An Optimization Approach In Information Security Risk Management
Marn-ling Shing,
Chen-chi Shing,
Lee-pin Shing and
Lee-hur Shing
Advances in Management and Applied Economics, 2012, vol. 2, issue 3, 1
Abstract:
In order to protect enterprise networks from unauthorized access and malicious attacks, a few risk models were proposed. This paper proposes to use optimization approach for a business to make decision based on certain budget constraint within a certain years.
Date: 2012
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.scienpress.com/Upload/AMAE%2fVol%202_3_1.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spt:admaec:v:2:y:2012:i:3:f:2_3_1
Access Statistics for this article
More articles in Advances in Management and Applied Economics from SCIENPRESS Ltd
Bibliographic data for series maintained by Eleftherios Spyromitros-Xioufis ().