메뉴 건너뛰기




Volumn 141, Issue 1, 2013, Pages 255-268

Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints

Author keywords

Budget allocation; Cost benefit analysis; Information security; Investment analysis; Scale free network

Indexed keywords

ANALYTIC MODELS; BREACH PROBABILITY; BUDGET ALLOCATION; BUDGET CONSTRAINT; ECONOMICS OF INFORMATION; FIXED BUDGET; INFORMATION SECURITY INVESTMENT; INVESTMENT ANALYSIS; POTENTIAL LOSS; SCALE FREE NETWORKS; SECURITY ATTACKS; SECURITY BREACHES; SECURITY BUDGET; SECURITY INVESTMENTS;

EID: 84869508852     PISSN: 09255273     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijpe.2012.06.022     Document Type: Article
Times cited : (73)

References (50)
  • 1
    • 0033539175 scopus 로고    scopus 로고
    • Diameter of the world-wide web
    • R. Albert, H. Jeong, and A.L. Barabási Diameter of the world-wide web Nature 401 1999 130 131
    • (1999) Nature , vol.401 , pp. 130-131
    • Albert, R.1    Jeong, H.2    Barabási, A.L.3
  • 2
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • R. Albert, H. Jeong, and A.L. Barabási Error and attack tolerance of complex networks Nature 406 2000 378 382
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabási, A.L.3
  • 4
    • 33748597348 scopus 로고    scopus 로고
    • A general, but readily adaptable model of information system risk
    • S. Alter, and S. Sherer A general, but readily adaptable model of information system risk Communications of the AIS 14 1 2004 1 28
    • (2004) Communications of the AIS , vol.14 , Issue.1 , pp. 1-28
    • Alter, S.1    Sherer, S.2
  • 5
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • R. Anderson, and T. Moore The economics of information security Science 314 2006 610 613
    • (2006) Science , vol.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 7
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • A.L. Barabási, and R. Albert Emergence of scaling in random networks Science 286 1999 509 512
    • (1999) Science , vol.286 , pp. 509-512
    • Barabási, A.L.1    Albert, R.2
  • 8
    • 84869494686 scopus 로고    scopus 로고
    • Process-Centric Risk Management Framework for Information Security
    • H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, D. Zeng, Elsevier The Netherlands
    • R.S. Behara, and S. Bhattacharya Process-Centric Risk Management Framework for Information Security H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, D. Zeng, National Security 349-366 2007 Elsevier The Netherlands
    • (2007) National Security , vol.349-366
    • Behara, R.S.1    Bhattacharya, S.2
  • 9
    • 33748605277 scopus 로고    scopus 로고
    • Computer security: An end state?
    • S. Bellovin Computer security: an end state? Communications of ACM 44 3 2001 131 132
    • (2001) Communications of ACM , vol.44 , Issue.3 , pp. 131-132
    • Bellovin, S.1
  • 10
  • 11
    • 0037387448 scopus 로고    scopus 로고
    • Determining Intent - Opportunistic vs. Targeted Attacks
    • E. Casey Determining Intent - Opportunistic vs. Targeted Attacks Computer Fraud & Security 4 2003 8 11
    • (2003) Computer Fraud & Security , vol.4 , pp. 8-11
    • Casey, E.1
  • 12
    • 34548502174 scopus 로고    scopus 로고
    • Configuration of intrusion detection systems: A comparison of decision and game theoretic approaches
    • H. Cavusoglu, and S. Raghunathan Configuration of intrusion detection systems: a comparison of decision and game theoretic approaches INFORMS Journal of Decision Analysis 1 3 2004 131 148
    • (2004) INFORMS Journal of Decision Analysis , vol.1 , Issue.3 , pp. 131-148
    • Cavusoglu, H.1    Raghunathan, S.2
  • 14
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • H. Cavusoglu, B. Mishra, and S. Raghunathan The value of intrusion detection systems in information technology security architecture Information Systems Research 16 1 2005 28 46
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 15
    • 19944417270 scopus 로고    scopus 로고
    • Infection dynamics on the internet
    • D.B. Chang, and C.S. Young Infection dynamics on the internet Computer Security 24 2005 280 286
    • (2005) Computer Security , vol.24 , pp. 280-286
    • Chang, D.B.1    Young, C.S.2
  • 17
    • 84909999858 scopus 로고    scopus 로고
    • Understanding and influencing attackers' decisions: Implications for security investment strategies
    • Cambridge, England
    • Cremonini, D.; Nizovtsev, M.; 2006. Understanding and influencing attackers' decisions: implications for security investment strategies. In: Fifth Workshop on Economics of Information Security, Cambridge, England.
    • (2006) Fifth Workshop on Economics of Information Security
    • Cremonini, D.1    Nizovtsev, M.2
  • 21
    • 49249136823 scopus 로고    scopus 로고
    • Can business process reengineering lead to security vulnerability: Analyzing the reengineered process
