메뉴 건너뛰기




Volumn 27, Issue 4, 2016, Pages 897-918

When being hot is not cool: Monitoring hot lists for information security

Author keywords

IT security; Monitoring and profiling; Optimization; Outsourcing

Indexed keywords

COSTS; ECONOMIC AND SOCIAL EFFECTS; OPTIMIZATION; OUTSOURCING; PROBABILITY DENSITY FUNCTION; PROBLEM SOLVING; SECURITY OF DATA;

EID: 85010423780     PISSN: 10477047     EISSN: 15265536     Source Type: Journal    
DOI: 10.1287/isre.2016.0677     Document Type: Article
Times cited : (14)

References (79)
  • 1
    • 79956063140 scopus 로고    scopus 로고
    • Who should be responsible for software security? A comparative analysis of liability policies in network environments
    • August T, Tunca TI (2011) Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Sci. 57(5):934-959
    • (2011) Management Sci , vol.57 , Issue.5 , pp. 934-959
    • August, T.1    Tunca, T.I.2
  • 2
    • 84907576490 scopus 로고    scopus 로고
    • Cloud implications on software network structure and security risks
    • August T, Niculescu MF, Shin H (2014) Cloud implications on software network structure and security risks. Inform. Systems Res. 25(3):499-510
    • (2014) Inform. Systems Res , vol.25 , Issue.3 , pp. 499-510
    • August, T.1    Niculescu, M.F.2    Shin, H.3
  • 3
    • 0003516333 scopus 로고    scopus 로고
    • Technical Report 99-15 Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden
    • Axelsson S (2000) Intrusion detection systems: A taxonomy and survey. Technical Report 99-15 Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden
    • (2000) Intrusion detection systems: A taxonomy and survey
    • Axelsson, S.1
  • 4
    • 85010324776 scopus 로고    scopus 로고
    • False positive responses optimization for intrusion detection system
    • Baayer J, Regragui B, Baayer A (2014) False positive responses optimization for intrusion detection system. J. Inform. Security 5(2):19-36
    • (2014) J. Inform. Security , vol.5 , Issue.2 , pp. 19-36
    • Baayer, J.1    Regragui, B.2    Baayer, A.3
  • 5
    • 84892369906 scopus 로고    scopus 로고
    • A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes
    • Bai X, Gopal R, Nunez M, Zhdanov D (2014) A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes. Decision Support Systems 57(1):406-416
    • (2014) Decision Support Systems , vol.57 , Issue.1 , pp. 406-416
    • Bai, X.1    Gopal, R.2    Nunez, M.3    Zhdanov, D.4
  • 8
    • 0041851517 scopus 로고    scopus 로고
    • A model ofWeb site browsing behavior estimated on clickstream data
    • Bucklin R, Sismeiro C (2003) A model ofWeb site browsing behavior estimated on clickstream data. J. Marketing Res. 40(3):249-267
    • (2003) J. Marketing Res , vol.40 , Issue.3 , pp. 249-267
    • Bucklin, R.1    Sismeiro, C.2
  • 9
    • 33947373662 scopus 로고    scopus 로고
    • Economics of IT security management: Four improvements to current security practices
    • Cavusoglu H, Cavusoglu H, Raghunathan S (2004a) Economics of IT security management: Four improvements to current security practices. Comm. Assoc. Inform. Systems 14(3):65-75
    • (2004) Comm. Assoc. Inform. Systems , vol.14 , Issue.3 , pp. 65-75
    • Cavusoglu, H.1    Cavusoglu, H.2    Raghunathan, S.3
  • 10
    • 77958482604 scopus 로고    scopus 로고
    • An analysis of the impact of passenger profiling for transportation security
    • Cavusoglu H, Koh B, Raghunathan S (2010) An analysis of the impact of passenger profiling for transportation security. Oper. Res. 158(5):1287-1302
    • (2010) Oper. Res , vol.158 , Issue.5 , pp. 1287-1302
    • Cavusoglu, H.1    Koh, B.2    Raghunathan, S.3
  • 11
    • 4243109556 scopus 로고    scopus 로고
    • A model for evaluating IT security investments
    • Cavusoglu H, Mishra B, Raghunathan S (2004b) A model for evaluating IT security investments. Comm. ACM 47(7):87-92
