Investments in Information Security: A Real Options Perspective with Bayesian Postaudit.
Hemantha S. B. HerathTejaswini C. HerathPublished in: J. Manag. Inf. Syst. (2009)
Keyphrases
- information security
- real option
- pricing model
- countermeasures
- decision makers
- security issues
- information systems
- life cycle
- decision making
- intrusion detection
- smart card
- power plant
- security requirements
- network security
- information assurance
- information security management
- security level
- smart grid
- risk analysis
- bayesian networks
- maximum likelihood
- critical infrastructure
- cyber defense
- stochastic process
- iso iec
- security risks
- databases
- information technology
- artificial neural networks