2003
DOI: 10.1145/777313.777327
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing security costs

Abstract: Quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
1

Year Published

2005
2005
2020
2020

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 80 publications
(25 citation statements)
references
References 1 publication
0
24
0
1
Order By: Relevance
“…This also means that a balance between costs and benefits of IT security is demanded (cf. [27], [28], [32]) and that investments in security have to be geared to the principle of economic efficiency. This includes that in the case of an economic revision they have to withstand the then applied measures.…”
Section: Cost-benefit-evaluation Of Information Securitymentioning
confidence: 99%
“…This also means that a balance between costs and benefits of IT security is demanded (cf. [27], [28], [32]) and that investments in security have to be geared to the principle of economic efficiency. This includes that in the case of an economic revision they have to withstand the then applied measures.…”
Section: Cost-benefit-evaluation Of Information Securitymentioning
confidence: 99%
“…Another technique for measuring the net social value of measures or programs is Cost-Benefit analysis (CBA) [34]. A short evaluation of current methods including ICAMP (Incident Cost Analysis Modeling Project), internal rate of return (IRR) and maximum net present value (NPV) can be found in Mercuri [35]. All these frameworks do not consider the external business value of reaching a defined security level.…”
Section: Overview Of Research In Security and Business Process Mamentioning
confidence: 99%
“…Another technique for measuring the net value of measures or programs is Cost-Benefit analysis (CBA) [21]. A short evaluation of current methods including ICAMP (Incident Cost Analysis Modelling Project), internal rate of return (IRR) and maximum net present value (NPV) can be found in [13]. Butler [3] uses a cost-benefit analysis method SAEM (Security Attribute Evaluation Method) to compare alternative security designs.…”
Section: ) 2) 3) 4) Security Frameworkmentioning
confidence: 99%