    • (2004) Comm. ACM , vol.47 , Issue.7 , pp. 87-92
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 12
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu H, Mishra B, Raghunathan S (2005) The value of intrusion detection systems in information technology security architecture. Inform. Systems Res. 16(1):28-46
    • (2005) Inform. Systems Res , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 13
    • 67649529385 scopus 로고    scopus 로고
    • Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
    • Cavusoglu H, Raghunathan S, Cavusoglu H (2009) Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Inform. Systems Res. 20(2):198-217
    • (2009) Inform. Systems Res , vol.20 , Issue.2 , pp. 198-217
    • Cavusoglu, H.1    Raghunathan, S.2    Cavusoglu, H.3
  • 14
    • 66549093519 scopus 로고    scopus 로고
    • Decision-theoretic and game-theoretic approaches to IT security investment
    • Cavusoglu H, Raghunathan S, Yue WT (2008) Decision-theoretic and game-theoretic approaches to IT security investment. J. Management Inform. Systems 25(2):281-304
    • (2008) J. Management Inform. Systems , vol.25 , Issue.2 , pp. 281-304
    • Cavusoglu, H.1    Raghunathan, S.2    Yue, W.T.3
  • 15
    • 84897080478 scopus 로고    scopus 로고
    • Outsourcing information security: Contracting issues and security implications
    • Cezar A, Cavusoglu H, Raghunathan S (2014) Outsourcing information security: Contracting issues and security implications. Management Sci. 60(3):638-657
    • (2014) Management Sci , vol.60 , Issue.3 , pp. 638-657
    • Cezar, A.1    Cavusoglu, H.2    Raghunathan, S.3
  • 17
    • 0242539674 scopus 로고    scopus 로고
    • World wide wait: A study of Internet scalability and cache-based approaches to alleviate it
    • Datta A, Dutta K, Thomas H, VanderMeet D (2003)World wide wait: A study of Internet scalability and cache-based approaches to alleviate it. Management Sci. 49(10):1425-1444
    • (2003) Management Sci , vol.49 , Issue.10 , pp. 1425-1444
    • Datta, A.1    Dutta, K.2    Thomas, H.3    VanderMeet, D.4
  • 18
    • 85010308893 scopus 로고    scopus 로고
    • Dell (2015) Going the MSSP route. http://www.secureworks.com/assets/pdf-store/articles/going_the_mssp_route_-_tco_issues .pdf
    • (2015) Going the MSSP route
  • 19
    • 33744922914 scopus 로고    scopus 로고
    • Outsourcing Internet security: The effect of transaction costs on managed service providers
    • Gavish B, ed. (Institute for Information Infrastructure Protection, Washington, DC)
    • Ding W, Yurcik W (2005) Outsourcing Internet security: The effect of transaction costs on managed service providers. Gavish B, ed. Internat. Conf. Telecomm. Systems, Modeling, Anal. (Institute for Information Infrastructure Protection, Washington, DC), 947-958
    • (2005) Internat. Conf. Telecomm. Systems, Modeling, Anal , pp. 947-958
    • Ding, W.1    Yurcik, W.2
  • 20
    • 85018485578 scopus 로고    scopus 로고
    • Economics of Internet security outsourcing: Simulation results based on the Schneier model
    • (American Telecommunications Systems Management Association, Dallas)
    • Ding W, Yurcik W (2006) Economics of Internet security outsourcing: Simulation results based on the Schneier model. Workshop Econom. Securing Inform. Infrastructure 4WESII5 (American Telecommunications Systems Management Association, Dallas), 23-23
    • (2006) Workshop Econom. Securing Inform. Infrastructure 4WESII5 , pp. 23-23
    • Ding, W.1    Yurcik, W.2
  • 23
    • 33745725716 scopus 로고    scopus 로고
    • A data-mining-based prefetching approach to caching for network storage systems
    • Fang X, Sheng LOR, Gao W, Iyer B (2006) A data-mining-based prefetching approach to caching for network storage systems. INFORMS J. Comput. 18(2):267-282
    • (2006) INFORMS J. Comput , vol.18 , Issue.2 , pp. 267-282
    • Fang, X.1    Sheng, L.O.R.2    Gao, W.3    Iyer, B.4
