skip to main content
research-article
Free Access

Information security and risk management

Published:01 April 2008Publication History
Skip Abstract Section

Abstract

Use the new PCR risk metric to find ways to enhance security, avoiding one-dimensional metrics like ALE that could risk an organization's survivability.

References

  1. Bodin, L., Gordon, L., and Loeb, M. Evaluating information security investments using the analytic hierarchy. Commun. ACM 48, 2 (Feb. 2005), 461--485. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Gordon, L. and Loeb, M. Budgeting process for information security expenditures: Empirical evidence. Commun. ACM 49, 1 (Jan. 2006), 121--125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Gordon, L. and Loeb, M. Managing Cybersecurity Resources: A Cost-Benefit Analysis. McGraw-Hill, New York, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gordon, L., Loeb, M., and Lucyshyn, W. Sharing information on computer systems: An economic analysis. Journal of Accounting and Public Policy 22, 6 (Nov.-Dec. 2003), 461--485.Google ScholarGoogle Scholar
  5. Gordon, L., Loeb, M., and Sohail, T. A framework for using insurance for cyber risk management. Commun. ACM 46, 3 (Mar. 2003), 81--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gordon, L. and Loeb, M. The economics of investment in information security. ACM Transactions on Information and System Security 5, 4 (Nov. 2002), 438--457. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Gordon, L. and Loeb, M. A framework for using information security as a response to competitor analysis systems. Commun. ACM 44, 9 (Sept. 2001), 70--75. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Saaty, T. The Analytic Hierarchy Process. McGraw-Hill, New York, 1980.Google ScholarGoogle Scholar

Index Terms

  1. Information security and risk management

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 51, Issue 4
              The psychology of security: why do good users make bad decisions?
              April 2008
              94 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/1330311
              Issue’s Table of Contents

              Copyright © 2008 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 April 2008

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format