Sciweavers

575 search results - page 3 / 115
» A model for evaluating IT security investments
Sort
View
EOR
2008
77views more  EOR 2008»
14 years 9 months ago
Evaluation of firm's loss due to incomplete information in real investment decision
We investigate the effect of incomplete information in a model where a start-up with a unique idea and technology pioneers a new market but will eventually be expelled from the ma...
Michi Nishihara, Masao Fukushima
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
EOR
2007
104views more  EOR 2007»
14 years 9 months ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier
101
Voted
ESEM
2009
ACM
15 years 4 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
WSC
2001
14 years 11 months ago
Call center scheduling technology evaluation using simulation
Telemarketers, direct marketing agencies, collection agencies and others whose primary means of customer contact is via the telephone invest considerable sums of money to make the...
Sandeep Gulati, Scott A. Malcolm