Economic valuation for information security investment: a systematic literature review

D Schatz, R Bashroush - Information Systems Frontiers, 2017 - Springer
Research on technological aspects of information security risk is a well-established area
and familiar territory for most information security professionals. The same cannot be said …

Economics of Identity and Access Management: Providing decision support for investments

I Azhar - Ishaq Azhar Mohammed.(2014). Economics of Identity …, 2014 - papers.ssrn.com
The main purpose of this paper is to explore how Identity and Access Management is an
important asset in economics especially in decision making to support investments. Identity …

Systematically understanding cybersecurity economics: A survey

M Kianpour, SJ Kowalski, H Øverby - Sustainability, 2021 - mdpi.com
Insights in the field of cybersecurity economics empower decision makers to make informed
decisions that improve their evaluation and management of situations that may lead to …

[HTML][HTML] Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem

Z Rashid, U Noor, J Altmann - Future Generation Computer Systems, 2021 - Elsevier
Based on a comprehensive literature survey, the constructs of the cybersecurity information
sharing ecosystem have been defined in detail. Using this ecosystem, the interrelationships …

Information security investments: An exploratory multiple case study on decision-making, evaluation and learning

E Weishäupl, E Yasasin, G Schryen - Computers & Security, 2018 - Elsevier
The need to protect resources against attackers is reflected by huge information security
investments of firms worldwide. In the presence of budget constraints and a diverse set of …

Expanding the Gordon-Loeb model to cyber-insurance

HRK Skeoch - Computers & Security, 2022 - Elsevier
We present an economic model for decisions on competing cyber-security and cyber-
insurance investment based on the Gordon-Loeb model for investment in information …

A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value

T Sawik, B Sawik - International Journal of Production Research, 2022 - Taylor & Francis
This paper deals with optimisation of cybersecurity investment in supply chains using
stochastic programming approach. A classical exponential function of breach probability and …

Game of information security investment: Impact of attack types and network vulnerability

Y Wu, G Feng, N Wang, H Liang - Expert Systems with Applications, 2015 - Elsevier
The level of firms' information security investment has recently become a critical issue in the
management of IT infrastructure. Prior studies have not considered attack types and firms …

An Overview of Security Breach Probability Models

A Mazzoccoli, M Naldi - Risks, 2022 - mdpi.com
Cybersecurity breach probability functions describe how cybersecurity investments impact
the actual vulnerability to cyberattacks through the probability of success of the attack. They …

Synergy of building cybersecurity systems

S Yevseiev, V Ponomarenko, O Laptiev, O Milov… - 2021 - papers.ssrn.com
The development of the modern world community is closely related to advances in
computing resources and cyberspace. The formation and expansion of the range of services …