X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cyberinsurance (6) 6
risk management (5) 5
information security (4) 4
computer science, information systems (3) 3
computer science, software engineering (2) 2
computer security (2) 2
cybersecurity (2) 2
investments (2) 2
management (2) 2
risk pooling (2) 2
security (2) 2
acceptability (1) 1
balancing (1) 1
big data (1) 1
business (1) 1
buying (1) 1
computer crime (1) 1
computer industry (1) 1
computer information security (1) 1
computer science, theory & methods (1) 1
cost analysis (1) 1
cyberattacks (1) 1
cybercrime (1) 1
data security (1) 1
drives (1) 1
economic perspectives (1) 1
economics (1) 1
economics of information systems (1) 1
incentives (1) 1
information science & library science (1) 1
information technology (1) 1
insurance (1) 1
insurance markets (1) 1
insurers (1) 1
interdependent risks (1) 1
law (1) 1
managed security service (1) 1
managed security services (1) 1
moral hazard (1) 1
networks (1) 1
organizational form (1) 1
perspective (1) 1
privacy (1) 1
risk (1) 1
risk analysis (1) 1
software-development (1) 1
strategy (1) 1
system (1) 1
tools (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Future Generation Computer Systems, ISSN 0167-739X, 09/2019, Volume 98, pp. 660 - 671
This paper investigates the economic perspective analysis of protecting security and privacy of big data. Traditionally, the pressing cyberthreats appear from... 
Privacy | Economic perspectives | Cybersecurity | Big data | Cost analysis | Cyberinsurance | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
Journal of Management Information Systems, ISSN 0742-1222, 07/2013, Volume 30, Issue 1, pp. 123 - 152
The interdependency of information security risks often induces firms to invest inefficiently in information technology security management. Cyberinsurance has... 
information security | risk management | managed security services | interdependent risks | cyberinsurance | risk pooling | SYSTEM | MANAGEMENT | PERSPECTIVE | COMPUTER SCIENCE, INFORMATION SYSTEMS | INSURERS | SOFTWARE-DEVELOPMENT | ORGANIZATIONAL FORM | MORAL HAZARD | INFORMATION SCIENCE & LIBRARY SCIENCE | ECONOMICS | INSURANCE MARKETS
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 11/2015, Volume 13, Issue 6, pp. 38 - 43
To achieve a proper balance between security investments and acceptable loss, businesses take a mixed approach to risk management. In addition to preventive... 
cybercrime | security | Investments | Information security | Risk management | cyberinsurance | Computer security | Computer crime | cybersecurity | cyberattacks | risk analysis | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | Balancing | Buying | Risk | Strategy | Security | Acceptability
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 05/2007, Volume 5, Issue 3, pp. 50 - 56
Cyberinsurance to cover losses and liabilities from network or information security breaches can provide incentives for security investments that reduce risk.... 
security | Law | Data security | Investments | Information security | Insurance | Drives | Computer industry | Risk management | cyberinsurance | Computer security | Business | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | Networks | Incentives | Tools | Management | Computer information security | Information technology
Journal Article
Proceedings of the 4th annual conference on information security curriculum development, 09/2007, pp. 1 - 4
The design of the Internet contributes to a variety of security vulnerabilities. As every piece of software and hardware has some level of vulnerability to it,... 
cyberinsurance | risk management | Risk management | Cyberinsurance
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.