Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model"
written by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, Lei Zhou,
published by Journal of Information Security, Vol.6 No.1, 2015
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Information sharing and security investment for substitutable firms: A game-theoretic analysis
Journal of the Operational …, 2024
[2] Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data
arXiv preprint arXiv …, 2024
[3] More than malware: unmasking the hidden risk of cybersecurity regulations
International Cybersecurity Law Review, 2024
[4] The Economics of Information Security: Investment, Insurance and Evaluation
2024
[5] Approach To Risk Management Based On The Assessment Of The Cost Of Quality Of Implementation Of Cybersecurity Measures Of The Organization
… 35th Conference of …, 2024
[6] Cyberdefense: The Next Generation
2023
[7] Examining the concepts of privacy and information security in Emirati society: A survey
Journal of Namibian …, 2023
[8] Quantifying the Impact of Defensive Cybersecurity Effort Against Advanced Persistent Threats For Industrial Control Systems
2023
[9] Individual Career Versus Corporate Security: A Simulation of CSO Investment Choices
Cyberdefense: The Next …, 2023
[10] Privacy and Digital Mosaics: Lessons from Pollution Control
Journal of Business and Economic …, 2023
[11] A System for Cost-Efficient Cybersecurity Planning, Compliance, and Investment Prioritization
2023
[12] Defining" Reasonable" Cybersecurity: Lessons from the States
Yale JL & Tech., 2023
[13] Cybertea: a technical and economic approach for cybersecurity planning and investment
NOMS 2023-2023 IEEE/IFIP …, 2023
[14] SECAdvisor: a Tool for Cybersecurity Planning using Economic Models
arXiv preprint arXiv …, 2023
[15] The role of internal auditors characteristics in cybersecurity risk assessment in financial-based business organisations: A conceptual review
International Journal of …, 2023
[16] GDPR and Cyber Security for Business Information Systems
2022
[17] A literature review on the role of cybersecurity in changing management accounting, auditing and governance.
2022
[18] Cybernetic Limits of Artificial Intelligence in Accounting and a Future Research Agenda
Artificial Intelligence in Accounting, 2022
[19] An Integrated Model for Fraud Prevention Management in E-Retail: A Case for a Big Data-Enabled Approach
2022
[20] Dangerous games: A literature review on cybersecurity investments
Journal of Economic Surveys, 2022
[21] Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security, 2022
[22] Cybersecurity For Defense Economists
Defence and Peace Economics, 2022
[23] Unravelling the dynamic complexity of cyber-security: Towards identifying core systemic structures driving cyber-security investment decision-making
2022
[24] A study of detection of abnormal network traffic: A comparison of multiple algorithms
Security and Privacy, 2022
[25] A proposed Framework for Studying the Impact of Cybersecurity on Accounting Information to Increase Trust in The Financial Reports in the Context of Industry 4.0: An …
التجارة والتمويل, 2022
[26] Making Markets for Information Security: The Role of Online Platforms in Bug Bounty Programs
arXiv preprint arXiv:2204.06905, 2022
[27] The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
Journal of Information Security, 2022
[28] Cybersecurity Leadership from a Telemedicine/Telehealth Knowledge and Organizational Development Examination
2022
[29] Impact of Internal Control, Cybersecurity Risk, and Competitive Advantage on Retail Cybersecurity Budget
