-
3
-
-
34848920878
-
Necessary measures: Metric-driven information security risk assessment and decision making
-
W.H. Baker, L.P. Rees, and P. Tippett Necessary measures: metric-driven information security risk assessment and decision making Communications of the ACM 50 10 2007 101 106
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 101-106
-
-
Baker, W.H.1
Rees, L.P.2
Tippett, P.3
-
4
-
-
33748975143
-
A mixed integer linear programming formulation of the optimal mean/value-at-risk portfolio problem
-
S. Benati, and R. Rizzi A mixed integer linear programming formulation of the optimal mean/value-at-risk portfolio problem European Journal of Operational Research 176 2007 423 434
-
(2007)
European Journal of Operational Research
, vol.176
, pp. 423-434
-
-
Benati, S.1
Rizzi, R.2
-
5
-
-
34848836808
-
The state of information security
-
S. Berinato The state of information security CIO Magazine 17 2 2003 1 3
-
(2003)
CIO Magazine
, vol.17
, Issue.2
, pp. 1-3
-
-
Berinato, S.1
-
6
-
-
35248812867
-
Using cp-nets as a guide for countermeasure selection
-
S. Bistarelli, F. Fioravanti, and P. Peretti Using cp-nets as a guide for countermeasure selection Proceedings of the 2007 ACM Symposium on Applied Computing, Seoul, Korea 2007 300 304
-
(2007)
Proceedings of the 2007 ACM Symposium on Applied Computing, Seoul, Korea
, pp. 300-304
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
9
-
-
79151486474
-
Enterprise risk and security management: Data, text and web mining
-
H. Chen, M. Chau, and S. Li Enterprise risk and security management: data, text and web mining Decision Support Systems 50 2011 649 650
-
(2011)
Decision Support Systems
, vol.50
, pp. 649-650
-
-
Chen, H.1
Chau, M.2
Li, S.3
-
10
-
-
71249129470
-
Managing supply chain risk and disruption from IT security incidents
-
J.K. Deane, C.T. Ragsdale, T.R. Rakes, and L.P. Rees Managing supply chain risk and disruption from IT security incidents Operations Management Research 2 1 2009 4 12
-
(2009)
Operations Management Research
, vol.2
, Issue.1
, pp. 4-12
-
-
Deane, J.K.1
Ragsdale, C.T.2
Rakes, T.R.3
Rees, L.P.4
-
13
-
-
32544451794
-
Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
-
M. Gupta, J. Rees, A. Chaturvedi, and J. Chi Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach Decision Support Systems 41 2006 592 603
-
(2006)
Decision Support Systems
, vol.41
, pp. 592-603
-
-
Gupta, M.1
Rees, J.2
Chaturvedi, A.3
Chi, J.4
-
14
-
-
49049088363
-
Risk management of contract portfolios in IT services: The profit-at-risk approach
-
R.J. Kauffman, and R. Sougstad Risk management of contract portfolios in IT services: the profit-at-risk approach Journal of Management Information Systems 25 1 2008 17 48
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.1
, pp. 17-48
-
-
Kauffman, R.J.1
Sougstad, R.2
-
16
-
-
80052945590
-
Profit-maximizing firm investments in customer information security
-
Y.J. Lee, R.J. Kauffman, and R. Sougstad Profit-maximizing firm investments in customer information security Decision Support Systems 51 2011 904 920
-
(2011)
Decision Support Systems
, vol.51
, pp. 904-920
-
-
Lee, Y.J.1
Kauffman, R.J.2
Sougstad, R.3
-
19
-
-
1842423764
-
Price-at-risk: A methodology for pricing utility computing services
-
G.A. Paleologo Price-at-risk: a methodology for pricing utility computing services IBM Systems Journal 43 1 2004 20 31
-
(2004)
IBM Systems Journal
, vol.43
, Issue.1
, pp. 20-31
-
-
Paleologo, G.A.1
-
22
-
-
0002062038
-
Optimization of conditional value-at-risk
-
R.T. Rockafellar, and S. Uryasev Optimization of conditional value-at-risk The Journal of Risk 2 3 2000 21 41
