Vulnerability and information security investment: An empirical analysis of e-local government in Japan

[1]  Herbert A. Simon,et al.  The Sciences of the Artificial , 1970 .

[2]  Michael Hammer,et al.  Reengineering Work: Don’t Automate, Obliterate , 1990 .

[3]  Thomas H. Davenport,et al.  Process Innovation: Reengineering Work Through Information Technology , 1992 .

[4]  I. Krepchin Eastman Kodak Co. , 1993 .

[5]  M. Hammer,et al.  How process enterprises really work. , 1999, Harvard business review.

[6]  日本規格協会 情報技術 : 情報セキュリティ管理実施基準 : 国際規格 : ISO/IEC 17799 = Information technology : code of practice for infromation security management : international standard : ISO/IEC 17799 , 2000 .

[7]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[8]  G. Grossman,et al.  Integration vs. Outsourcing in Industry Equilibrium , 2001, SSRN Electronic Journal.

[9]  Thomas Peltier,et al.  Information Technology: Code of Practice for Information Security Management , 2001 .

[10]  M. Hammer The Agenda: What Every Business Must Do to Dominate the Decade , 2001 .

[11]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[12]  Crispin Cowan,et al.  Timing the Application of Security Patches for Optimal Uptime , 2002, LISA.

[13]  P. Drucker They're not employees, they're people. , 2002, Harvard business review.

[14]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[15]  Jan H. P. Eloff,et al.  Information Security Policy - What do International Information Security Standards say? , 2002, ISSA.

[16]  Lawrence A. Gordon,et al.  Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .

[17]  Rebecca T. Mercuri Analyzing security costs , 2003, CACM.

[18]  Kanta Matsuura Information Security and Economics in Computer Networks: An Interdisciplinary Survey and a Proposal of Integrated Optimization of Investment , 2003 .

[19]  John Hagel,et al.  Does IT Matter , 2003 .

[20]  Hal R. Varian,et al.  System Reliability and Free Riding , 2004, Economics of Information Security.

[21]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.