2005
DOI: 10.1145/1082983.1083099
|View full text |Cite
|
Sign up to set email alerts
|

Business process-based valuation of IT-security

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…These approaches propose theoretical reference models to fill the void between business and risk domains. In other respects, Neubauer et al [57] propose a framework for the analysis of the security of business processes from the point of view of cost-benefit. Their framework proposal is defined for integration into any business process management approach.…”
Section: Related Workmentioning
confidence: 99%
“…These approaches propose theoretical reference models to fill the void between business and risk domains. In other respects, Neubauer et al [57] propose a framework for the analysis of the security of business processes from the point of view of cost-benefit. Their framework proposal is defined for integration into any business process management approach.…”
Section: Related Workmentioning
confidence: 99%
“…In early risk assessment approaches, the idea of using business processes was introduced to avoid focusing solely on technical security issues (CCTA, 1987; Halliday et al , 1996; Rainer et al , 1991). Later, annual loss expectancy (Suh and Han, 2003), loss of disruption (Neubauer et al , 2005) and business goals (Khanmohammadi and Houmb, 2010) began to be used to determine the criticality and importance of vulnerabilities in terms of losses or interruption. In these approaches the impact of a given vulnerability is determined but not the security required.…”
Section: Related Workmentioning
confidence: 99%
“…Information security investment not only relates to the direct income of the defender, but also impacts the indirect income of the defender [7], so we choose I to reflect the intangible asset produced by information security investment of the E-commerce organization. K represents the attack cost of the attacker.…”
Section: Information Security Game Model Of the Defender And The Attamentioning
confidence: 99%