2019
DOI: 10.1016/j.future.2018.12.033
|View full text |Cite
|
Sign up to set email alerts
|

Framework for Calculating Return on Security Investment (ROSI) for Security-Oriented Organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…By categorizing these contributions based on their approach and shared characteristics, the classification presented in Table 2 was obtained. Optimal investment (Gordon Loeb) /ROI/ROSI Dangerous games: A literature review on cybersecurity investments [10] Cybersecurity investment allocation for a multi-branch firm: Modeling and optimization [11] Enterprise security investment through time when facing different types of vulnerabilities [12] Optimal information security expenditures considering budget constraints [13] Optimal information security investment in a Healthcare Information Exchange: An economic analysis [14] Cyber kpi for return on security investment [15] Framework for calculating return on security investment (ROSI) for security-oriented organizations [16] Towards integrating insurance data into information security investment decision making [17] Managing the investment in information security technology by uses of a quantitative modeling [18] A2: Stakeholders contribution Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem [19] Optimum spending on cybersecurity measures [ A game theory model of cybersecurity investments with information asymmetry [24] Establishing evolutionary game models for CYBer security information EXchange (CYBEX) [25] A6: Resource-based view and organizational learning A multi-Theoretical literature review on information security investments using the resource-based view and the organizational learning theory [26] A7: Security events study Information security breaches and IT security investments: Impacts on competitors [27] A8: Risk Management Risk management, firm reputation, and the impact of successful cyberattacks on target firms [28] Source: Authors' own creation.…”
Section: Review Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…By categorizing these contributions based on their approach and shared characteristics, the classification presented in Table 2 was obtained. Optimal investment (Gordon Loeb) /ROI/ROSI Dangerous games: A literature review on cybersecurity investments [10] Cybersecurity investment allocation for a multi-branch firm: Modeling and optimization [11] Enterprise security investment through time when facing different types of vulnerabilities [12] Optimal information security expenditures considering budget constraints [13] Optimal information security investment in a Healthcare Information Exchange: An economic analysis [14] Cyber kpi for return on security investment [15] Framework for calculating return on security investment (ROSI) for security-oriented organizations [16] Towards integrating insurance data into information security investment decision making [17] Managing the investment in information security technology by uses of a quantitative modeling [18] A2: Stakeholders contribution Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem [19] Optimum spending on cybersecurity measures [ A game theory model of cybersecurity investments with information asymmetry [24] Establishing evolutionary game models for CYBer security information EXchange (CYBEX) [25] A6: Resource-based view and organizational learning A multi-Theoretical literature review on information security investments using the resource-based view and the organizational learning theory [26] A7: Security events study Information security breaches and IT security investments: Impacts on competitors [27] A8: Risk Management Risk management, firm reputation, and the impact of successful cyberattacks on target firms [28] Source: Authors' own creation.…”
Section: Review Resultsmentioning
confidence: 99%
“…Integrating a new model to illustrate the economic effects of implementing an information security framework in a Colombian organization involves extending the current model developed by Min TIC, having into account the economic features proposed by [16] in their six-phase framework for calculating the Return on Security Investment (ROSI) into the MSPI. The MSPI structure is maintained while expanding its applicability range; phases 4 and 5 of the cost-benefit analysis of [21], including specific calculations for the total cost of implementing cybersecurity measures; and the performance evaluation and continuous improvement stages were enhanced with the metrics suggested by [15].…”
Section: Aspects For Model Integrationmentioning
confidence: 99%
“…The ROSI model had been utilised in several literature with various case studies 14,15 . Whilst the model has provisions to calculate the return of security investment, it only provides with the maximum returns based on the ARO.…”
Section: D) Return Of Security Investment (Rosi)mentioning
confidence: 99%
“…This would result in a metric assessing the average improvement in system's security per unit of resource invested in implementing P re(w). Should additional information be available to the modeller, such as expected annual loss incurred by a countermeasure being not implemented in the system, security-oriented variants of the return on investment (ROI) metric, like the ones considered in [9], [31], [43], could also be employed for measuring quality of defenses.…”
Section: B Selection Based On Quality Of Defense Stepsmentioning
confidence: 99%