Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Investing in Cybersecurity: Insights from the Gordon-Loeb Model"
written by Lawrence A. Gordon, Martin P. Loeb, Lei Zhou,
published by Journal of Information Security, Vol.7 No.2, 2016
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making
Security and Privacy, 2024
[2] SoK: Analyzing privacy and security of healthcare data from the user perspective
ACM Transactions on …, 2024
[3] Cybersecurity Risk and Audit Pricing—A Machine Learning-Based Analysis
Journal of Information Systems, 2024
[4] Measuring the performance of investments in information security startups: An empirical analysis by cybersecurity sectors using Crunchbase data
arXiv preprint arXiv …, 2024
[5] Effective Utilization of Government-Provided CTI by Small Businesses within the Defense Industrial Base
Journal of Information …, 2024
[6] Security Economics Knowledge Guide Issue 1.0. 0
2024
[7] The Economics of Information Security: Investment, Insurance and Evaluation
2024
[8] Teacher, enforcer, soothsayer, scapegoat: the purpose of the CISO in commercial organisations
2023
[9] A System for Cost-Efficient Cybersecurity Planning, Compliance, and Investment Prioritization
2023
[10] Cybersecurity Strategy, Formulation, Management, and Sustainability Issues in Digital Transformation and Sustainability
… and Creativity in the Service Sector, 2023
[11] SECAdvisor: a Tool for Cybersecurity Planning using Economic Models
arXiv preprint arXiv …, 2023
[12] Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions
Information Systems Frontiers, 2023
[13] Cybertea: a technical and economic approach for cybersecurity planning and investment
NOMS 2023-2023 IEEE/IFIP …, 2023
[14] Perceived Cyber Security Challenges in Adoption and Diffusion of FinTech Services in India
Handbook of Research on …, 2023
[15] Information Security Threats in the Internet of Things (IoT): A Case Study of Automatic Number Plate Recognition (ANPR) Cameras
… of Research on Cybersecurity Risk in …, 2023
[16] Quantifying the Impact of Defensive Cybersecurity Effort Against Advanced Persistent Threats For Industrial Control Systems
2023
[17] Analisi degli investimenti in cybersecurity nelle imprese del settore privato italiano= Analysis of cybersecurity investments in Italian private sector firms
2023
[18] ТЕХНОЛОГИИ, ПРЕДПРИНИМАТЕЛЬСТВО, ИННОВАЦИИ И СОЦИАЛЬНЫЕ ИЗМЕНЕНИЯ В ЦИФРОВОЙ ЭКОНОМИКЕ
… учет и экономический анализ: вопросы, проблемы …, 2023
[19] The importance of cyber security education in digitalization and Banking
2022 4th International …, 2022
[20] Leadership Strategies to Reduce Cyberattacks During a Merger
2022
[21] Cybernetic Limits of Artificial Intelligence in Accounting and a Future Research Agenda
Artificial Intelligence in Accounting, 2022
[22] Imposing Security and Privacy in the Healthcare Industry Using Blockchain Technology
Intelligent Interactive Multimedia …, 2022
[23] Um framework para planejamento e gerenciamento de projetos de cibersegurança em pequenas e médias empresas
Revista de Gestão e …, 2022
[24] A False Sense of Security-Organizations Need a Paradigm Shift on Protecting Themselves against APTs
2022
[25] Nudges and cybersecurity: Harnessing choice architecture for safer work-from-home cybersecurity behaviour
2022
[26] Information security economics: cyber security threats
Proceedings of the International Conference on …, 2022
[27] Success factors influencing cyber security risk management implementation: the cases of large Nigerian organisations
2022
[28] A Gordon-Loeb-based Visual Tool for Cybersecurity Investments
Bachelor Thesis, 2022
[29] A framework for the planning and management of cybersecurity projects in small and medium-sized enterprises
Revista de Gestão e …, 2022
[30] Blockchain: Are Managers Linked In?