2022
[30] Web security assessment and strategy optimization based on attack-defense game
2022
[31] Defining
… : Lessons from the Public …, 2021
[32] An Interdisciplinary Study of Cybersecurity Investment in the Nonprofit Sector
American Journal of Management, 2021
[33] Pricing Cyber Security Insurance
Journal of Mathematical …, 2021
[34] Cybersecurity Aspects of Location-Based Services (LBS) in 5G Networks
2021 IEEE 21st …, 2021
[35] Understanding incentives for cybersecurity investments: Development and application of a typology
Digital Business, 2021
[36] Systematically Understanding Cybersecurity Economics: A Survey
Sustainability, 2021
[37] Cybersecurity, Personal Data Protection and Crime Prevention from an Italian Perspective
2021
[38] The best laid plans or lack thereof: Security decision-making of different stakeholder groups
2021
[39] The Benefits and Costs of Cybersecurity Risk Reduction: A Dynamic Extension of the Gordon and Loeb Model
2021
[40] Cyber-Security: Dos Attack Outcomes are Dangerous
2021
[41] Introducing the concept of cybersecurity footprint
2021
[42] Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem
2021
[43] Information Security Protection of Power System Computer Network
2021
[44] Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures
2021
[45] Business Strategies to Improve Internal and External Data Security Risks
2021
[46] Shared Wireless Infrastructures in Large Public Venues: Case Studies on Preventing Data Breaches
2021
[47] Three essays on the economics of cybersecurity
2021
[48] Інвестиційна пріоритетність галузей економіки
2021
[49] DEFINING “REASONABLE” CYBERSECURITY: LESSONS FROM THE STATES
Available at SSRN 3919275, 2021
[50] Three Essays on Cyber Risk Management
2021
[51] Identifying Challenges in Cybersecurity Incident Response: a Generic Qualitative Inquiry
2021
[52] Hezah! Ransomware: Externalities, Cost Internalization, and Security Investment Intentionality
2021
[53] МНОГОКРИТЕРИАЛЬНАЯ ОПТИМИЗАЦИОННАЯ ЗАДАЧА ПОИСКА ОПТИМАЛЬНЫХ СТРАТЕГИЙ ФИНАНСИРОВАНИЯ СРЕДСТВ ЗАЩИТЫ ИНФОРМАЦИИ …
… и коммуникаций им. М …, 2020
[54] Analysis of Models for Selection of Investment Strategies
2020
[55] Information Segmentation and Investing in Cybersecurity
2020
[56] Knowledge absorption for cyber-security: The role of human beliefs
2020
[57] Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
2020
[58] Information security in healthcare supply chains: an analysis of critical information protection practices
2020
[59] The role of leadership in cybersecurity culture within the South African financial services
Electronic Theses and Dissertations (ETD), 2020
[60] Usage of Mathematical Models for Cybersecurity Analysis
2020
[61] Cybersecurity Risk-Responsibility Taxonomy: The Role of Cybersecurity Social Responsibility in Small Enterprises on Risk of Data Breach
2020
[62] Segurança da informação nas cadeias de suprimentos de saúde: uma análise das práticas críticas de proteção de informações
2020
[63] Investigating the impact of IT security investments on competitor's market value: Evidence from Korea stock market
Asia Pacific Journal of Information …, 2020
[64] Networks of Critical Infrastructures: Cost Estimation and Defense of Attacks
2020
[65] Insurability of Critical Infrastructures
2020
[66] ANALYSIS OF MATHEMATICAL MODELS OF INVESTMENT STRATEGIES IN THE UNIVERSITY ON CYBER SECURITY SYSTEMS
2020
[67] Seeking Ethical use of AI Algorithms: Challenges and Mitigations
2020
[68] Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration.
