Enterprise security investment through time when facing different types of vulnerabilities

Y Miaoui, N Boudriga - Information Systems Frontiers, 2019 - Springer
We propose in this work to use the utility theory to compute the optimal security investment
over an investment horizon, considering the typologies and dynamic aspects of …

Optimal information security expenditures considering budget constraints

A Schilling, B Werners - 2015 - aisel.aisnet.org
In this paper, we present a new quantitative optimization model to support decision makers
in determining how much to invest in information security and how to allocate funds. The …

Sense-Making in Cyber Security-Examining Responder Behaviors in Cyber-Attacks

T Tapanainen - Americas Conference on Information Systems (AMCIS …, 2017 - orbi.uliege.be
Our understanding of the defense mechanisms against cyber-attacks is, to a great extent,
based on preparation and deterrence. There is limited understanding, and in particular …

Cost Estimation and Security Investment of Security Projects

Y Miaoui, BA Fessi, N Boudriga - Advanced Methodologies and …, 2019 - igi-global.com
This chapter aims at examining two main aspects in security: cost estimation and investment
assessment. The characteristics of security projects are stressed and the importance of …

[PDF][PDF] Mindfulness in Cyber Security-Examining Responder Behaviors in Cyber-Attacks.

TJ Tapanainen - AMCIS, 2017 - core.ac.uk
Our understanding of the defense mechanisms against cyber-attacks is, to a great extent,
based on preparation and deterrence. There is limited understanding, and in particular …