相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A system dynamics model for information security management
Derek L. Nazareth et al.
INFORMATION & MANAGEMENT (2015)
Optimal information security investment in a Healthcare Information Exchange: An economic analysis
C. Derrick Huang et al.
DECISION SUPPORT SYSTEMS (2014)
A game-theoretic analysis of information sharing and security investment for complementary firms
Xing Gao et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2014)
Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
C. Derrick Huang et al.
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2013)
Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
Xia Zhao et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)
A differential game approach to information security investment under hackers' knowledge dissemination
Xing Gao et al.
OPERATIONS RESEARCH LETTERS (2013)
Managing the investment in information security technology by use of a quantitative modeling
Rok Bojanc et al.
INFORMATION PROCESSING & MANAGEMENT (2012)
An analysis on effects of information security investments: a BSC perspective
Hee-Kyung Kong et al.
JOURNAL OF INTELLIGENT MANUFACTURING (2012)
Investing in IT Security: How to Determine the Maximum Threshold
Amanda Eisenga et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2012)
Firms' information security investment decisions: Stock market evidence of investors' behavior
Sangmi Chai et al.
DECISION SUPPORT SYSTEMS (2011)
Knowledge sharing and investment decisions in information security
Dengpan Liu et al.
DECISION SUPPORT SYSTEMS (2011)
Risk-neutral evaluation of information security investment on data centers
Shyue-Liang Wang et al.
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2011)
Information security in networked supply chains: impact of network vulnerability and supply chain integration on incentives to invest
Tridib Bandyopadhyay et al.
INFORMATION TECHNOLOGY & MANAGEMENT (2010)
An economic analysis of the optimal information security investment in the case of a risk-averse firm
C. Derrick Huang et al.
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
Kjell Hausken
INFORMATION SYSTEMS FRONTIERS (2006)