    • S. Goel, and V. Chen Can business process reengineering lead to security vulnerability: analyzing the reengineered process International Journal of Production Economics 115 1 2008 104 112
    • (2008) International Journal of Production Economics , vol.115 , Issue.1 , pp. 104-112
    • Goel, S.1    Chen, V.2
  • 25
    • 33846138611 scopus 로고    scopus 로고
    • Returns to information security investment: The effect of alternative information security breach functions on optima investment and sensitivity to vulnerability
    • K. Hauske Returns to information security investment: the effect of alternative information security breach functions on optima investment and sensitivity to vulnerability Information Systems Frontier 8 2006 338 349
    • (2006) Information Systems Frontier , vol.8 , pp. 338-349
    • Hauske, K.1
  • 26
    • 70350731196 scopus 로고    scopus 로고
    • Preemptive learning, competency traps, and information technology adoption: A real options analysis
    • X. Li Preemptive learning, competency traps, and information technology adoption: a real options analysis IEEE Transactions on Engineering Management 56 4 2009 650 662
    • (2009) IEEE Transactions on Engineering Management , vol.56 , Issue.4 , pp. 650-662
    • Li, X.1
  • 27
    • 46849085979 scopus 로고    scopus 로고
    • An economic analysis of the optimal information security investment in the case of a risk-averse firm
    • C.D. Huang, R.S. Behara, and Q. Hu An economic analysis of the optimal information security investment in the case of a risk-averse firm International Journal of Production Economics 114 2 2008 793 804
    • (2008) International Journal of Production Economics , vol.114 , Issue.2 , pp. 793-804
    • Huang, C.D.1    Behara, R.S.2    Hu, Q.3
  • 28
    • 49249117338 scopus 로고    scopus 로고
    • Managing risk propagation in extended enterprise networks
    • C.D. Huang, R.S. Behara, and Q. Hu Managing risk propagation in extended enterprise networks IEEE IT Professional 10 4 2008 14 19
    • (2008) IEEE IT Professional , vol.10 , Issue.4 , pp. 14-19
    • Huang, C.D.1    Behara, R.S.2    Hu, Q.3
  • 29
    • 84869507743 scopus 로고    scopus 로고
    • The State of information security spending
    • K. Karr The State of information security spending Forrester Research 4 2006
    • (2006) Forrester Research , vol.4
    • Karr, K.1
  • 30
    • 13844275988 scopus 로고    scopus 로고
    • Technology competition and optimal investment timing: A real options perspective
    • Kaufman, R.; Li, X.; 2005. Technology competition and optimal investment timing: a real options perspective. IEEE Transaction on Engineering Management 52 (1), 15-29.
    • (2005) IEEE Transaction on Engineering Management , vol.52 , Issue.1 , pp. 15-29
    • Kaufman, R.1    Li, X.2
  • 33
    • 66549103101 scopus 로고    scopus 로고
    • Understanding the value of countermeasure portfolios in information systems security
    • R.L. Kumar, S. Park, and C. Subramaniam Understanding the value of countermeasure portfolios in information systems security Journal of Management Information Systems 25 2 2008 241 279
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 241-279
    • Kumar, R.L.1    Park, S.2    Subramaniam, C.3
  • 35
    • 4243150787 scopus 로고    scopus 로고
    • Analyzing security costs
    • R.T. Mercuri Analyzing security costs Communications of ACM 46 6 2003 15 18
    • (2003) Communications of ACM , vol.46 , Issue.6 , pp. 15-18
    • Mercuri, R.T.1
  • 40
    • 84869494682 scopus 로고    scopus 로고
    • What's really happening in IT security?
    • J. Poff What's really happening in IT security? InterBusiness Issues 2009
    • (2009) InterBusiness Issues
    • Poff, J.1
  • 43
    • 14744281156 scopus 로고    scopus 로고
    • Towards econometric models of the security risk from remote attacks
    • S.E. Schechter Towards econometric models of the security risk from remote attacks IEEE Security & Privacy 3 1 2005 40 44
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 40-44
    • Schechter, S.E.1
  • 49
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of small-world
    • D.J. Watts, and S.H. Strogatz Collective dynamics of small-world Networks, Nature 393 1998 440 442
    • (1998) Networks, Nature , vol.393 , pp. 440-442
    • Watts, D.J.1    Strogatz, S.H.2
  • 50
    • 33751017682 scopus 로고    scopus 로고
    • Behavior of susceptible-infected epidemics on scale-free networks with identical infectivity
    • T. Zhou, J.G. Liu, W.J. Bai, G. Chen, and B.H. Wang Behavior of susceptible-infected epidemics on scale-free networks with identical infectivity Physical Reviews E 74 5 2006 0561091
    • (2006) Physical Reviews e , vol.74 , Issue.5 , pp. 0561091
    • Zhou, T.1    Liu, J.G.2    Bai, W.J.3    Chen, G.4    Wang, B.H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.