共 50 条
- [1] Optimal Information Security Investment with Penetration Testing [J]. DECISION AND GAME THEORY FOR SECURITY, 2010, 6442 : 21 - 37
- [2] Towards an optimal information security investment strategy [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 756 - 761
- [3] Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability [J]. Information Systems Frontiers, 2006, 8 : 338 - 349
- [6] Optimal Timing of Information Security Investment: A Real Options Approach [J]. ECONOMICS OF INFORMATION SECURITY AND PRIVACY, 2010, : 211 - +
- [8] Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information [J]. Journal of Business Ethics, 2016, 133 : 111 - 123
- [9] Security Issues in Social Networking [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (06): : 120 - 124
- [10] Optimal Information Security Investment Analyses with the Consideration of the Benefits of Investment and Using Evolutionary Game Theory [J]. PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM2016), 2016,