Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability.
Kjell HauskenPublished in: Inf. Syst. Frontiers (2006)
Keyphrases
- information security
- risk assessment
- countermeasures
- sensitive data
- security issues
- intrusion detection
- information systems
- network security
- security risks
- smart card
- information security management
- decision making
- risk analysis
- smart grid
- security requirements
- information assurance
- critical infrastructure
- iso iec
- data protection
- investment strategies
- data security
- security level
- cyber defense
- technical issues
- e government
- information technology