2008
DOI: 10.1016/j.ijinfomgt.2008.02.002
|View full text |Cite
|
Sign up to set email alerts
|

An economic modelling approach to information security risk management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0
1

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 140 publications
(66 citation statements)
references
References 17 publications
(17 reference statements)
0
60
0
1
Order By: Relevance
“…Security risk may exist in the mobile office environment because of technical failures, system vulnerabilities, human failures, fraud, or external events (Bojanc and Jerman-Blažič, 2008). Also, the inherent security risk of a mobile office based on wireless technology, for which the airwaves are open to intruders, threatens users as well (Karygiannis and Owens, 2002).…”
Section: H5d: Time Risk Will Negatively Affect Perceived Value Of Mobmentioning
confidence: 99%
“…Security risk may exist in the mobile office environment because of technical failures, system vulnerabilities, human failures, fraud, or external events (Bojanc and Jerman-Blažič, 2008). Also, the inherent security risk of a mobile office based on wireless technology, for which the airwaves are open to intruders, threatens users as well (Karygiannis and Owens, 2002).…”
Section: H5d: Time Risk Will Negatively Affect Perceived Value Of Mobmentioning
confidence: 99%
“…Since the security of software products is difficult to measure for users, vendors are unable to charge a premium for extra security due to the information asymmetry. Still the market for security products is very prosperous and is growing continuously (Bojanc & Jerman-Blazic, 2008). …”
Section: Literature Overview Of Is Articles Using Lmtmentioning
confidence: 99%
“…Research Topic Unit of analysis Used Theories Afzal et al (2009) Information Product valuation Group of students Bojanc and Jerman-Blazic (2008) ICT security Risk management Organization Brydon and Vining (2006) Knowledge Management Internal market failure Organization Cremonini and Nizovtsev (2009) ICT security Strategic Attackers Security environment Game theory Devos et al (2008) IT outsourcing IS failures SME ((small and mediumsized organizations) (Akerlof, 1970). So reviewing and profiling the existing literature citing this article is likely to be of use to researchers and practitioners.…”
Section: Research Domainmentioning
confidence: 99%
“…Some experts believe that MIS implementation in any kind of business model may create different risk in the system and we need to control the risk to prevent any possible damages. Bojanc and Jerman-Blažič (2008), for instance, presented an economic modelling approach to information security risk management. Nevertheless, any MIS implementation has been accompanied by appropriate action plans (Gottschalk, 1999).…”
Section: Introductionmentioning
confidence: 99%