2022
[31] 10 New Cyber Laws: A Plausible Discussion Regarding the Potential Implications for International Tourists in the Socialist Republic of Vietnam
Tourism Marketing in East and Southeast Asia, 2022
[32] Technology, entrepreneurship, innovation and social change in digital economics
Technovation, 2022
[33] Optimizing cybersecurity investments over time
Algorithms, 2022
[34] Sok: Evaluating privacy and security vulnerabilities of patients' data in healthcare
International Workshop on Socio …, 2022
[35] An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks
Information Systems Frontiers, 2022
[36] Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security, 2022
[37] A Tullock-contest-based approach for cyber security investments
Annals of Operations Research, 2022
[38] Prioritizing IT Management Issues and Business Performance
Journal of …, 2022
[39] Cyber Risk Assessment for Capital Management
arXiv preprint arXiv:2205.08435, 2022
[40] Integrating Andragogy Theory into a Multidisciplinary Curriculum to Achieve a Connected Program for a Doctorate in Cybersecurity
2021 IEEE Frontiers in Education …, 2021
[41] Optimal Spending on Cybersecurity Measures: Risk Management
2021
[42] Исследование динамики структуры олигополистических рынков при нерыночных противодействиях сторон
2021
[43] CYBERSECURITY COST EFFECTS ON THE UNITED STATES MARINE CORPS'BUYING POWER
2021
[44] Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm. Risks 9: 24
2021
[45] An Interdisciplinary Study of Cybersecurity Investment in the Nonprofit Sector
American Journal of Management, 2021
[46] The best laid plans or lack thereof: Security decision-making of different stakeholder groups
2021
[47] The Benefits and Costs of Cybersecurity Risk Reduction: A Dynamic Extension of the Gordon and Loeb Model
2021
[48] The Adoption of Cybersecurity in Small-to Medium-Sized Businesses: A Correlation Study
2021
[49] Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation
2021
[50] Optimum Spending on Cybersecurity Measures: Part II
2021
[51] Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm
2021
[52] Should cybersecurity be a human right?*: Exploring the “shared responsibility” of cyber peace
Music, Business and Peacebuilding, 2021
[53] Cyber-MAR dynamic Awareness Raising–An Integrated Maritime Cyber Risk Management Approach
2021
[54] The Impact of Cybersecurity on Competitive Advantage
2021
[55] Cyber supply chain security: a cost benefit analysis using net present value
Yeboah, R Addo-Quaye… - … on Cyber Security …, 2021
[56] The Role of Data Analytics and Machine Learning in Resurrecting Inductive-Based Accounting Research
2021
[57] Integration of Cybersecurity in BIM-enabled Facilities Management Organisations
2021
[58] Defense Mechanisms with Threat Intelligence Capabilities against Blended Threats
2021
[59] Технико-экономическая целесообразность применения систем диагностического мониторинга высоковольтного оборудования
Библиотечка электротехника, 2020
[60] Исследование влияния киберугроз на структуру олигополистических рынков
Анализ и моделирование экономических и …, 2020
[61] Information Segmentation and Investing in Cybersecurity
2020
[62] Security risk and response analysis of typical application architecture of information and communication blockchain
2020
[63] Strategies to Reduce Small Business Data Security Breaches
2020
[64] Contagion Risks and Security Investment in Directed Networks
2020
[65] Optimum spending on cybersecurity measures
2020
[66] Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
2020
[67] Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
2020
[68] THREE ARTICLES ON THE ECONOMICS OF INFORMATION-SYSTEMS DEFENSE CAPABILITY
2020
[69] Laplacian Spectra of Graphs and Cyber-Insurance Protection
2020
[70] Моделирование развития олигополистических рынков при наличии киберугроз
2020
[71] Application of a risk-based approach using reflexive risk models in building information security systems
2020
[72] THREE ARTICLES ON THE ECONOMICS OF INFORMATION-SYSTEMS DEFENSE CAPABILITY. Material-, Human-, and Knowledge-Resources Acquisition for …
2020
[73] Security Architecture Components Cybersecurity Specialists Need to Establish a Limited-Budget Cybersecurity Program: A Qualitative Study
2020
[74] Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model
2020
[75] Blockchain technology in the future of business cyber security and accounting
2020
[76] Knowledge absorption for cyber-security: The role of human beliefs
2020
[77] A Social Economic Analysis of the Impact of GDPR on Security and Privacy Practices
2019
[78] Модель фінансування засобів кібербезпеки SMART CITY з процедурою отримання додаткових даних стороною захисту
Ukrainian Scientific Journal of Information Security, 2019
[79] 사용자 인증기술의 경제적 선택방안 연구
2019
[80] Development of the model of the antagonistic agents behavior under a cyber conflict
2019