-
(2000)
The Journal of Risk
, vol.2
, Issue.3
, pp. 21-41
-
-
Rockafellar, R.T.1
Uryasev, S.2
-
23
-
-
0036076694
-
Conditional value-at-risk for general loss distributions
-
R.T. Rockafellar, and S. Uryasev Conditional value-at-risk for general loss distributions Journal of Banking and Finance 26 7 2002 1443 1471
-
(2002)
Journal of Banking and Finance
, vol.26
, Issue.7
, pp. 1443-1471
-
-
Rockafellar, R.T.1
Uryasev, S.2
-
24
-
-
80051794133
-
Quantifying information security risks using expert judgment elicitation
-
J.J.C.H. Ryan, T.A. Mazzuchi, D.J. Ryan, J.L. de la Cruz, and R. Cooke Quantifying information security risks using expert judgment elicitation Computers and Operations Research 39 2012 774 784
-
(2012)
Computers and Operations Research
, vol.39
, pp. 774-784
-
-
Ryan, J.J.C.H.1
Mazzuchi, T.A.2
Ryan, D.J.3
De La Cruz, J.L.4
Cooke, R.5
-
26
-
-
84871005318
-
Lexicographic and weighting approach to multi-criteria portfolio optimization by mixed integer programming
-
chapter in: K.D. Lawrence, G. Kleinman, Emerald Bingley UK
-
B. Sawik Lexicographic and weighting approach to multi-criteria portfolio optimization by mixed integer programming chapter in: K.D. Lawrence, G. Kleinman, Applications of Management Science: Financial Modeling Applications and Data Envelopment Applications vol.13 2009 Emerald Bingley UK 3 18
-
(2009)
Applications of Management Science: Financial Modeling Applications and Data Envelopment Applications
, vol.13 VOL.
, pp. 3-18
-
-
Sawik, B.1
-
28
-
-
84871029462
-
Bi-criteria portfolio optimization models with percentile and symmetric risk measures by mathematical programming
-
B. Sawik Bi-criteria portfolio optimization models with percentile and symmetric risk measures by mathematical programming Przeglad Elektrotechniczny 88 10B 2012 176 180
-
(2012)
Przeglad Elektrotechniczny
, vol.88
, Issue.10 B
, pp. 176-180
-
-
Sawik, B.1
-
29
-
-
84866978908
-
Selection of resilient supply portfolio under disruption risks
-
T. Sawik Selection of resilient supply portfolio under disruption risks Omega: The International Journal of Management Science 41 2 2013 259 269
-
(2013)
Omega: The International Journal of Management Science
, vol.41
, Issue.2
, pp. 259-269
-
-
Sawik, T.1
-
32
-
-
0033731507
-
Conditional value-at-risk: Optimization algorithms and applications
-
S. Uryasev Conditional value-at-risk: optimization algorithms and applications Financial Engineering News 14 2 2000
-
(2000)
Financial Engineering News
, vol.14
, Issue.2
-
-
Uryasev, S.1
-
33
-
-
84862573944
-
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem
-
V. Viduto, C. Maple, W. Huang, and D. Lopez-Perez A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem Decision Support Systems 53 2012 599 610
-
(2012)
Decision Support Systems
, vol.53
, pp. 599-610
-
-
Viduto, V.1
Maple, C.2
Huang, W.3
Lopez-Perez, D.4
-
34
-
-
51149123444
-
An empirical examination of supply chain performance along several dimensions of risk
-
S. Wagner, and C. Bode An empirical examination of supply chain performance along several dimensions of risk Journal of Business Logistics 29 2008 307 326
-
(2008)
Journal of Business Logistics
, vol.29
, pp. 307-326
-
-
Wagner, S.1
Bode, C.2
-
35
-
-
61349180141
-
A value-at-risk approach to information security investment
-
J. Wang, A. Chaudhury, and H.R. Rao A value-at-risk approach to information security investment Information Systems Research 19 1 2008 102 120
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 102-120
-
-
Wang, J.1
Chaudhury, A.2
Rao, H.R.3
|