Economics of IT Security Management

[1]  Huseyin Cavusoglu,et al.  The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..

[2]  Huseyin Cavusoglu,et al.  Model for Evaluating , 2022 .

[3]  Martin P. Loeb,et al.  CSI/FBI Computer Crime and Security Survey , 2004 .

[4]  Huseyin Cavusoglu,et al.  Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches , 2003, ICIS.

[5]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[6]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[7]  Salvatore J. Stolfo,et al.  Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..

[8]  Stefan Engel-Flechsig,et al.  Is The Game Finally Up For Cyber-Criminals? , 2002 .

[9]  Huseyin Cavusoglu,et al.  ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY , 2002 .

[10]  John E. Gaffney,et al.  Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[11]  Yacov Y. Haimes,et al.  Are we forgetting the risks of information technology? , 2000, Computer.

[12]  Suresh L. Konda,et al.  The Survivability of Network Systems: An Empirical Analysis , 2000 .

[13]  Stefan Axelsson,et al.  The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.

[14]  Michael M. May,et al.  How much is enough? A risk management approach to computer security , 2000 .

[15]  Terry Dwain Escamilla,et al.  Intrusion detection: network security beyond the firewall , 1998 .

[16]  Terry Escamilla,et al.  Intrusion detection , 1998 .

[17]  Erik Brynjolfsson,et al.  The productivity paradox of information technology , 1993, CACM.

[18]  E. Fama,et al.  The Adjustment of Stock Prices to New Information , 1969 .