吹牛大王 发表于 2025-3-23 12:43:00

http://reply.papertrans.cn/31/3021/302008/302008_11.png

抵制 发表于 2025-3-23 13:57:54

Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study, variables which could be used to calculate a premium for Cyberinsurance coverages. For this purpose we have conducted semi-structured qualitative interviews with a sample of 36 experts from the DACH region. The gathered statements have been consolidated and further reduced to a subset of indicators

Pelago 发表于 2025-3-23 20:00:51

The Risk of Risk Analysis And its Relation to the Economics of Insider Threats,occurrence. We outline an argument for explaining what originally surprised us: that many practitioners report that their organizations take basic steps to prevent insider attacks, but do not attempt to address more serious attacks. We suggest that an understanding of the true cost of additional pol

Priapism 发表于 2025-3-23 22:29:39

Competition, Speculative Risks, and IT Security Outsourcing,gers are skeptical about outsourcing of IT security, others have cited reasons thatare used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for fir

含沙射影 发表于 2025-3-24 06:23:21

http://reply.papertrans.cn/31/3021/302008/302008_15.png

Neutropenia 发表于 2025-3-24 07:26:43

https://doi.org/10.1007/978-3-8349-6453-3cific telecommunications service. In addition, some data has been collected in order to quantify some of the variables of the model. Finally, some simulations have been performed to have a better knowledge of the risk of suffering this kind of attacks and propose solutions to mitigate it.

appall 发表于 2025-3-24 12:13:56

Sony-Projekt Metreon in San Francisco,mediate investment and lower investment expenditure. The efficiency of vulnerability reduction technology encourages firms to invest earlier and induces cost reduction. To know the form of vulnerability is important because the effect of high vulnerability on timing and amount of the investment expenditure is mixed.

协定 发表于 2025-3-24 18:37:03

Organising for New Product Development, which are available and difficult to manipulate. The reduced set of indicators has been presented again to the 36 experts in order to rank them according to their relative importance. In this paper we describe the results of this exploratory qualitative study and conclude by discussing implications of our findings for both research and practice.

Inflammation 发表于 2025-3-24 22:51:36

Modeling the Economic Incentives of DDoS Attacks: Femtocell Case Study,cific telecommunications service. In addition, some data has been collected in order to quantify some of the variables of the model. Finally, some simulations have been performed to have a better knowledge of the risk of suffering this kind of attacks and propose solutions to mitigate it.

残忍 发表于 2025-3-24 23:20:06

Optimal Timing of Information Security Investment: A Real Options Approach,mediate investment and lower investment expenditure. The efficiency of vulnerability reduction technology encourages firms to invest earlier and induces cost reduction. To know the form of vulnerability is important because the effect of high vulnerability on timing and amount of the investment expenditure is mixed.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Economics of Information Security and Privacy; Tyler Moore,David Pym,Christos Ioannidis Conference proceedings 2010 Springer Science+Busin