Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Investing in Cybersecurity: Insights from the Gordon-Loeb Model"
written by Lawrence A. Gordon, Martin P. Loeb, Lei Zhou,
published by Journal of Information Security, Vol.7 No.2, 2016
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Perceived Cyber Security Challenges in Adoption and Diffusion of FinTech Services in India
Handbook of Research on …, 2023
[2] Cybernetic Limits of Artificial Intelligence in Accounting and a Future Research Agenda
Artificial Intelligence in Accounting, 2022
[3] Imposing Security and Privacy in the Healthcare Industry Using Blockchain Technology
Intelligent Interactive Multimedia …, 2022
[4] Um framework para planejamento e gerenciamento de projetos de cibersegurança em pequenas e médias empresas
Revista de Gestão e …, 2022
[5] A False Sense of Security-Organizations Need a Paradigm Shift on Protecting Themselves against APTs
2022
[6] Nudges and cybersecurity: Harnessing choice architecture for safer work-from-home cybersecurity behaviour
2022
[7] Information security economics: cyber security threats
Proceedings of the International Conference on …, 2022
[8] Success factors influencing cyber security risk management implementation: the cases of large Nigerian organisations
2022
[9] Technology, entrepreneurship, innovation and social change in digital economics
Technovation, 2022
[10] Optimizing cybersecurity investments over time
Algorithms, 2022
[11] Sok: Evaluating privacy and security vulnerabilities of patients' data in healthcare
International Workshop on Socio …, 2022
[12] An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks
Information Systems Frontiers, 2022
[13] Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security, 2022
[14] A Tullock-contest-based approach for cyber security investments
Annals of Operations Research, 2022
[15] Prioritizing IT Management Issues and Business Performance
Journal of …, 2022
[16] Cyber Risk Assessment for Capital Management
arXiv preprint arXiv:2205.08435, 2022
[17] Integrating Andragogy Theory into a Multidisciplinary Curriculum to Achieve a Connected Program for a Doctorate in Cybersecurity
2021 IEEE Frontiers in Education …, 2021
[18] Optimal Spending on Cybersecurity Measures: Risk Management
2021
[19] Исследование динамики структуры олигополистических рынков при нерыночных противодействиях сторон
2021
[20] CYBERSECURITY COST EFFECTS ON THE UNITED STATES MARINE CORPS'BUYING POWER
2021
[21] Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm. Risks 9: 24
2021
[22] An Interdisciplinary Study of Cybersecurity Investment in the Nonprofit Sector
American Journal of Management, 2021
[23] The best laid plans or lack thereof: Security decision-making of different stakeholder groups
2021
[24] The Benefits and Costs of Cybersecurity Risk Reduction: A Dynamic Extension of the Gordon and Loeb Model
2021
[25] The Adoption of Cybersecurity in Small-to Medium-Sized Businesses: A Correlation Study
2021
[26] Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation
2021
[27] Optimum Spending on Cybersecurity Measures: Part II
2021
[28] Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm
2021
[29] Cyber-MAR dynamic Awareness Raising–An Integrated Maritime Cyber Risk Management Approach
2021
[30] The Impact of Cybersecurity on Competitive Advantage
2021
[31] Cyber supply chain security: a cost benefit analysis using net present value
Yeboah, R Addo-Quaye… - … on Cyber Security …, 2021
[32] The Role of Data Analytics and Machine Learning in Resurrecting Inductive-Based Accounting Research
2021
[33] Integration of Cybersecurity in BIM-enabled Facilities Management Organisations
2021
[34] Defense Mechanisms with Threat Intelligence Capabilities against Blended Threats
2021
[35] Технико-экономическая целесообразность применения систем диагностического мониторинга высоковольтного оборудования
Библиотечка электротехника, 2020
[36] Исследование влияния киберугроз на структуру олигополистических рынков
Анализ и моделирование экономических и …, 2020
[37] Information Segmentation and Investing in Cybersecurity
2020
[38] Security risk and response analysis of typical application architecture of information and communication blockchain
2020
[39] Strategies to Reduce Small Business Data Security Breaches
2020
[40] Contagion Risks and Security Investment in Directed Networks
2020
[41] Optimum spending on cybersecurity measures
2020
[42] Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
2020
[43] Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
2020
[44] THREE ARTICLES ON THE ECONOMICS OF INFORMATION-SYSTEMS DEFENSE CAPABILITY
2020
[45] Laplacian Spectra of Graphs and Cyber-Insurance Protection
2020
[46] Моделирование развития олигополистических рынков при наличии киберугроз
2020
[47] Application of a risk-based approach using reflexive risk models in building information security systems
2020
[48] THREE ARTICLES ON THE ECONOMICS OF INFORMATION-SYSTEMS DEFENSE CAPABILITY. Material-, Human-, and Knowledge-Resources Acquisition for …
2020
[49] Security Architecture Components Cybersecurity Specialists Need to Establish a Limited-Budget Cybersecurity Program: A Qualitative Study
