Timing the Application of Security Patches for Optimal Uptime
LISA '02 Proceedings of the 16th USENIX conference on System administration
Business process-based valuation of IT-security
EDSER '05 Proceedings of the seventh international workshop on Economics-driven software engineering research
The Journal of Strategic Information Systems
Market Reactions to Information Security Breach Announcements: An Empirical Analysis
International Journal of Electronic Commerce
Information security investment decisions: evaluating the Balanced Scorecard method
International Journal of Business Information Systems
Firm objectives, IT alignment, and information security
IBM Journal of Research and Development
A web-based multi-perspective decision support system for information security planning
Decision Support Systems
Does deterrence work in reducing information security policy abuse by employees?
Communications of the ACM
Metrics of password management policy
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Using time-driven activity-based costing to manage digital forensic readiness in large organisations
Information Systems Frontiers
Why computer talents become computer hackers
Communications of the ACM
Investing in IT Security: How to Determine the Maximum Threshold
International Journal of Information Security and Privacy
Knowing the Enemy at the Gates: Measuring Attacker Motivation
International Journal of Interdisciplinary Telecommunications and Networking
Hi-index | 0.03 |
Quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs.