1 |
남상훈, 임종인, '기업 정보보호 투자에 대한 경제성 평가의 접근방법에 관한 연구', 한국기술혁신학회 추계학술대회, pp.282-295, 2005
과학기술학회마을
|
2 |
Brynjolfsson, E. and Hitt, L., 'Paradox Lost? Firm-level Evidence on the Returns to Information Systems', Management Science, Vol.42, No.4, pp.541-558, 1996
DOI
ScienceOn
|
3 |
Kim, S. and Leem, C.S., 'Security of the Internetbased Instant Messenger: Risks and Safeguards', Internet Research: Electronic Networking Applications and Policy, Vol.15, No.1, pp.88-98, 2005
DOI
ScienceOn
|
4 |
Mahmood, M.A. and Mann, G.J., 'Measuring the Organizational Impact of Information Tech nology Investment: an Exploratory Study', Journal of Management Information Systems, Vol.10, No.1, pp.97-122, 1993
|
5 |
Mitra, S. and Chaya, A.K., 'Analyzing Cost-effectiveness of Organizations: the Impact of Information Technology Spending', Journal of Management Information Systems, Vol.13 No.2, pp.29-57, 1996
DOI
ScienceOn
|
6 |
Gordon, L., Loeb, M. and Lucyshyn, W, 'An Economics Perspective on the Sharing of Information Related to Security Breaches', Proceedings of WEIS, UC Berkeley, May. 2002
|
7 |
Al-Humaigani, M. and Dunn, D.B., 'A Model of Return on Investment for Information Systems Security', Circuits and Systems, MWSCAS Vol.1, pp.483-485, 2003
|
8 |
Tsiakis, Theodosios and Stephanides, George, 'The Economic Approach of Information Security', Computers & Security, Vol. 24, No.2, pp.105-108, 2005
DOI
ScienceOn
|
9 |
Hausken, K., 'Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability', Information System Frontiers, Vol.8, No.5, pp. 338-349, 2006
|
10 |
Lee, Vincent C.S., 'A Fuzzy Multi-criteria Decision Model for Information System Security Investment', Lecture Notes in Computer Science, Vol.2690, pp.436-441, 2003
|
11 |
Scott, D., 'Best Practices and Trends in Business Continuity Planning', U.S. Symposium/ITxpo, Orlando, FL, 2002
|
12 |
Blakley, B., 'Returns on Security Investment: an Imprecise but Necessary Calculation', Secure Business Quarterly, Vol.1, No.2, 2001
|
13 |
Cavusoglu, H., Mishra, B. and Raghunathan, S., 'A Model for Evaluating IT Security Investments', Communications of the ACM, Vol.47, No.7, pp.87-92, 2004b
|
14 |
Witty, R.J, Girard, J., Graff, J.W., Hallawell, A., Hildreth, B., MacDonald, N., Malik, W.J., Pe scatore, J., Reynolds, M., Russell, K., Wheatman, V., Dubiel, J.P., and Weintraub, A., 'The Price of Information Security', Gartner Inc., Stamford, CT, 2001
|
15 |
권영욱, 김병도, '정보보안 사고와 사고방지 관련 투자가 기업가치에 미치는 영향', Information Systems Review, Vol.9, No.1, pp.105-120, 2007
과학기술학회마을
|
16 |
Anderson, Ross., 'Why Information Security is Hard-An Economic Perspective', ACSAC, 2001
|
17 |
Tanaka, H., Matuura, K., and Sudoh, O., 'Vulnerability and Information Security Investment: An Empirical Analysis of E-local Government in Japan', Journal of Accounting and Public Policy, Vol.24, pp.37-59, 2005
DOI
ScienceOn
|
18 |
Parker, D. B. 'The Strategic Values of Information Security in Business', Computers & Security, Vol.16, No.7, pp.572-582, 1997
DOI
ScienceOn
|
19 |
