Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Investing in Cybersecurity: Insights from the Gordon-Loeb Model"
written by Lawrence A. Gordon, Martin P. Loeb, Lei Zhou,
published by Journal of Information Security, Vol.7 No.2, 2016
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] The best laid plans or lack thereof: Security decision-making of different stakeholder groups
2021
[2] The Benefits and Costs of Cybersecurity Risk Reduction: A Dynamic Extension of the Gordon and Loeb Model
2021
[3] The Adoption of Cybersecurity in Small-to Medium-Sized Businesses: A Correlation Study
2021
[4] Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation
2021
[5] Optimum Spending on Cybersecurity Measures: Part II
2021
[6] Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm
2021
[7] CYBERSECURITY COST EFFECTS ON THE UNITED STATES MARINE CORPS'BUYING POWER
2021
[8] Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm. Risks 9: 24
2021
[9] Optimal Spending on Cybersecurity Measures: Risk Management
2021
[10] Исследование динамики структуры олигополистических рынков при нерыночных противодействиях сторон
2021
[11] Application of a risk-based approach using reflexive risk models in building information security systems
2020
[12] THREE ARTICLES ON THE ECONOMICS OF INFORMATION-SYSTEMS DEFENSE CAPABILITY. Material-, Human-, and Knowledge-Resources Acquisition for …
2020
[13] Security Architecture Components Cybersecurity Specialists Need to Establish a Limited-Budget Cybersecurity Program: A Qualitative Study
2020
[14] Information Segmentation and Investing in Cybersecurity
2020
[15] Security risk and response analysis of typical application architecture of information and communication blockchain
2020
[16] Strategies to Reduce Small Business Data Security Breaches
2020
[17] Contagion Risks and Security Investment in Directed Networks
2020
[18] Optimum spending on cybersecurity measures
2020
[19] Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
2020
[20] Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
2020
[21] THREE ARTICLES ON THE ECONOMICS OF INFORMATION-SYSTEMS DEFENSE CAPABILITY
2020
[22] Laplacian Spectra of Graphs and Cyber-Insurance Protection
2020
[23] Моделирование развития олигополистических рынков при наличии киберугроз
2020
[24] Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model
2020
[25] Blockchain technology in the future of business cyber security and accounting
2020
[26] Knowledge absorption for cyber-security: The role of human beliefs
2020
[27] A Social Economic Analysis of the Impact of GDPR on Security and Privacy Practices
2019
[28] Модель фінансування засобів кібербезпеки SMART CITY з процедурою отримання додаткових даних стороною захисту
Ukrainian Scientific Journal of Information Security, 2019
[29] 사용자 인증기술의 경제적 선택방안 연구
2019
[30] Development of the model of the antagonistic agents behavior under a cyber conflict
2019
[31] IT-Security in Critical Infrastructures Experiences, Results and Research Directions
2019
[32] A Holistic Approach to Evaluating Cyber Security Defensive Capabilities
2019
[33] Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
2019
[34] Cybersecurity in accounting research
2019
[35] To share or not to share: a behavioral perspective on human participation in security information sharing
2019
[36] Should Cybersecurity be a Human Right: Exploring the Shared Responsibility of Cyber Peace
2019
[37] Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization
2019
[38] Метод розрахунку оптимальності витрат на інформаційну та кібербезпеку
2019
[39] A multicriterial analysis of the efficiency of conservative information security systems
2019
[40] Funding model for port information system cyber security facilities with incomplete hacker information available
2018
[41] A Structural Model Approach for Assessing Information Security Value in Organizations
International Journal of Strategic Decision Sciences (IJSDS), 2018
[42] THE ART AND SCIENCE OF INFORMATION SECURITY INVESTMENTS FOR SMALL ENTERPRISES
2018
[43] Models and Algorithms of Vector Optimization in Selecting Security Measures for Higher Education Institution's Information Learning Environment
Intelligent Systems in Cybernetics and Automation Control Theory, 2018
[44] FUNDING MODEL FOR PORT INFORMATION SYSTEM CYBER SECURITY FACILITIES WITH INCOMPLETE HACKER INFORMATION AVAILABLE.
Journal of Theoretical and Applied Information Technology, 2018
[45] Adaptive Expert Systems Development for Cyber Attacks Recognition in Information Educational Systems on the Basis of Signs' Clustering
Advances in Computer Science for Engineering and Education, 2018
[46] Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms
2018
[47] Передумови для формування безпечного інформаційно-освітнього середовища сучасного університету
2018
[48] Social Media Security Risks and Cyber Threats
2018
[49] Cibersegurança: políticas públicas para uma cultura de cibersegurança nas empresas
2018
[50] Decision support on mutual investment in cybersecurity of the information and educational environment of the university
2018
[51] V. Lakhno
2017
[52] Management of information protection based on the integrated implementation of decision support systems
2017
[53] La Cyber Security: una nuova sfida per le aziende
2017
[54] Менеджмент защиты информации на основе комплексного внедрения систем поддержки решений
2017
[55] Calibration of the Gordon-Loeb Models for the Probability of Security Breaches
19th International Conference on Modelling & Simulation, 2017
[56] Profit-Driven Corporate Social Responsibility as a Bayesian Real Option in Green Computing
Journal of Business Ethics, 2017
[57] Cybersecurity as Social Responsibility: Business, Music, and the Symphony of Cyber Peace
Indiana Law Journal, 2017
[58] Designing a cyber risk assessment tool for small to medium enterprises
2017
[59] A Classification Scheme for Cybersecurity Models
2017
[60] Effective Cyber Security Strategies for Small Businesses
ProQuest Dissertations Publishing, 2017
[61] 불완전 정보 하의 정보보호 투자 모델 및 투자 수준
Journal of the Korea Institute of Information Security & Cryptology, 2017
[62] Information Security Investment Model and Level in Incomplete Information
2017
[63] Should Cybersecurity Be a Human Right? Exploring the 'Shared Responsibility'of Cyber Peace
2017
[64] Mitigating Cybersecurity Risks and Improving Network Security from a Business Perspective
2017
[65] Модель оценки и прогнозирования рисков инвестирования информационной безопасности промышленных предприятий
2016
[66] МОДЕЛЬ ОЦЕНКИ И ПРОГНОЗИРОВАНИ РИСКОВ ИНВЕСТИРОВАНИ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ПРОМЫШЛЕННЫХ ПРЕДПРИ ТИЙ
2016
[67] Varnost informacijskih sistemov
2016
[68] MODEL OF EVALUATION AND PREDICTION OF INVESTMENT RISKS OF INFORMATION SECURITY OF INDUSTRIAL ENTERPRISES
Research result. Information technologies, 2016
Free SCIRP Newsletters
Copyright © 2006-2021 Scientific Research Publishing Inc. All Rights Reserved.
Top