메뉴 건너뛰기




Volumn 16, Issue 2, 2014, Pages 329-336

Returns to information security investment: Endogenizing the expected loss

Author keywords

Information production; Information protection; Returns assumptions; Security investment

Indexed keywords

MULTI AGENT SYSTEMS; SECURITY OF DATA;

EID: 84899950097     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-012-9390-9     Document Type: Article
Times cited : (20)

References (4)
  • 1
    • 84899948909 scopus 로고    scopus 로고
    • Internal Auditor, The Institute of Internal Auditors Inc, Florida
    • Cefaratti, M.A., Lin, H., Wallace, L. (2011). The Information Security Control Environment, Internal Auditor, The Institute of Internal Auditors Inc, Florida, http://www.theiia.org/intAuditor/feature-articles/2011/April/the- information-security-control-environment/.
    • (2011) The Information Security Control Environment
    • Cefaratti, M.A.1    Lin, H.2    Wallace, L.3
  • 3
    • 22544461899 scopus 로고    scopus 로고
    • Production and conflict models versus rent seeking models
    • 10.1007/s11127-005-1717-3
    • Hausken, K. (2005). Production and conflict models versus rent seeking models. Public Choice, 123(1), 59-93.
    • (2005) Public Choice , vol.123 , Issue.1 , pp. 59-93
    • Hausken, K.1
  • 4
    • 33846138611 scopus 로고    scopus 로고
    • Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    • 10.1007/s10796-006-9011-6
    • Hausken, K. (2006). Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338-349.
    • (2006) Information Systems Frontiers , vol.8 , Issue.5 , pp. 338-349
    • Hausken, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.