Kim, S. and Leem, C.S., 'Implementation of the Security System for Instant Messengers', Lecture Notes in Computer Science, Vol.3314, pp.739-744, 2004
|
20 |
남상훈, '기업 정보보호 투자효과 분석방법에서 보안 Event가 주식가격에 미치는 영향 실증연구', 고려대학교 박사학위논문, 2006
|
21 |
Davis, A., 'Return on Security Investment-Proving It's Worth It', Network Security, Vol.2, pp.8-10, 2005
|
22 |
Roper, C.A., 'Risk Management for Security Professionals', Butterworth-Heinemann, Boston, MA, 1999
|
23 |
권영옥, '정보보안 사고와 관련 투자가 기업가치에 미치는 영향에 관한 연구', 서울대학교 석사학위논문, 2005
|
24 |
Webster, J. and Watson, R.T., 'Analyzing the Past to Prepare for the Future: Writing a Literature Review', MIS Quarterly, Vol.26, No.2, pp.13-23, 2002
|
25 |
Alpar, P. and Kim, M.A., 'A Microeconomic Approach to the Measurement of Information Technology Value', Journal of Management Information Systems, Vol.7, No.2, pp.55-69, 1990
DOI
ScienceOn
|
26 |
Soo Hoo, K.J., 'How much is enough? A Risk-Management Approach to Computer Security', Center for International Security and Cooperation (CISAC), Stanford University, Stanford, 2000
|
27 |
Gal-Or, Esther and Ghose, Anindya, 'The Economic Incentives for Sharing Security Information', Working Paper, University of Pittsburgh and Carnegie Mellon University
|
28 |
이종선, 이희조, 'TCO기반 Security ROI를 활용한 정보보호 투자성과 평가방법', 한국정보처리학회 춘계학술대회, pp.1125-1128, 2007
|
29 |
Blatchford, C., 'Information Security Controls-Are They Cost-effective', Computer Audit Journal, Vol.3, pp.11-19, 1995
|
30 |
Scott, D., 'Security Investment Justification and Success Factors', Gartner Inc., Stamford, CT, 1998
|
31 |
선한길, '국내기업의 정보보호 정책 및 조직 요인이 정보보호성에 미치는 영향', 한국경영정보학회 춘계학술대회, pp.1087-1095, 2005
|
32 |
채서일, 사회과학조사방법론, 학현사, 2003
|
33 |
김정덕, 박정은, 'TCO 기반 정보보호 투자수익률(ROIS)에 대한 연구', 한국디지털정책학회 창립 학술대회, pp.251-261, 2003
|
34 |
이창진, 이정훈, 장덕화, 'IT 지배구조 기반의 IT 전략 및 운영관리: 문헌연구와 미래연구방향', 한국경영정보학회 춘계학술대회, pp.853-863, 2006
|
35 |
Harris, S., 'CISSP All-in-One Exam Guide', McGraw-Hill, New York, NY, 2001
|
36 |
Cavusoglu, H., Mishra, B.K. and Raghunathan, S., 'Optimal Design of IT Security Architecture', Working Paper, University of Texas at Dallas, 2002
|
37 |
Cavusoglu, H.(Hasan), Cavusoglu, H.(Huseyin) and Raghunathan S. 'Economics of IT Security Management: Four Improvements to Current Security Practices', Communications of the Association for Information System, Vol.14, pp.65-75, 2004a
|
38 |
Barua, A. and Kriebel, C.H., 'Information Technologies and Business Value : An Analytic and Empirical Investigation', GSIA Working Papers, 1991-17, Carnegie Mellon University, Pittsburgh, PA, 1991
|
39 |
박성욱, 윤종민, '산업연관분석을 이용한 정보보호 산업의 연구개발투자에 대한 경제기여도', 한국기술혁신학회 춘계학술대회, pp.19-29, 2006
|
40 |
Bodin, L.D., Gordon, L.A. and Loeb, M.P, 'Evaluating Information Security Investments Using the Analytic Hierarchy Process', Communications of the ACM, Vol.48, pp.79-83, 2005
|
41 |
홍기향, '정보보호 통제와 활동이 정보보호 성과에 미치는 영향에 관한 연구', 국민대학교 박사학위논문, 2003
|
42 |
신일순, '정보보호의 경제학적 의미에 대한 소고', Information Security Review, Vol.1, No.1, 2005
|
43 |
Gordon, L.A. and Loeb, M.P., 'The Economics of Information Security Investment', ACM Transactions on Information and System Security, Vol.5, No.4, pp.438-457, 2002
DOI
|