Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Economics of Identity and Access Management: Providing decision support for investments
I Azhar - Ishaq Azhar Mohammed.(2014). Economics of Identity …, 2014 - papers.ssrn.com
The main purpose of this paper is to explore how Identity and Access Management is an
important asset in economics especially in decision making to support investments. Identity …
important asset in economics especially in decision making to support investments. Identity …
Contagion in cyber security attacks
Abstract Systems security is essential for the efficient operation of all organizations. Indeed,
most large firms employ a designated 'Chief Information Security Officer'to coordinate the …
most large firms employ a designated 'Chief Information Security Officer'to coordinate the …
Information security trade-offs and optimal patching policies
We develop and simulate a basic mathematical model of the costly deployment of software
patches in the presence of trade-offs between confidentiality and availability. The model …
patches in the presence of trade-offs between confidentiality and availability. The model …
Gaining an edge in cyberspace with advanced situational awareness
V Lenders, A Tanner, A Blarer - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Organizations that rely on cyberspace as a mission-critical asset require advanced
situational awareness to maintain a tactical advantage over emerging threats. A new cyber …
situational awareness to maintain a tactical advantage over emerging threats. A new cyber …
Decision support for systems security investment
Y Beresnevichiene, D Pym… - 2010 IEEE/IFIP Network …, 2010 - ieeexplore.ieee.org
Information security managers with fixed budgets must invest in security measures to
mitigate increasingly severe threats whilst maintaining the alignment of their systems with …
mitigate increasingly severe threats whilst maintaining the alignment of their systems with …
Fixed costs, investment rigidities, and risk aversion in information security: A utility-theoretic approach
This paper addresses the question of determining the optimal timing of interventions in
information security management. Using utility theory, we derive the limiting condition under …
information security management. Using utility theory, we derive the limiting condition under …
Security as a theoretical attribute construct
JL Bayuk - Computers & Security, 2013 - Elsevier
This paper provides an overview of the field of security metrics and discusses results of a
survey of security experts on the topic. It describes a new framework for develo** security …
survey of security experts on the topic. It describes a new framework for develo** security …
Economic methods and decision making by security professionals
Increasing reliance on IT and the worsening threat environment mean that organisations are
under pressure to invest more in information security. A challenge is that the choices are …
under pressure to invest more in information security. A challenge is that the choices are …
Migration to cloud as real option: Investment decision under uncertainty
CY Yam, A Baldwin, S Shiu… - … Conference on Trust …, 2011 - ieeexplore.ieee.org
If cloud is so good then why aren't companies using it more? In this paper we look at how
companies should make a decision to move some IT services or their IT infrastructure into …
companies should make a decision to move some IT services or their IT infrastructure into …
Games of timing for security in dynamic environments
Increasing concern about insider threats, cyber-espionage, and other types of attacks which
involve a high degree of stealthiness has renewed the desire to better understand the timing …
involve a high degree of stealthiness has renewed the desire to better understand the timing …