2020
[69] Cyber-Attacks From the Political Economy Perspective and Turkey
2020
[70] Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
2020
[71] A Visual Tool for the Analysis of Cybersecurity Investments
2020
[72] On the Extraction of Cyber Risks using Structured Products
2019
[73] Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
2019
[74] Analysis of Energy Delivery Sector Malware Attack Response Mechanisms
2019
[75] A Cybersecurity Dataset Derived from the National Collegiate Penetration Testing Competition
2019
[76] Hybrid and cybersecurity threats and the European Union's financial system
Policy Contribution, 2019
[77] Cybersecurity in accounting research
2019
[78] SUPPLEMENTING ISRM MODELS BY KRI IMPLEMENTATION
2019
[79] Hybrid and cybersecurity threats and the European Union's financial system. Policy Contribution Issue n˚ 10| September 2019. Bruegel
2019
[80] A Holistic Approach to Evaluating Cyber Security Defensive Capabilities
2019
[81] Economic perspective analysis of protecting big data security and privacy
2019
[82] Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets
2019
[83] To share or not to share: a behavioral perspective on human participation in security information sharing
2019
[84] The Game-Theoretic and Model-Based Method for Analysis of Power System Cyber-Physical Security
2019
[85] Cybersecurity Information Sharing Ecosystems: From the Perspective of Value Creation and Security Investments
2019
[86] Research on the game of information security investment based on the Gordon-Loeb model
2018
[87] An Empirical Study of Relationship between Information Security Investment and Information Security Incidents: A Focus on Information Security Training …
Journal of the Korea Institute of …, 2018
[88] 정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석: 정보보안 교육 서비스 투자를 중심으로: 정보보안 교육 서비스 투자를 중심으로
정보보호학회논문지, 2018
[89] An Empirical Study of Relationship between Information Security Investment and Information Security Incidents: A Focus on Information Security Training, Awareness …
2018
[90] 정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석: 정보보안 교육 서비스 투자를 중심으로
2018
[91] МОДЕЛЬ СТРАТЕГІЙ ІНВЕСТУВАННЯ В СИСТЕМИ КІБЕРБЕЗПЕКИ СИТУАЦІЙНИХ ЦЕНТРІВ ТРАНСПОРТУ
2018
[92] 정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석
Journal of the Korea Institute of Information Security & Cryptology, 2018
[93] Trade secrets and cyber security breaches
Journal of Accounting and Public Policy, 2018
[94] THE ART AND SCIENCE OF INFORMATION SECURITY INVESTMENTS FOR SMALL ENTERPRISES
2018
[95] Towards a Development of Cybersecurity Risk-Responsibility Taxonomy of Small Enterprises for Data Breach Risk Mitigation
2018
[96] MODEL OF INVESTMENT STRATEGIES IN CYBER SECURITY SYSTEMS OF TRANSPORT SITUATIONAL CENTERS
2018
[97] ARCADES: analysis of risk from cyberattack against defensive strategies for the power grid
2018
[98] Governance Models Preferences for Security Information Sharing: An Institutional Economics Perspective for Critical Infrastructure Protection
2018
[99] Strategy Formulation through Identification Of Asset Management Problem Of The Gorontalo City Government
IOSR Journal Of Humanities And Social Science, 2018
[100] ARCADES: Analysis of Risk from Cyber Attack against DEfensive Strategies for power grid
2018
[101] Motivating Cybersecurity Compliance in Critical Infrastructure Industries: A Grounded Theory Study
ProQuest Dissertations Publishing, 2018
[102] Incentives for Human Agents to Share Security Information: a Model and an Empirical Test
2018
[103] 基于 Gordon-Loeb 模型的信息安全投资博弈研究
2018
[104] 불완전 정보 하의 정보보호 투자 모델 및 투자 수준
Journal of the Korea Institute of Information Security & Cryptology, 2017
[105] Estimation of externalities in interdependent security: A case study of large systems
2017
[106] Internalization of Externalities in Interdependent Security: Large Network Cases
2017
[107] Challenges of Public-Private Partnerships in Cybersecurity
ProQuest Dissertations Publishing, 2017
[108] Calibration of the Gordon-Loeb Models for the Probability of Security Breaches