[81] IT-Security in Critical Infrastructures Experiences, Results and Research Directions
2019
[82] A Holistic Approach to Evaluating Cyber Security Defensive Capabilities
2019
[83] Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
2019
[84] Cybersecurity in accounting research
2019
[85] To share or not to share: a behavioral perspective on human participation in security information sharing
2019
[86] Should Cybersecurity be a Human Right: Exploring the Shared Responsibility of Cyber Peace
2019
[87] Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization
2019
[88] Метод розрахунку оптимальності витрат на інформаційну та кібербезпеку
2019
[89] A multicriterial analysis of the efficiency of conservative information security systems
2019
[90] ОБЗОР И АНАЛИЗ ПРЕДШЕСТВУЮЩИХ ИССЛЕДОВАНИЙ В СФЕРЕ ОБЕСПЕЧЕНИЯ ЗАЩИТЫ ИНФОРМАЦИОННО-ОБРАЗОВАТЕЛЬНОЙ СРЕДЫ УНИВЕРСИТЕТОВ
2019
[91] Модель финансирования средств киберзащиты Smart City с процедурой получения дополнительных данных стороной защиты
Безпека …, 2019
[92] Model for a computer decision support system on mutual investment in the cybersecurity of educational institutions
International Journal of …, 2018
[93] ПРЕДПОСЫЛКИ ДЛЯ ФОРМИРОВАНИЯ БЕЗОПАСНОЙ ИНФОРМАЦИОННО-ОБРАЗОВАТЕЛЬНОЙ СРЕДЫ СОВРЕМЕННОГО УНИВЕРСИТЕТА
ЗАХИСТ ?НФОРМАЦ??, 2018
[94] Funding model for port information system cyber security facilities with incomplete hacker information available
2018
[95] A Structural Model Approach for Assessing Information Security Value in Organizations
International Journal of Strategic Decision Sciences (IJSDS), 2018
[96] THE ART AND SCIENCE OF INFORMATION SECURITY INVESTMENTS FOR SMALL ENTERPRISES
2018
[97] Models and Algorithms of Vector Optimization in Selecting Security Measures for Higher Education Institution's Information Learning Environment
Intelligent Systems in Cybernetics and Automation Control Theory, 2018
[98] FUNDING MODEL FOR PORT INFORMATION SYSTEM CYBER SECURITY FACILITIES WITH INCOMPLETE HACKER INFORMATION AVAILABLE.
Journal of Theoretical and Applied Information Technology, 2018
[99] Adaptive Expert Systems Development for Cyber Attacks Recognition in Information Educational Systems on the Basis of Signs' Clustering
Advances in Computer Science for Engineering and Education, 2018
[100] Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms
2018
[101] Передумови для формування безпечного інформаційно-освітнього середовища сучасного університету
2018
[102] Social Media Security Risks and Cyber Threats
2018
[103] Cibersegurança: políticas públicas para uma cultura de cibersegurança nas empresas
2018
[104] Decision support on mutual investment in cybersecurity of the information and educational environment of the university
2018
[105] V. Lakhno
2017
[106] Management of information protection based on the integrated implementation of decision support systems
2017
[107] La Cyber Security: una nuova sfida per le aziende
2017
[108] Менеджмент защиты информации на основе комплексного внедрения систем поддержки решений
2017
[109] Calibration of the Gordon-Loeb Models for the Probability of Security Breaches
19th International Conference on Modelling & Simulation, 2017
[110] Profit-Driven Corporate Social Responsibility as a Bayesian Real Option in Green Computing
Journal of Business Ethics, 2017
[111] Cybersecurity as Social Responsibility: Business, Music, and the Symphony of Cyber Peace
Indiana Law Journal, 2017
[112] Designing a cyber risk assessment tool for small to medium enterprises
2017
[113] A Classification Scheme for Cybersecurity Models
2017
[114] Effective Cyber Security Strategies for Small Businesses
ProQuest Dissertations Publishing, 2017
[115] 불완전 정보 하의 정보보호 투자 모델 및 투자 수준
Journal of the Korea Institute of Information Security & Cryptology, 2017
[116] Information Security Investment Model and Level in Incomplete Information
2017
[117] Should Cybersecurity Be a Human Right? Exploring the 'Shared Responsibility'of Cyber Peace
2017
[118] Mitigating Cybersecurity Risks and Improving Network Security from a Business Perspective
2017
[119] A Study on Evaluation Methodology of Cybersecurity Investment
2017
[120] Козунова СС ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ПРОМЫШЛЕННЫХ _ П Р Е Д П Р И Я Т И Й _ _
Информационные технологии, 2016
[121] Модель оценки и прогнозирования рисков инвестирования информационной безопасности промышленных предприятий
2016
[122] МОДЕЛЬ ОЦЕНКИ И ПРОГНОЗИРОВАНИ РИСКОВ ИНВЕСТИРОВАНИ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ПРОМЫШЛЕННЫХ ПРЕДПРИ ТИЙ
2016
[123] Varnost informacijskih sistemov
2016
[124] MODEL OF EVALUATION AND PREDICTION OF INVESTMENT RISKS OF INFORMATION SECURITY OF INDUSTRIAL ENTERPRISES
Research result. Information technologies, 2016
[125] SECAdvisor 2.0: Visualizations and Extensions for Cybersecurity Economics Analysis
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top