  • 24
    • 33749044955 scopus 로고
    • The Markov-modulated Poisson process (MMPP) cookbook
    • Fisher W, Meier-Hellstern K (1993) The Markov-modulated Poisson process (MMPP) cookbook. Performance Evaluation 18(2): 149-171
    • (1993) Performance Evaluation , vol.18 , Issue.2 , pp. 149-171
    • Fisher, W.1    Meier-Hellstern, K.2
  • 26
    • 34247541615 scopus 로고    scopus 로고
    • Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information
    • Garfinkel R, Gopal R, Thompson S (2007) Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information. Inform. Systems Res. 18(1):23-41
    • (2007) Inform. Systems Res , vol.18 , Issue.1 , pp. 23-41
    • Garfinkel, R.1    Gopal, R.2    Thompson, S.3
  • 29
    • 69549095933 scopus 로고    scopus 로고
    • Developing expertise for network intrusion detection
    • Goodall JR, Lutters WG, Komlodi A (2009) Developing expertise for network intrusion detection. Inform. Tech. People 22(2):92-108
    • (2009) Inform. Tech. People , vol.22 , Issue.2 , pp. 92-108
    • Goodall, J.R.1    Lutters, W.G.2    Komlodi, A.3
  • 30
    • 84868029643 scopus 로고    scopus 로고
    • Growth and sustainability of managed security services networks: An economic perspective
    • Gupta A, Zhdanov D (2012) Growth and sustainability of managed security services networks: An economic perspective. MIS Quart. 36(4):1109-1130
    • (2012) MIS Quart , vol.36 , Issue.4 , pp. 1109-1130
    • Gupta, A.1    Zhdanov, D.2
  • 31
    • 0037297050 scopus 로고    scopus 로고
    • Decomposition of general queueing networks with MMPP inputs and customer losses
    • Heindl A (2003) Decomposition of general queueing networks with MMPP inputs and customer losses. Performance Evaluation 51(2-4):117-136
    • (2003) Performance Evaluation , vol.51 , Issue.2-4 , pp. 117-136
    • Heindl, A.1
  • 34
    • 84871694879 scopus 로고    scopus 로고
    • Cooperative cashing? An economic analysis of document duplication in cooperative Web caching
    • Hosanagar K, Tan Y (2011) Cooperative cashing? An economic analysis of document duplication in cooperative Web caching. Inform. Systems Res. 23(2):356-375
    • (2011) Inform. Systems Res , vol.23 , Issue.2 , pp. 356-375
    • Hosanagar, K.1    Tan, Y.2
  • 35
    • 84878001717 scopus 로고    scopus 로고
    • Information security outsourcing with system interdependency and mandatory security requirement
    • Hui KL, Hui W, Yue WT (2012) Information security outsourcing with system interdependency and mandatory security requirement. J. Management Inform. Systems 29(3):117-156
    • (2012) J. Management Inform. Systems , vol.29 , Issue.3 , pp. 117-156
    • Hui, K.L.1    Hui, W.2    Yue, W.T.3
  • 37
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson E, Olovsson T (1997) A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Engrg. 23(4):235-245
    • (1997) IEEE Trans. Software Engrg , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 38
    • 7444248367 scopus 로고    scopus 로고
    • Outsourcing trends-A matter of perspective? Bus
    • Kaplan J (2003) Outsourcing trends-A matter of perspective? Bus. Comm. Rev. 33(8):46-50
    • (2003) Comm. Rev , vol.33 , Issue.8 , pp. 46-50
    • Kaplan, J.1
  • 40
    • 57749119172 scopus 로고    scopus 로고
    • An admission-control technique for delay reduction in proxy caching
    • Kaya C, Zhang G, Tan Y, Mookerjee V (2009) An admission-control technique for delay reduction in proxy caching. Decision Support Systems 46(2):594-603
    • (2009) Decision Support Systems , vol.46 , Issue.2 , pp. 594-603
    • Kaya, C.1    Zhang, G.2    Tan, Y.3    Mookerjee, V.4
  • 41
    • 0035253950 scopus 로고    scopus 로고
    • Optimal Web cache sizing: Scalable methods for exact solutions
    • Kelly T, Reeves R (2001) Optimal Web cache sizing: Scalable methods for exact solutions. Comput. Comm. 24(2):163-173
