Scientific Research An Academic Publisher
OPEN ACCESS
Journal of Information Security
Volume 7, Number 2, March 2016 (Special Issue on Cybersecurity Investments)
Cover Page, Table of Contents and Others: PDF (size: 1375KB)
The “Iterated Weakest Link” Model of Adaptive Security Investment ()
Rainer Böhme, Tyler Moore
Journal of Information Security Vol.7 No.2, March 31, 2016
DOI: 10.4236/jis.2016.72006 2,630 Downloads 3,295 Views Citations This article belongs to the Special Issue on
Is Public Co-Ordination of Investment in Information Security Desirable? ()
Christos Ioannidis, David Pym, Julian Williams
Journal of Information Security Vol.7 No.2, March 30, 2016
DOI: 10.4236/jis.2016.72005 2,689 Downloads 3,261 Views Citations This article belongs to the Special Issue on
Investing in Cybersecurity: Insights from the Gordon-Loeb Model ()
Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
Journal of Information Security Vol.7 No.2, March 23, 2016
DOI: 10.4236/jis.2016.72004 4,782 Downloads 7,677 Views Citations This article belongs to the Special Issue on
Empirical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment ()
Shiori Shinoda, Kanta Matsuura
Journal of Information Security Vol.7 No.2, March 17, 2016
DOI: 10.4236/jis.2016.72003 2,067 Downloads 2,719 Views Citations This article belongs to the Special Issue on
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model ()
Scott Farrow, Jules Szanton
Journal of Information Security Vol.7 No.2, March 16, 2016
DOI: 10.4236/jis.2016.72002 2,505 Downloads 3,347 Views Citations This article belongs to the Special Issue on
● Open Special Issues
● Published Special Issues
● Special Issues Guideline