Adaptive model of information security technique investment

被引:0
|
作者
Dong, Hong [1 ]
Qiu, Wan-Hua [1 ]
Lu, Jun-Jie [1 ]
Zhang, Wen [2 ]
机构
[1] School of Economics and Management, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
[2] School of Computer Science, Northwestern Polytechnical University, Xi'an 710072, China
来源
Kongzhi yu Juece/Control and Decision | 2008年 / 23卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
17
引用
收藏
页码:535 / 540
相关论文
共 50 条
  • [1] A model of return on investment for information systems security
    Al-Humaigani, M
    Dunn, DB
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 483 - 485
  • [2] A model of the information security investment decision-making process
    Dor, Daniel
    Elovici, Yuual
    COMPUTERS & SECURITY, 2016, 63 : 1 - 13
  • [3] Quantitative Model for Economic Analyses of Information Security Investment in an Enterprise Information System
    Bojanc, Rok
    Jerman-Blazic, Borka
    ORGANIZACIJA, 2012, 45 (06) : 276 - 288
  • [4] Extending the Gordon&Loeb Model for Information Security Investment
    Willemson, Jan
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 258 - 261
  • [5] The Economics of Information Security Investment
    Wang, Heng
    ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEM, PTS 1-6, 2011, 219-220 : 1550 - 1553
  • [6] The complexity of an investment competition dynamical model with imperfect information in a security market
    Xin, Baogui
    Ma, Junhai
    Gao, Qin
    CHAOS SOLITONS & FRACTALS, 2009, 42 (04) : 2425 - 2438
  • [7] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Kjell Hausken
    Information Systems Frontiers, 2006, 8 : 338 - 349
  • [8] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    Hausken, Kjell
    INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) : 338 - 349
  • [9] How does overconfidence affect information security investment and information security performance?
    Dong, Kunxiang
    Lin, Runhui
    Yin, Xile
    Xie, Zongxiao
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) : 474 - 491
  • [10] A game of information security investment considering security insurance and complementary information assets
    Qian, Xiaofei
    Yang, Wujuan
    Pei, Jun
    Liu, Xinbao
    Pardalos, Panos M.
    INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH, 2022, 29 (03) : 1791 - 1824