Sciweavers

575 search results - page 5 / 115
» A model for evaluating IT security investments
Sort
View
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
15 years 3 months ago
Managing Benefits from IS/IT Investments: An Empirical Investigation into Current Practice
In 1996 Ward et al reported the results of their UK study into the state of practice in evaluating and realizing benefits from IS/IT investments. This paper presents new empirical...
John Ward, Steven De Hertogh, Stijn Viaene
HICSS
2009
IEEE
128views Biometrics» more  HICSS 2009»
15 years 1 months ago
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
INFOCOM
2008
IEEE
15 years 3 months ago
A New Perspective on Internet Security using Insurance
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...
Jean-Chrysostome Bolot, Marc Lelarge
EOR
2008
81views more  EOR 2008»
14 years 9 months ago
Investment timing and optimal capacity choice for small hydropower projects
This paper presents a method for assessing small hydropower projects that are subject to uncertain electricity prices. We present a real options-based method with continuous scali...
Thor Bøckman, Stein-Erik Fleten, Erik Juliu...
WWW
2008
ACM
15 years 10 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang