Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model"
written by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, Lei Zhou,
published by Journal of Information Security, Vol.6 No.1, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Cybersecurity, Personal Data Protection and Crime Prevention from an Italian Perspective
2021
[2] The best laid plans or lack thereof: Security decision-making of different stakeholder groups
2021
[3] The Benefits and Costs of Cybersecurity Risk Reduction: A Dynamic Extension of the Gordon and Loeb Model
2021
[4] Cyber-Security: Dos Attack Outcomes are Dangerous
2021
[5] Introducing the concept of cybersecurity footprint
2021
[6] Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem
2021
[7] Information Security Protection of Power System Computer Network
2021
[8] Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures
2021
[9] Business Strategies to Improve Internal and External Data Security Risks
2021
[10] Shared Wireless Infrastructures in Large Public Venues: Case Studies on Preventing Data Breaches
2021
[11] Analysis of Models for Selection of Investment Strategies
2020
[12] Information Segmentation and Investing in Cybersecurity
2020
[13] Knowledge absorption for cyber-security: The role of human beliefs
2020
[14] Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
2020
[15] Information security in healthcare supply chains: an analysis of critical information protection practices
2020
[16] Usage of Mathematical Models for Cybersecurity Analysis
2020
[17] Cybersecurity Risk-Responsibility Taxonomy: The Role of Cybersecurity Social Responsibility in Small Enterprises on Risk of Data Breach
2020
[18] Segurança da informação nas cadeias de suprimentos de saúde: uma análise das práticas críticas de proteção de informações
2020
[19] Networks of Critical Infrastructures: Cost Estimation and Defense of Attacks
2020
[20] Insurability of Critical Infrastructures
2020
[21] ANALYSIS OF MATHEMATICAL MODELS OF INVESTMENT STRATEGIES IN THE UNIVERSITY ON CYBER SECURITY SYSTEMS
2020
[22] Seeking Ethical use of AI Algorithms: Challenges and Mitigations
2020
[23] Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration.
2020
[24] Cyber-Attacks From the Political Economy Perspective and Turkey
2020
[25] Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
2020
[26] A Visual Tool for the Analysis of Cybersecurity Investments
2020
[27] On the Extraction of Cyber Risks using Structured Products
2019
[28] Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
2019
[29] Analysis of Energy Delivery Sector Malware Attack Response Mechanisms
2019
[30] A Cybersecurity Dataset Derived from the National Collegiate Penetration Testing Competition
2019
[31] Hybrid and cybersecurity threats and the European Union's financial system
Policy Contribution, 2019
[32] Cybersecurity in accounting research
2019
[33] SUPPLEMENTING ISRM MODELS BY KRI IMPLEMENTATION
2019
[34] Hybrid and cybersecurity threats and the European Union's financial system. Policy Contribution Issue n˚ 10| September 2019. Bruegel
2019
[35] A Holistic Approach to Evaluating Cyber Security Defensive Capabilities
2019
[36] Economic perspective analysis of protecting big data security and privacy
2019
[37] Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets
2019
[38] To share or not to share: a behavioral perspective on human participation in security information sharing
2019
[39] Cybersecurity Information Sharing Ecosystems: From the Perspective of Value Creation and Security Investments
2019
[40] The Game-Theoretic and Model-Based Method for Analysis of Power System Cyber-Physical Security
2019
[41] Research on the game of information security investment based on the Gordon-Loeb model
2018
[42] An Empirical Study of Relationship between Information Security Investment and Information Security Incidents: A Focus on Information Security Training, Awareness …
2018
[43] 정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석: 정보보안 교육 서비스 투자를 중심으로
2018
[44] МОДЕЛЬ СТРАТЕГІЙ ІНВЕСТУВАННЯ В СИСТЕМИ КІБЕРБЕЗПЕКИ СИТУАЦІЙНИХ ЦЕНТРІВ ТРАНСПОРТУ
2018
[45] 정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석
Journal of the Korea Institute of Information Security & Cryptology, 2018
[46] Trade secrets and cyber security breaches
Journal of Accounting and Public Policy, 2018
[47] THE ART AND SCIENCE OF INFORMATION SECURITY INVESTMENTS FOR SMALL ENTERPRISES
2018
[48] Towards a Development of Cybersecurity Risk-Responsibility Taxonomy of Small Enterprises for Data Breach Risk Mitigation
2018
[49] MODEL OF INVESTMENT STRATEGIES IN CYBER SECURITY SYSTEMS OF TRANSPORT SITUATIONAL CENTERS
2018
[50] ARCADES: analysis of risk from cyberattack against defensive strategies for the power grid
2018
[51] Governance Models Preferences for Security Information Sharing: An Institutional Economics Perspective for Critical Infrastructure Protection
