2013
DOI: 10.1080/10429247.2013.11431972
|View full text |Cite
|
Sign up to set email alerts
|

A Quantitative Model for Information-Security Risk Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…Many works in the literature explored the economic perspective of information security and cyber threats, regarding its costs, potential losses and necessary investments. There are models for supporting decision makers in evaluating different security investment strategies (Comes, Hiete, Wijngaards, & Schultmann, 2011;Fielder, Panaousis, Malacaria, Hankin, & Smeraldi, 2016), for estimating the return on security investments (Cavusoglu, Mishra, & Raghunathan, 2004;Purser, 2004), and works discussing the assessment and management of risks exposure due to information security threats (Bojanc & Jerman-Blažič, 2008, 2013. Dutta and McCrohan (2002) argue that most of these works did not take into consideration elements such as organizational politics, psychological and cognitive biases.…”
Section: Related Workmentioning
confidence: 99%
“…Many works in the literature explored the economic perspective of information security and cyber threats, regarding its costs, potential losses and necessary investments. There are models for supporting decision makers in evaluating different security investment strategies (Comes, Hiete, Wijngaards, & Schultmann, 2011;Fielder, Panaousis, Malacaria, Hankin, & Smeraldi, 2016), for estimating the return on security investments (Cavusoglu, Mishra, & Raghunathan, 2004;Purser, 2004), and works discussing the assessment and management of risks exposure due to information security threats (Bojanc & Jerman-Blažič, 2008, 2013. Dutta and McCrohan (2002) argue that most of these works did not take into consideration elements such as organizational politics, psychological and cognitive biases.…”
Section: Related Workmentioning
confidence: 99%
“…A risk is defined as the effect of uncertainty on objectives [4]; while risk assessment is the process of identifying, evaluating and prioritising risks [5]. Information security risks lead to a deviation from the expected results for which security controls were implemented, and they impact the objectives of the information asset including its financial, safety or productivity goals.…”
Section: Introductionmentioning
confidence: 99%
“…The use of cyber-physical systems (CPSs) is constantly increasing, which means that most organizations are becoming increasingly reliant on information systems [1]. Information security governance is an increasingly critical component of organizational management, and an overall system security structure that covers the attributes of a CPS environment is required [2] [3]. Currently, organizations are collectively measuring and evaluating the capability of information security management; however, objectively evaluating a target system is difficult because security-level evaluation systems are not based on the individual characteristics of an organization or the organization's information security activities [4].…”
Section: Introductionmentioning
confidence: 99%