谷歌浏览器插件
订阅小程序
在清言上使用

Information Security Investment: Expected Utility Approach with Correlated Information Assets

Association for Information Systems(2015)

引用 23|浏览2
暂无评分
摘要
This paper analyzes the information security investment decisions by a firm with two correlated information assets. When information assets are correlated, a firm may face additional losses compared to a loss from a single breach, and the probability of security breach on one set may increase the probability on the other. We model the security investment of a risk-taking firm as well as risk-neutral firm by taking an expected utility approach. We then compare the decisions made by a risk-taking firm to those made by a risk-neutral firm. We will also examine how decision maker allocates funds in protecting two information sets with a limited budget.
更多
查看译文
关键词
Information Security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要