2020
[50] Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model
2020
[51] Blockchain technology in the future of business cyber security and accounting
2020
[52] Knowledge absorption for cyber-security: The role of human beliefs
2020
[53] A Social Economic Analysis of the Impact of GDPR on Security and Privacy Practices
2019
[54] Модель фінансування засобів кібербезпеки SMART CITY з процедурою отримання додаткових даних стороною захисту
Ukrainian Scientific Journal of Information Security, 2019
[55] 사용자 인증기술의 경제적 선택방안 연구
2019
[56] Development of the model of the antagonistic agents behavior under a cyber conflict
2019
[57] IT-Security in Critical Infrastructures Experiences, Results and Research Directions
2019
[58] A Holistic Approach to Evaluating Cyber Security Defensive Capabilities
2019
[59] Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
2019
[60] Cybersecurity in accounting research
2019
[61] To share or not to share: a behavioral perspective on human participation in security information sharing
2019
[62] Should Cybersecurity be a Human Right: Exploring the Shared Responsibility of Cyber Peace
2019
[63] Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization
2019
[64] Метод розрахунку оптимальності витрат на інформаційну та кібербезпеку
2019
[65] A multicriterial analysis of the efficiency of conservative information security systems
2019
[66] Модель финансирования средств киберзащиты Smart City с процедурой получения дополнительных данных стороной защиты
Безпека …, 2019
[67] Funding model for port information system cyber security facilities with incomplete hacker information available
2018
[68] A Structural Model Approach for Assessing Information Security Value in Organizations
International Journal of Strategic Decision Sciences (IJSDS), 2018
[69] THE ART AND SCIENCE OF INFORMATION SECURITY INVESTMENTS FOR SMALL ENTERPRISES
2018
[70] Models and Algorithms of Vector Optimization in Selecting Security Measures for Higher Education Institution's Information Learning Environment
Intelligent Systems in Cybernetics and Automation Control Theory, 2018
[71] FUNDING MODEL FOR PORT INFORMATION SYSTEM CYBER SECURITY FACILITIES WITH INCOMPLETE HACKER INFORMATION AVAILABLE.
Journal of Theoretical and Applied Information Technology, 2018
[72] Adaptive Expert Systems Development for Cyber Attacks Recognition in Information Educational Systems on the Basis of Signs' Clustering
Advances in Computer Science for Engineering and Education, 2018
[73] Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms
2018
[74] Передумови для формування безпечного інформаційно-освітнього середовища сучасного університету
2018
[75] Social Media Security Risks and Cyber Threats
2018
[76] Cibersegurança: políticas públicas para uma cultura de cibersegurança nas empresas
2018
[77] Decision support on mutual investment in cybersecurity of the information and educational environment of the university
2018
[78] V. Lakhno
2017
[79] Management of information protection based on the integrated implementation of decision support systems
2017
[80] La Cyber Security: una nuova sfida per le aziende
2017
[81] Менеджмент защиты информации на основе комплексного внедрения систем поддержки решений
2017
[82] Calibration of the Gordon-Loeb Models for the Probability of Security Breaches
19th International Conference on Modelling & Simulation, 2017
[83] Profit-Driven Corporate Social Responsibility as a Bayesian Real Option in Green Computing
Journal of Business Ethics, 2017
[84] Cybersecurity as Social Responsibility: Business, Music, and the Symphony of Cyber Peace
Indiana Law Journal, 2017
[85] Designing a cyber risk assessment tool for small to medium enterprises
2017
[86] A Classification Scheme for Cybersecurity Models
2017
[87] Effective Cyber Security Strategies for Small Businesses
ProQuest Dissertations Publishing, 2017
[88] 불완전 정보 하의 정보보호 투자 모델 및 투자 수준
Journal of the Korea Institute of Information Security & Cryptology, 2017
[89] Information Security Investment Model and Level in Incomplete Information
2017
[90] Should Cybersecurity Be a Human Right? Exploring the 'Shared Responsibility'of Cyber Peace
2017
[91] Mitigating Cybersecurity Risks and Improving Network Security from a Business Perspective
2017
[92] A Study on Evaluation Methodology of Cybersecurity Investment
2017
[93] Модель оценки и прогнозирования рисков инвестирования информационной безопасности промышленных предприятий
2016
[94] МОДЕЛЬ ОЦЕНКИ И ПРОГНОЗИРОВАНИ РИСКОВ ИНВЕСТИРОВАНИ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ПРОМЫШЛЕННЫХ ПРЕДПРИ ТИЙ
2016
[95] Varnost informacijskih sistemov
2016
[96] MODEL OF EVALUATION AND PREDICTION OF INVESTMENT RISKS OF INFORMATION SECURITY OF INDUSTRIAL ENTERPRISES
Research result. Information technologies, 2016
[97] ПРЕДПОСЫЛКИ ДЛЯ ФОРМИРОВАНИЯ БЕЗОПАСНОЙ ИНФОРМАЦИОННО-ОБРАЗОВАТЕЛЬНОЙ СРЕДЫ СОВРЕМЕННОГО УНИВЕРСИТЕТА
[98] A Gordon-Loeb-based Visual Tool for Cybersecurity Investments
[99] ОБЗОР И АНАЛИЗ ПРЕДШЕСТВУЮЩИХ ИССЛЕДОВАНИЙ В СФЕРЕ ОБЕСПЕЧЕНИЯ ЗАЩИТЫ ИНФОРМАЦИОННО-ОБРАЗОВАТЕЛЬНОЙ СРЕДЫ …
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top