Vulnerability and information security investment: An empirical analysis of e-local government in Japan
暂无分享,去创建一个
[1] Herbert A. Simon,et al. The Sciences of the Artificial , 1970 .
[2] Michael Hammer,et al. Reengineering Work: Don’t Automate, Obliterate , 1990 .
[3] Thomas H. Davenport,et al. Process Innovation: Reengineering Work Through Information Technology , 1992 .
[4] I. Krepchin. Eastman Kodak Co. , 1993 .
[5] M. Hammer,et al. How process enterprises really work. , 1999, Harvard business review.
[6] 日本規格協会. 情報技術 : 情報セキュリティ管理実施基準 : 国際規格 : ISO/IEC 17799 = Information technology : code of practice for infromation security management : international standard : ISO/IEC 17799 , 2000 .
[7] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[8] G. Grossman,et al. Integration vs. Outsourcing in Industry Equilibrium , 2001, SSRN Electronic Journal.
[9] Thomas Peltier,et al. Information Technology: Code of Practice for Information Security Management , 2001 .
[10] M. Hammer. The Agenda: What Every Business Must Do to Dominate the Decade , 2001 .
[11] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[12] Crispin Cowan,et al. Timing the Application of Security Patches for Optimal Uptime , 2002, LISA.
[13] P. Drucker. They're not employees, they're people. , 2002, Harvard business review.
[14] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[15] Jan H. P. Eloff,et al. Information Security Policy - What do International Information Security Standards say? , 2002, ISSA.
[16] Lawrence A. Gordon,et al. Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .
[17] Rebecca T. Mercuri. Analyzing security costs , 2003, CACM.
[18] Kanta Matsuura. Information Security and Economics in Computer Networks: An Interdisciplinary Survey and a Proposal of Integrated Optimization of Investment , 2003 .
[19] John Hagel,et al. Does IT Matter , 2003 .
[20] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[21] Tyler Moore,et al. The Economics of Information Security , 2006, Science.