Air Force Cyberspace Investment Analysis
Author
Abstract
Suggested Citation
DOI: 10.1287/deca.2014.0311
Download full text from publisher
References listed on IDEAS
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Gerald G. Brown & Robert F. Dell & Heath Holtz & Alexandra M. Newman, 2003. "How US Air Force Space Command Optimizes Long-Term Investment in Space Systems," Interfaces, INFORMS, vol. 33(4), pages 1-14, August.
- Roger Chapman Burk & Gregory S. Parnell, 2011. "Portfolio Decision Analysis: Lessons from Military Applications," International Series in Operations Research & Management Science, in: Ahti Salo & Jeffrey Keisler & Alec Morton (ed.), Portfolio Decision Analysis, chapter 0, pages 333-357, Springer.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- M.‐Elisabeth Paté‐Cornell & Marshall Kuypers & Matthew Smith & Philip Keller, 2018. "Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 226-241, February.
- Theodore T. Allen & Zhenhuan Sui & Nathan L. Parker, 2017. "Timely Decision Analysis Enabled by Efficient Social Media Modeling," Decision Analysis, INFORMS, vol. 14(4), pages 250-260, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Kangaspunta, Jussi & Liesiö, Juuso & Salo, Ahti, 2012. "Cost-efficiency analysis of weapon system portfolios," European Journal of Operational Research, Elsevier, vol. 223(1), pages 264-275.
- ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
- A. Elfes & C. R. Weisbin & R. Manvi & V. Adumitroaie & W. P. Lincoln & K. Shelton, 2006. "Extending the START framework: Computation of optimal capability development portfolios using a decision theory approach," Systems Engineering, John Wiley & Sons, vol. 9(4), pages 331-357, December.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
- Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
- Kurth, Margaret & Keisler, Jeffrey M. & Bates, Matthew E. & Bridges, Todd S. & Summers, Jeffrey & Linkov, Igor, 2017. "A portfolio decision analysis approach to support energy research and development resource allocation," Energy Policy, Elsevier, vol. 105(C), pages 128-135.
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Bin Srinidhi & Jia Yan & Giri Kumar Tayi, 2008. "Firm-level Resource Allocation to Information Security in the Presence of Financial Distress," Working Papers 2008-17, School of Economic Sciences, Washington State University.
- Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
- Luca Allodi & Fabio Massacci, 2017. "Security Events and Vulnerability Data for Cybersecurity Risk Estimation," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1606-1627, August.
- Debabrata Dey & Abhijeet Ghoshal & Atanu Lahiri, 2022. "Circumventing Circumvention: An Economic Analysis of the Role of Education and Enforcement," Management Science, INFORMS, vol. 68(4), pages 2914-2931, April.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Carol Hsu & Jae-Nam Lee & Detmar W. Straub, 2012. "Institutional Influences on Information Systems Security Innovations," Information Systems Research, INFORMS, vol. 23(3-part-2), pages 918-939, September.
- Min Chen & Varghese S. Jacob & Suresh Radhakrishnan & Young U. Ryu, 2015. "Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies?," Information Systems Research, INFORMS, vol. 26(4), pages 754-772, December.
- Ahmed Abbasi & David Dobolyi & Anthony Vance & Fatemeh Mariam Zahedi, 2021. "The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites," Information Systems Research, INFORMS, vol. 32(2), pages 410-436, June.
- Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
- Liesiö, Juuso & Salo, Ahti, 2012. "Scenario-based portfolio selection of investment projects with incomplete probability and utility information," European Journal of Operational Research, Elsevier, vol. 217(1), pages 162-172.
- Young U. Ryu & Hyeun-Suk Rhee, 2008. "Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches," INFORMS Journal on Computing, INFORMS, vol. 20(3), pages 356-367, August.
- Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston, 2014. "An economic mechanism to manage operational security risks for inter-organizational information systems," Information Systems Frontiers, Springer, vol. 16(3), pages 399-416, July.
More about this item
Keywords
decision analysis; probability model; cyberspace; information systems; Air Force; resource allocation;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:12:y:2015:i:2:p:81-95. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.