1 |
Bodin, L. D., L. A. Gordon, M. P. Loeb, "Evaluating information security investments using the analytic hierarchy process," Communications of the ACM, Vol.48, No.2(2005), 78-83.
DOI
|
2 |
Cavusoglu, H., B. Mishra, S. Raghunathan, "A model for evaluating IT security investments," Communications of the ACM, Vol.47, No.7(2004), 87-92.
DOI
|
3 |
Cavusoglu, H., B. Mishra, S. Raghunathan, "The value of intrusion detection systems in information technology security architecture," Information Systems Research, Vol.16, No.1(2005), 28-46.
DOI
|
4 |
Cavusoglu, H., S. Raghunathan, W. T. Yue, "Decision-theoretic and game-theoretic approaches to IT security investment," Journal of Management Information Systems, Vol.25, No.2(2008), 281-304.
DOI
|
5 |
Fielder, A., E. Panaousis, P. Malacaria, C. Hankin, F. Smeraldi, "Decision support approaches for cyber security investment," Decision Support Systems, Vol.86(2016), 13-23.
DOI
|
6 |
Gordon, L. A., M. P. Loeb, "The economics of information security investment," ACM Transactions on Information and System Security, Vol.5, No.4(2002), 438-457.
DOI
|
7 |
Gupta, M., J. Rees, A. Chaturvedi, J. Chi, "Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach," Decision Support Systems, Vol.41, No.3(2006), 592-603.
DOI
|
8 |
Jeong, G. H., S. R. Jeong, "The effect of information protection control activities on organizational effectiveness: Mediating effects of information application," Journal of Intelligence and Information Systems, Vol.17, No.1(2011), 71-90.
DOI
|
9 |
Kong, H. K., T. S. Kim, J. Kim, "An analysis on effects of information security investments: a BSC perspective," Journal of Intelligent Manufacturing, Vol. 23, No.4(2012), 941-953.
DOI
|
10 |
Kumar, R. L., S. Park, C. Subramaniam, "Understanding the value of countermeasure portfolios in information systems security," Journal of Management Information Systems, Vol.25, No.2(2008), 241-280.
DOI
|
11 |
Kwon, Y. O., "A study on the use of a business intelligence system: the role of explanations," Journal of Intelligence and Information Systems, Vol.20, No.4(2014), 155-169.
DOI
|
12 |
National Intelligence Service, Ministry of Science and ICT, Ministry of the Interior and Safety, Korea Communications Commission, Financial Services Commission, 2019 Nation Information Security White Paper, 2019a.
|
13 |
Richardson, R., 2010/2011 CSI Computer Crime and Security Survey, 2011.
|
14 |
Ministry of Science and ICT, Korea Information Security Industry Association, 2019 Survey on Information Security, 2019b.
|
15 |
Nash, J., "Non-cooperative games," Annals of Mathematics, Vol.54, No.2(1951), 286-295.
DOI
|
16 |
Rakes, T. R., J. K. Deane, L. P. Rees, "IT security planning under uncertainty for high-impact events," Omega, Vol.40, No.1(2012), 79-88.
DOI
|
17 |
Sawik, T., "Selection of optimal countermeasure portfolio in IT security planning," Decision Support Systems, Vol.55, No.1(2013), 156-164.
DOI
|
18 |
Seo, B. G., D. H. Park, "The theory of games and the evolution of animal conflicts," Journal of Intelligence and Information Systems, Vol.23, No.1(2017), 143-159.
DOI
|
19 |
Smith, J. M., "The theory of games and the evolution of animal conflicts," Journal of Theoretical Biology, Vol.47, No.1(1974), 209-221.
DOI
|
20 |
Von Neumann, J., O. Morgenstern, Game Theory and Economic Behavior, John Wiley and Sons, New York, 1944.
|
21 |
Von Solms, R., J. Van Niekerk, "From information security to cyber security," Computers & Security, Vol.38(2013), 97-102.
DOI
|