메뉴 건너뛰기




Volumn 7397 LNCS, Issue , 2012, Pages 129-147

Security audits revisited

Author keywords

[No Author keywords available]

Indexed keywords

GAME-THEORETIC; INDIVIDUAL RISKS; POLICY IMPLICATIONS; SECURITY AUDIT; SECURITY INVESTMENTS;

EID: 84865825422     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32946-3_11     Document Type: Conference Paper
Times cited : (17)

References (29)
  • 6
    • 78650003609 scopus 로고    scopus 로고
    • Security Metrics and Security Investment Models
    • Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. Springer, Heidelberg
    • Böhme, R.: Security Metrics and Security Investment Models. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. LNCS, vol. 6434, pp. 10-24. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6434 , pp. 10-24
    • Böhme, R.1
  • 9
    • 1642413541 scopus 로고    scopus 로고
    • IT doesn't matter
    • Carr, N.G.: IT doesn't matter. Harvard Business Review 81(5), 41-49 (2003)
    • (2003) Harvard Business Review , vol.81 , Issue.5 , pp. 41-49
    • Carr, N.G.1
  • 13
    • 0000071449 scopus 로고
    • From weakest-link to best-shot: The voluntary provision of public goods
    • Hirshleifer, J.: From weakest-link to best-shot: The voluntary provision of public goods. Public Choice 41, 371-386 (1983)
    • (1983) Public Choice , vol.41 , pp. 371-386
    • Hirshleifer, J.1
  • 15
    • 81755188455 scopus 로고    scopus 로고
    • Security Games with Market Insurance
    • Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. Springer, Heidelberg
    • Johnson, B., Böhme, R., Grossklags, J.: Security Games with Market Insurance. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 117-130. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7037 , pp. 117-130
    • Johnson, B.1    Böhme, R.2    Grossklags, J.3
  • 17
    • 78650018495 scopus 로고    scopus 로고
    • An empirical analysis of security investment in countermeasures based on an enterprise survey in Japan
    • University of Cambridge, UK
    • Liu, W., Tanaka, H., Matsuura, K.: An empirical analysis of security investment in countermeasures based on an enterprise survey in Japan. In: Workshop on the Economics of Information Security (WEIS). University of Cambridge, UK (2006)
    • (2006) Workshop on the Economics of Information Security (WEIS)
    • Liu, W.1    Tanaka, H.2    Matsuura, K.3
  • 18
    • 84857150602 scopus 로고    scopus 로고
    • Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud
    • Harvard University, Cambridge
    • Molnar, D., Schechter, S.: Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In: Workshop on the Economics of Information Security (WEIS). Harvard University, Cambridge (2010)
    • (2010) Workshop on the Economics of Information Security (WEIS)
    • Molnar, D.1    Schechter, S.2
  • 20
    • 84865815641 scopus 로고    scopus 로고
    • Incentive mechanisms for internet security
    • Rao, H.R., Upadhyaya, S. (eds.) Emerald
    • Parameswaran, M., Whinston, A.B.: Incentive mechanisms for internet security. In: Rao, H.R., Upadhyaya, S. (eds.) Handbooks in Information Systems, Emerald, vol. 4, pp. 101-138 (2009)
    • (2009) Handbooks in Information Systems , vol.4 , pp. 101-138
    • Parameswaran, M.1    Whinston, A.B.2
  • 22
    • 78650028086 scopus 로고    scopus 로고
    • Will outsourcing IT security lead to a higher social level of security?
    • Carnegie Mellon University, Pittsburgh
    • Rowe, B.R.: Will outsourcing IT security lead to a higher social level of security? In: Workshop on the Economics of Information Security (WEIS). Carnegie Mellon University, Pittsburgh (2007)
    • (2007) Workshop on the Economics of Information Security (WEIS)
    • Rowe, B.R.1
  • 23
    • 33748532138 scopus 로고    scopus 로고
    • Personalization in privacy-aware highly dynamic systems
    • Sackmann, S., Strüker, J., Accorsi, R.: Personalization in privacy-aware highly dynamic systems. Communications of the ACM 49(9), 32-38 (2006)
    • (2006) Communications of the ACM , vol.49 , Issue.9 , pp. 32-38
    • Sackmann, S.1    Strüker, J.2    Accorsi, R.3
  • 29
    • 84870958312 scopus 로고    scopus 로고
    • Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling
    • Zhao, X., Xue, L., Whinston, A.B.: Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling. In: Proceedings of ICIS (2009)
    • Proceedings of ICIS (2009)
    • Zhao, X.1    Xue, L.2    Whinston, A.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.