메뉴 건너뛰기




Volumn , Issue , 2013, Pages 22-34

Methods on determining the investment in IT security

Author keywords

[No Author keywords available]

Indexed keywords

EARNINGS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84957026225     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-4856-2.ch002     Document Type: Chapter
Times cited : (1)

References (22)
  • 3
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys. doi:10.1145/162124.162127.
    • (1993) ACM Computing Surveys
    • Baskerville, R.1
  • 5
    • 42149112876 scopus 로고    scopus 로고
    • Information security and risk management
    • Bodin, L., Gordon, L. A., & Loeb, M. P. (2008). Information security and risk management. Communications of the ACM, 51(4), 64-68. doi:10.1145/1330311.1330325.
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 64-68
    • Bodin, L.1    Gordon, L.A.2    Loeb, M.P.3
  • 9
    • 33745210521 scopus 로고    scopus 로고
    • Budgeting process for information security expenditures: Empirical evidence
    • Gordon, L. A., & Loeb, M. P. (2006). Budgeting process for information security expenditures: Empirical evidence. Communications of the ACM, 49(1), 121-125. doi:10.1145/1107458.1107465.
    • (2006) Communications of the ACM , vol.49 , Issue.1 , pp. 121-125
    • Gordon, L.A.1    Loeb, M.P.2
  • 10
    • 23344450027 scopus 로고    scopus 로고
    • The relevant internal rate of return
    • Hartman, J. C., & Schafrick, I. C. (2004). The relevant internal rate of return. The Engineering Economist, 49(2), 139-158. doi:10.1080/00137910490453419.
    • (2004) The Engineering Economist , vol.49 , Issue.2 , pp. 139-158
    • Hartman, J.C.1    Schafrick, I.C.2
  • 12
    • 0026494564 scopus 로고
    • The balanced scorecard-measures that drive performance
    • January-February
    • Kaplan, R.S., & Norton, D.P. (1992, January-February). The balanced scorecard-measures that drive performance. HBR onPoint.
    • (1992) HBR onPoint
    • Kaplan, R.S.1    Norton, D.P.2
  • 13
    • 0000142161 scopus 로고
    • Putting the balanced scorecard to work
    • September-October
    • Kaplan, R. S., & Norton, D. P. (1993, September-October). Putting the balanced scorecard to work. Harvard Business Review.
    • (1993) Harvard Business Review
    • Kaplan, R.S.1    Norton, D.P.2
  • 15
    • 84871903931 scopus 로고    scopus 로고
    • Cost of data breaches declines
    • Retrieved from
    • Olavsrud, T. (2012). Cost of data breaches declines. CIO. Retrieved from http://www.cio.com/article/702494/Cost_of_Data_Breaches_Declines?page=2&taxonomyId=3154.
    • (2012) CIO.
    • Olavsrud, T.1
  • 18
    • 21844499608 scopus 로고
    • Uses, abuses, and alternatives to the net-present-value rule
    • Ross, S. (1995). Uses, abuses, and alternatives to the net-present-value rule. Financial Management, 24(3), 96-102. doi:10.2307/3665561.
    • (1995) Financial Management , vol.24 , Issue.3 , pp. 96-102
    • Ross, S.1
  • 22
    • 77957654255 scopus 로고    scopus 로고
    • Information security investment decisions: Evaluating the balanced scorecard method
    • Tallau, L. J., Gupta, M., & Sharman, R. (2010). Information security investment decisions: Evaluating the balanced scorecard method. Int. J. Business Information Systems, 5(1), 34-57. doi:10.1504/IJBIS.2010.029479.
    • (2010) Int. J. Business Information Systems , vol.5 , Issue.1 , pp. 34-57
    • Tallau, L.J.1    Gupta, M.2    Sharman, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.