) Personal information: Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown. Technical report
    • United States Government Accountability Office (U.S. Govt.). 2007. Personal information: Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown. Technical report, http://www .gao.gov/new.items/d07737.pdf.
    • (2007)
  • 23
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive response
    • Yue, W., M. Cakanyildirim. 2007. Intrusion prevention in information systems: Reactive and proactive response. J. Management Inform. Systems 24(1) 329-353.
    • (2007) J. Management Inform. Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.1    Cakanyildirim, M.2
  • 24
    • 20344381078 scopus 로고    scopus 로고
    • Black market in stolen credit card data thrives on Internet
    • Zeller, T. 2005. Black market in stolen credit card data thrives on Internet. New York Times. http://www.nytimes.com/2005/06/ 21/technology/21data.html.
    • (2005) New York Times
    • Zeller, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.