메뉴 건너뛰기




Volumn 5, Issue 4, 2002, Pages 438-457

The Economics of Information Security Investment

Author keywords

Economics; Optimal security investment; Security

Indexed keywords


EID: 84990029315     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/581271.581274     Document Type: Article
Times cited : (948)

References (35)
  • 3
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • 3 (Aug.
    • Axelsson, S., 2000. The base-rate fallacy and the difficulty of intrusion detection.ACM Trans. Inf. Syst. Sec. 3, 3 (Aug.), 186-205.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , pp. 186-205
    • Axelsson, S.1
  • 4
    • 0032632088 scopus 로고    scopus 로고
    • Computer security-What should you spend your money on
    • Buzzard, K., 1999. Computer security-What should you spend your money on.Comput. Sec. 18 4, 322-334.
    • (1999) Comput. Sec. , vol.18 , Issue.4 , pp. 322-334
    • Buzzard, K.1
  • 5
    • 0006025721 scopus 로고    scopus 로고
    • Identification of host audit data to detect attacks on low-level IP
    • Daniels, T. E., Spafford, E. H., 1999. Identification of host audit data to detect attacks on low-level IP.J. Comput. Sec. 7, 1, 3-35.
    • (1999) J. Comput. Sec. , vol.7 , Issue.1 , pp. 3-35
    • Daniels, T.E.1    Spafford, E.H.2
  • 6
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • 2 (Feb.
    • Denning, D., 1987. An intrusion-detection model.IEEE Trans. Softw. Eng. 13, 2 (Feb.), 222-226.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , pp. 222-226
    • Denning, D.1
  • 7
    • 0030107190 scopus 로고    scopus 로고
    • A taxonomy of key escrow encryption systems
    • 3 (Mar.
    • Denning, D., Branstad, D., 1996. A taxonomy of key escrow encryption systems.Commun. ACM. 39, 3 (Mar.), 34-40.
    • (1996) Commun. ACM. , vol.39 , pp. 34-40
    • Denning, D.1    Branstad, D.2
  • 8
    • 0031631068 scopus 로고    scopus 로고
    • A conceptual framework for information security management
    • Finne, T., 1998. A conceptual framework for information security management.Comput. Sec. 17 4, 303-307.
    • (1998) Comput. Sec. , vol.17 , Issue.4 , pp. 303-307
    • Finne, T.1
  • 9
    • 0007724451 scopus 로고    scopus 로고
    • Balancing cooperation and risk in intrusion detection
    • 1 (Feb.
    • Frincke, D., 2000. Balancing cooperation and risk in intrusion detection.ACM Trans. Inf. Syst. Sec. 3, 1 (Feb.), 1-29.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , pp. 1-29
    • Frincke, D.1
  • 10
    • 0038223766 scopus 로고    scopus 로고
    • A framework for using information security as a response to competitor analysis systems
    • 9 (Sept.
    • Gordon, L., Loeb, M., 2001. A framework for using information security as a response to competitor analysis systems.Commun. ACM, 44, 9 (Sept.), 70-75.
    • (2001) Commun. ACM , vol.44 , pp. 70-75
    • Gordon, L.1    Loeb, M.2
  • 11
    • 0030193003 scopus 로고    scopus 로고
    • Information systems planning: A model and empirical tests
    • 7 (July
    • Hann, J., Weber, R., 1996. Information systems planning: A model and empirical tests.Manage. Sci. 42, 7 (July), 1043-1064.
    • (1996) Manage. Sci. , vol.42 , pp. 1043-1064
    • Hann, J.1    Weber, R.2
  • 12
    • 32644456297 scopus 로고    scopus 로고
    • How much is enough? A risk-management approach to computer security
    • Stanford University, Stanford, Calif., June
    • Hoo, K., 2000. How much is enough? A risk-management approach to computer security.Consortium for Research on Information Security Policy (CRISP) Working Paper. Stanford University, Stanford, Calif., June.
    • (2000) Consortium for Research on Information Security Policy (CRISP) Working Paper
    • Hoo, K.1
  • 14
    • 0031372393 scopus 로고    scopus 로고
    • Penetration testing and system audit
    • Jones, A., 1997. Penetration testing and system audit.Comput. Sec. 16, 595-602.
    • (1997) Comput. Sec. , vol.16 , pp. 595-602
    • Jones, A.1
  • 16
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K. D., Carr, H. H., Warkentin, M. E., 1992. Threats to information systems: Today's reality, yesterday's understanding.MIS Quart. 17, 2, 173-186.
    • (1992) MIS Quart. , vol.17 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 17
    • 0043032726 scopus 로고
    • Risk management and insurances
    • Helsinki, Finland
    • Luotonen, O., 1993. Risk management and insurances.Painatuskeskus Oy. Helsinki, Finland.
    • (1993) Painatuskeskus Oy.
    • Luotonen, O.1
  • 18
    • 2442572685 scopus 로고    scopus 로고
    • Information security of internet commerce
    • L. McKnight and J. Bailey, Eds., MIT Press, Cambridge, Mass.