2018
[52] Strategy Formulation through Identification Of Asset Management Problem Of The Gorontalo City Government
IOSR Journal Of Humanities And Social Science, 2018
[53] ARCADES: Analysis of Risk from Cyber Attack against DEfensive Strategies for power grid
2018
[54] Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study
ProQuest Dissertations Publishing, 2018
[55] Incentives for Human Agents to Share Security Information: a Model and an Empirical Test
2018
[56] 基于 Gordon-Loeb 模型的信息安全投资博弈研究
2018
[57] 불완전 정보 하의 정보보호 투자 모델 및 투자 수준
Journal of the Korea Institute of Information Security & Cryptology, 2017
[58] Estimation of externalities in interdependent security: A case study of large systems
2017
[59] Internalization of Externalities in Interdependent Security: Large Network Cases
2017
[60] Challenges of Public-Private Partnerships in Cybersecurity
ProQuest Dissertations Publishing, 2017
[61] Calibration of the Gordon-Loeb Models for the Probability of Security Breaches
UKSim-AMSS 19th International Conference on Modelling & Simulation, 2017
[62] Effects of Data Breaches on Sector-Wide Systematic Risk in Financial, Technology, Healthcare and Services Sectors
ProQuest Dissertations Publishing, 2017
[63] Knowledge Set of Attack Surface and Cybersecurity Rating for Firms in a Supply Chain
SSRN, 2017
[64] Cybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management
2017
[65] La Cyber Security: una nuova sfida per le aziende
2017
[66] A Survey Of New Development In Cyber Security And Networks
Journal of Multidisciplinary Engineering Science and Technology, 2017
[67] Longitudinal analysis of information security incident spillover effects
2017
[68] Information Security Investment Model and Level in Incomplete Information
2017
[69] Cybersecurity investment guidance: Extensions of the Gordon and Loeb model
2016
[70] МЕТОД УПРАЛІННЯ ЗАГАЛЬНИМ СТАНОМ ЗАХИЩЕНОСТІ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ КОМПАНІЇ ЗА ДОПОМОГОЮ АНАЛІЗУ ПРИЧИННО …
2016
[71] Integrating Cyber Losses into the Standard Microeconomics of the Consumer and Firm: Defining Losses in the Gordon and Loeb Model
2016
[72] Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection
Critical Information Infrastructures Security, 2016
[73] Метод упраління загальним станом захищеності інформаційної безпеки компанії за допомогою аналізу причинно-наслідкових взаємозв'язків за методом …
2016
[74] МЕТОД УПРАЛІННЯ ЗАГАЛЬНИМ СТАНОМ ЗАХИЩЕНОСТІ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ КОМПАНІЇ ЗА ДОПОМОГОЮ АНАЛІЗУ ПРИЧИННОНАСЛІДКОВИХ ВЗАЄМОЗВ'ЯЗКІВ ЗА МЕТОДОМ ІСІКАВИ
ЕКОНОМІЧНА НАУКА, 2016
[75] ИНФОРМАЦИОННЫЕ РИСКИ: МОДЕЛИ РИСКОВ, ИССЛЕДОВАНИЕ И ИСПОЛЬЗОВАНИЕ
ЕКОНОМІЧНА НАУКА, 2016
[76] Cybersecurity: Integrating Information into the Microeconomics of the Consumer and the Firm
2016
[77] HACKING INDUCED EXTERNALITIES AND THE APATHY OF STOCKHOLDERS
2016
[78] Examining Data Privacy Breaches in Healthcare
Walden Dissertations and Doctoral Studies, 2016
[79] Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities
2016
[80] Segurança da informação na cadeia de suprimentos da saúde: uma análise das práticas de proteção de informações críticas
2016
[81] Security countermeasures in the cyber-world
2016
[82] Multifirm Models of Cybersecurity Investment Competition vs. Cooperation and Network Vulnerability
European Journal of Operational Research, 2016
[83] A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
2015
[84] Increasing cybersecurity investments in private sector firms
Journal of Cybersecurity, 2015
[85] Investing in Cybersecurity
2015
[86] Cybersecurity Investment Guidance: A Note on Extensions of the Gordon and Leob model
2015
[87] Применение экономико-стоимостных моделей информационных рисков для оценивания предельных объемов инвестиций в безопасность информации
Захист інформації, 2015
[88] ЗАСТОСУВАННЯ ЕКОНОМІКО-ВАРТІСНИХ МОДЕЛЕЙ ІНФОРМАЦІЙНИХ РИЗИКІВ ДЛЯ ОЦІНЮВАННЯ ГРАНИЧНОГО ОБСЯГУ ІНВЕСТИЦІЙ В БЕЗПЕКУ ІНФОРМАЦІЇ
Захист інформації, 2015
[89] Information Security in the Cloud: Should We be Using a Different Approach?
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015
[90] ОСОБЛИВОСТІ ВИЗНАЧЕННЯ ОБСЯГУ ІНВЕСТИЦІЙ В СИСТЕМУ ЗАХИСТУ ІНФОРМАЦІЙНИХ РЕСУРСІВ
2015
[91] Аналіз та оптимізація функцій і завдань центральних органів виконавчої влади із управління водними ресурсами в Україні
2015
[92] ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ КОМПАНИИ НА ОСНОВЕ МЕТОДА АНАЛИЗА ПРИЧИННО-СЛЕДСТВЕННЫХ ВЗАИМОСВЯЗЕЙ
2015
[93] Ризиковий підхід до визначення граничного обсягу інвестицій у захист інформації
2015
[94] Investeren in Cybersecurity
2015
[95] The role of leadership in cybersecurity culture within the South African financial services
Free SCIRP Newsletters
Copyright © 2006-2022 Scientific Research Publishing Inc. All Rights Reserved.
Top