    • (2001) Comput. Comm , vol.24 , Issue.2 , pp. 163-173
    • Kelly, T.1    Reeves, R.2
  • 46
    • 70349118618 scopus 로고    scopus 로고
    • A review of the IT outsourcing literature: Insights for practice
    • Lacity MC, Khan SA, Willcocks LP (2009) A review of the IT outsourcing literature: Insights for practice. J. Strategic Inform. Systems 18(3):130-146
    • (2009) J. Strategic Inform. Systems , vol.18 , Issue.3 , pp. 130-146
    • Lacity, M.C.1    Khan, S.A.2    Willcocks, L.P.3
  • 49
    • 33645669627 scopus 로고    scopus 로고
    • A multilevel passenger screening problem for aviation security
    • McLay L, Jacobson S, Kobza J (2006) A multilevel passenger screening problem for aviation security. Naval Res. Logist. 53(3): 183-197
    • (2006) Naval Res. Logist , vol.53 , Issue.3 , pp. 183-197
    • McLay, L.1    Jacobson, S.2    Kobza, J.3
  • 50
    • 77958463119 scopus 로고    scopus 로고
    • The trade-off between technology and prescreening intelligence in checked baggage screening for aviation security
    • McLay L, Jacobson S, Kobza J (2008) The trade-off between technology and prescreening intelligence in checked baggage screening for aviation security. J. Transportation Security 1(2):107-126
    • (2008) J. Transportation Security , vol.1 , Issue.2 , pp. 107-126
    • McLay, L.1    Jacobson, S.2    Kobza, J.3
  • 51
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • Mitchell R, Chen I (2014) A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surveys 46(4): Article 55
    • (2014) ACM Comput. Surveys , vol.46 , Issue.4
    • Mitchell, R.1    Chen, I.2
  • 54
    • 0036508157 scopus 로고    scopus 로고
    • Analysis of a least recently used cache management policy for Web browsers
    • Mookerjee V, Tan Y (2002) Analysis of a least recently used cache management policy for Web browsers. Oper. Res. 50(2):345-357
    • (2002) Oper. Res , vol.50 , Issue.2 , pp. 345-357
    • Mookerjee, V.1    Tan, Y.2
  • 56
    • 61349169100 scopus 로고    scopus 로고
    • Intrusion-detection policies for IT security breaches
    • Ogut H, Cavusoglu H, Raghunathan S (2008) Intrusion-detection policies for IT security breaches. INFORMS J. Comput. 20(1): 112-123
    • (2008) INFORMS J. Comput , vol.20 , Issue.1 , pp. 112-123
    • Ogut, H.1    Cavusoglu, H.2    Raghunathan, S.3
  • 57
    • 34147099073 scopus 로고    scopus 로고
    • Survey of networkbased defense mechanisms countering the DoS and DDoS problems
    • Peng T, Leckie C, Ramamohanarao K (2007) Survey of networkbased defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surveys 39(1):Article 3
    • (2007) ACM Comput. Surveys , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 59
    • 3042767592 scopus 로고    scopus 로고
    • A survey ofWeb cache replacement strategies
    • Podlipnig S, Bszrmenyi L (2003) A survey ofWeb cache replacement strategies. ACM Comput. Surveys 35(4):374-398
    • (2003) ACM Comput. Surveys , vol.35 , Issue.4 , pp. 374-398
    • Podlipnig, S.1    Bszrmenyi, L.2
  • 60
    • 67649548424 scopus 로고    scopus 로고
    • Choice and chance: A conceptual model of paths to information security compromise
    • Ransbotham S, Mitra S (2009) Choice and chance: A conceptual model of paths to information security compromise. Inform. Systems Res. 20(1):121-139
    • (2009) Inform. Systems Res , vol.20 , Issue.1 , pp. 121-139
    • Ransbotham, S.1    Mitra, S.2
  • 64
    • 0037004470 scopus 로고    scopus 로고
    • The case for outsourcing security
    • Schneier B (2002) The case for outsourcing security. IEEE Comput. 35(4):20-26
    • (2002) IEEE Comput , vol.35 , Issue.4 , pp. 20-26
    • Schneier, B.1
  • 67
    • 84875310665 scopus 로고    scopus 로고
    • Intrusion detection and the role of the system administrator
    • Sommestad T, Hunstad A (2013) Intrusion detection and the role of the system administrator. Inform. Management Comput. Security 21(1):30-40