UKSim-AMSS 19th International Conference on Modelling & Simulation, 2017
[109] Effects of Data Breaches on Sector-Wide Systematic Risk in Financial, Technology, Healthcare and Services Sectors
ProQuest Dissertations Publishing, 2017
[110] Knowledge Set of Attack Surface and Cybersecurity Rating for Firms in a Supply Chain
SSRN, 2017
[111] Cybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management
2017
[112] La Cyber Security: una nuova sfida per le aziende
2017
[113] A Survey Of New Development In Cyber Security And Networks
Journal of Multidisciplinary Engineering Science and Technology, 2017
[114] Longitudinal analysis of information security incident spillover effects
2017
[115] Information Security Investment Model and Level in Incomplete Information
2017
[116] Cybersecurity investment guidance: Extensions of the Gordon and Loeb model
2016
[117] МЕТОД УПРАЛІННЯ ЗАГАЛЬНИМ СТАНОМ ЗАХИЩЕНОСТІ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ КОМПАНІЇ ЗА ДОПОМОГОЮ АНАЛІЗУ ПРИЧИННО …
2016
[118] Integrating Cyber Losses into the Standard Microeconomics of the Consumer and Firm: Defining Losses in the Gordon and Loeb Model
2016
[119] Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection
Critical Information Infrastructures Security, 2016
[120] Метод упраління загальним станом захищеності інформаційної безпеки компанії за допомогою аналізу причинно-наслідкових взаємозв'язків за методом …
2016
[121] МЕТОД УПРАЛІННЯ ЗАГАЛЬНИМ СТАНОМ ЗАХИЩЕНОСТІ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ КОМПАНІЇ ЗА ДОПОМОГОЮ АНАЛІЗУ ПРИЧИННОНАСЛІДКОВИХ ВЗАЄМОЗВ'ЯЗКІВ ЗА МЕТОДОМ ІСІКАВИ
ЕКОНОМІЧНА НАУКА, 2016
[122] ИНФОРМАЦИОННЫЕ РИСКИ: МОДЕЛИ РИСКОВ, ИССЛЕДОВАНИЕ И ИСПОЛЬЗОВАНИЕ
ЕКОНОМІЧНА НАУКА, 2016
[123] Cybersecurity: Integrating Information into the Microeconomics of the Consumer and the Firm
2016
[124] HACKING INDUCED EXTERNALITIES AND THE APATHY OF STOCKHOLDERS
2016
[125] Examining Data Privacy Breaches in Healthcare
Walden Dissertations and Doctoral Studies, 2016
[126] Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities
2016
[127] Segurança da informação na cadeia de suprimentos da saúde: uma análise das práticas de proteção de informações críticas
2016
[128] Security countermeasures in the cyber-world
2016
[129] Multifirm Models of Cybersecurity Investment Competition vs. Cooperation and Network Vulnerability
European Journal of Operational Research, 2016
[130] A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
2015
[131] Increasing cybersecurity investments in private sector firms
Journal of Cybersecurity, 2015
[132] Investing in Cybersecurity
2015
[133] Cybersecurity Investment Guidance: A Note on Extensions of the Gordon and Leob model
2015
[134] Применение экономико-стоимостных моделей информационных рисков для оценивания предельных объемов инвестиций в безопасность информации
Захист інформації, 2015
[135] ЗАСТОСУВАННЯ ЕКОНОМІКО-ВАРТІСНИХ МОДЕЛЕЙ ІНФОРМАЦІЙНИХ РИЗИКІВ ДЛЯ ОЦІНЮВАННЯ ГРАНИЧНОГО ОБСЯГУ ІНВЕСТИЦІЙ В БЕЗПЕКУ ІНФОРМАЦІЇ
Захист інформації, 2015
[136] Information Security in the Cloud: Should We be Using a Different Approach?
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015
[137] ОСОБЛИВОСТІ ВИЗНАЧЕННЯ ОБСЯГУ ІНВЕСТИЦІЙ В СИСТЕМУ ЗАХИСТУ ІНФОРМАЦІЙНИХ РЕСУРСІВ
2015
[138] Аналіз та оптимізація функцій і завдань центральних органів виконавчої влади із управління водними ресурсами в Україні
2015
[139] ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ КОМПАНИИ НА ОСНОВЕ МЕТОДА АНАЛИЗА ПРИЧИННО-СЛЕДСТВЕННЫХ ВЗАИМОСВЯЗЕЙ
2015
[140] Ризиковий підхід до визначення граничного обсягу інвестицій у захист інформації
2015
[141] APPLICATION OF ECONOMIC-COST MODEL OF INFORMATION RISKS FOR EVALUATION LIMITЕВ VOLUME OF INVESTMENT IN INFORMATION SECURITY
ЗАХИСТ ?НФОРМАЦ??, 2015
[142] Investeren in Cybersecurity
2015
[143] Применение экономико-стоимостных моделей информационных рисков для оценивания предельных объемов инвестиций в безопасность …
Захист інформації, 2015
[144] SECAdvisor 2.0: Visualizations and Extensions for Cybersecurity Economics Analysis
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top