    • Mcknight, L., Solomon, R., Reagle, J., Carver, D., Johnson, C., Gerovac, B., Gingold, D., 1997. Information security of internet commerce. In Internet Economics, L. McKnight and J. Bailey, Eds., MIT Press, Cambridge, Mass., pp. 435-452.
    • (1997) Internet Economics , pp. 435-452
    • Mcknight, L.1    Solomon, R.2    Reagle, J.3    Carver, D.4    Johnson, C.5    Gerovac, B.6    Gingold, D.7
  • 19
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service in networks
    • Meadows, C., 2001. A cost-based framework for analysis of denial of service in networks J. Comput. Sec. 9, 1-2, 143-164.
    • (2001) J. Comput. Sec. , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 20
    • 0026850008 scopus 로고
    • A resource allocation model for denial of service
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • Millen, J., 1992. A resource allocation model for denial of service. In Proceedings of the 1992 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., pp. 137-147.
    • (1992) Proceedings of the 1992 IEEE Symposium on Security and Privacy. , pp. 137-147
    • Millen, J.1
  • 21
    • 0000610330 scopus 로고
    • Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
    • 9 (Sept.
    • Muralidhar, K., Batra, D., Kirs, P., 1995. Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach.Manage. Sci. 41, 9 (Sept.), 1549-1564.
    • (1995) Manage. Sci. , vol.41 , pp. 1549-1564
    • Muralidhar, K.1    Batra, D.2    Kirs, P.3
  • 23
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • 2 (May
    • Osborn, S., Sandhu, R., Munawer, Q., 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies.ACM Trans. Inf. Syst. Sec. 3, 2 (May), 85-106.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 25
    • 0004198635 scopus 로고    scopus 로고
    • 2nd ed.), Prentice-Hall, Englewood Cliffs, N.J.
    • Pfleeger, C., 1997.Security in Computing (2nd ed.), Prentice-Hall, Englewood Cliffs, N.J.
    • (1997) Security in Computing
    • Pfleeger, C.1
  • 26
    • 0035265977 scopus 로고    scopus 로고
    • 2001CSI/FBI computer crime and security survey
    • 2 (Spring
    • Power, R., 2001. 2001CSI/FBI computer crime and security survey.Comput. Sec. J. 17 2 (Spring), 29-51.
    • (2001) Comput. Sec. J. , vol.17 , pp. 29-51
    • Power, R.1
  • 27
    • 0001549660 scopus 로고    scopus 로고
    • The ARBAC97 model for role-based administration of roles
    • 2 (Feb.
    • Sandhu, R. S., Bhamidipati, V., Munawer, Q., 1999. The ARBAC97 model for role-based administration of roles.ACM Trans. Inf. Syst. Sec. 1, 2 (Feb.), 105-135.
    • (1999) ACM Trans. Inf. Syst. Sec. , vol.1 , pp. 105-135
    • Sandhu, R.S.1    Bhamidipati, V.2    Munawer, Q.3
  • 30
    • 0028532997 scopus 로고
    • Cryptanalysis and protocol failures
    • 11 (Nov.
    • Simmons, G., 1994. Cryptanalysis and protocol failures.Commun. ACM. 37, 11 (Nov.), 56-64.
    • (1994) Commun. ACM. , vol.37 , pp. 56-64
    • Simmons, G.1
  • 31
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. W., 1990. Effective IS security: An empirical study.Inf. Syst. Res. 1, 3, 255-276.
    • (1990) Inf. Syst. Res. , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 32
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., Welke, R. J., 1998. Coping with systems risk: Security planning models for management decision making.MIS Quart. 23, 4, 441-469.
    • (1998) MIS Quart. , vol.23 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 33
    • 0142032256 scopus 로고    scopus 로고
    • How to build an economic model in your spare time. Part of a collection titled
    • ed. Michael Szenberg, University of Michigan Press
    • Varian, H. R., 1997. How to build an economic model in your spare time. Part of a collection titled Passion and Craft: Economists at Work, ed. Michael Szenberg, University of Michigan Press.
    • (1997) Passion and Craft: Economists at Work
    • Varian, H.R.1
  • 34
    • 0002067431 scopus 로고    scopus 로고
    • Net STAT: a network-based intrusion detection system
    • Vigna, G., Kemmeerer, R. A., 1999. Net STAT: a network-based intrusion detection system. J. Comput. Sec. 7, 1, 37-71.
    • (1999) J. Comput. Sec. , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmeerer, R.A.2
  • 35
    • 0022606523 scopus 로고
    • A secure capability computer system
    • IEEE Computer Society Press, Los Alamitos, Calif
    • Wiseman, S., 1986. A secure capability computer system. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif, pp. 86-94.
    • (1986) Proceedings of the IEEE Symposium on Security and Privacy. , pp. 86-94
    • Wiseman, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.