    • (2013) Inform. Management Comput. Security , vol.21 , Issue.1 , pp. 30-40
    • Sommestad, T.1    Hunstad, A.2
  • 68
    • 85010426446 scopus 로고    scopus 로고
    • retail websites in 3rd quarter 2014
    • Statista (2015) Monthly unique visitors to U.S. retail websites in 3rd quarter 2014. http://www.statista.com/statistics/271450/monthly-unique-visitors-to-us-retail-websites/
    • (2015) Monthly unique visitors to U.S
  • 70
    • 33746449221 scopus 로고    scopus 로고
    • A decision analysis method for evaluating computer intrusion detection systems
    • Ulvila JW, Gaffney JE (2004) A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1(1):35-50
    • (2004) Decision Anal , vol.1 , Issue.1 , pp. 35-50
    • Ulvila, J.W.1    Gaffney, J.E.2
  • 72
    • 0141816735 scopus 로고    scopus 로고
    • Analyzing the cost of screening selectee and non-selectee baggage
    • Virta J, Jacobson S, Kobza J (2003) Analyzing the cost of screening selectee and non-selectee baggage. Risk Anal. 23(5):897-908
    • (2003) Risk Anal , vol.23 , Issue.5 , pp. 897-908
    • Virta, J.1    Jacobson, S.2    Kobza, J.3
  • 73
    • 64849099080 scopus 로고    scopus 로고
    • The challenges of using an intrusion detection system: Is it worth the effort? Proc
    • (ACM, New York)
    • Werlinger R, Hawkey K, Muldner K (2008) The challenges of using an intrusion detection system: Is it worth the effort? Proc. 4th Sympos. Usable Privacy Security (ACM, New York), 107-118
    • (2008) 4th Sympos. Usable Privacy Security , pp. 107-118
    • Werlinger, R.1    Hawkey, K.2    Muldner, K.3
  • 74
    • 84875309636 scopus 로고    scopus 로고
    • Towards understanding diagnostic work during the detection and investigation of security incidents
    • Furnell S, Clarke N, eds. (University of Plymouth, Plymouth, UK)
    • Werlinger R, Muldner K, Hawkey K, Beznosov K (2009) Towards understanding diagnostic work during the detection and investigation of security incidents. Furnell S, Clarke N, eds. Proc. Third Internat. Sympos. Human Aspects Inform. Security Assurance (University of Plymouth, Plymouth, UK), 119-134
    • (2009) Proc. Third Internat. Sympos. Human Aspects Inform. Security Assurance , pp. 119-134
    • Werlinger, R.1    Muldner, K.2    Hawkey, K.3    Beznosov, K.4
  • 75
    • 77949522891 scopus 로고    scopus 로고
    • Preparation, detection, and analysis: The diagnostic work of IT security incident response
    • Werlinger R, Muldner K, Hawkey K, Beznosov K (2010) Preparation, detection, and analysis: The diagnostic work of IT security incident response. Inform. Management Comput. Security 18(1):26-42
    • (2010) Inform. Management Comput. Security , vol.18 , Issue.1 , pp. 26-42
    • Werlinger, R.1    Muldner, K.2    Hawkey, K.3    Beznosov, K.4
  • 76
    • 0002271555 scopus 로고
    • Contracting for software development
    • Whang S (1992) Contracting for software development. Management Sci. 38(3):307-324
    • (1992) Management Sci , vol.38 , Issue.3 , pp. 307-324
    • Whang, S.1
  • 77
    • 85010323197 scopus 로고    scopus 로고
    • Spafford G, ed. Workshop Recent Adv. Intrusion Detection (Purdue University, West Lafayette, IN)
    • Zamboni D, Spafford E (1999) New directions for the AAPHID architecture. Spafford G, ed. Workshop Recent Adv. Intrusion Detection (Purdue University, West Lafayette, IN)
    • (1999) New directions for the AAPHID architecture
    • Zamboni, D.1    Spafford, E.2
  • 78
    • 84883204511 scopus 로고    scopus 로고
    • Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements
    • Zhao X, Whinston A (2013) Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements. J. Management Inform. Systems 30(1):123-152
    • (2013) J. Management Inform. Systems , vol.30 , Issue.1 , pp. 123-152
    • Zhao, X.1    Whinston, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.