Shopping Cart | Login | Register | Language: English

A Simulation Model of Information Systems Security

Volume 1, Issue 4. Copyright © 2007. 13 pages.
OnDemand Article PDF Download
Download link provided immediately after order completion
$37.50
Available. Instant access upon order completion.
DOI: 10.4018/jisp.2007100104
Sample PDFCite

MLA

Pendegraft, Norman and Mark Rounds. "A Simulation Model of Information Systems Security." IJISP 1.4 (2007): 62-74. Web. 19 Sep. 2014. doi:10.4018/jisp.2007100104

APA

Pendegraft, N., & Rounds, M. (2007). A Simulation Model of Information Systems Security. International Journal of Information Security and Privacy (IJISP), 1(4), 62-74. doi:10.4018/jisp.2007100104

Chicago

Pendegraft, Norman and Mark Rounds. "A Simulation Model of Information Systems Security," International Journal of Information Security and Privacy (IJISP) 1 (2007): 4, accessed (September 19, 2014), doi:10.4018/jisp.2007100104

Export Reference

Mendeley
Favorite
A Simulation Model of Information Systems Security
Access on Platform
Browse by Subject
Top

Abstract

The value of IS security is evaluated by simulating interactions between an information system, its users, and a population of attackers. Results suggest that the marginal value of additional security may be positive or negative as can the time rate of change of system value. This implies that IT security policy makers should be aware of where they are in the state space before setting IT security policy.
Top

Complete Article List

Search this Journal: Reset
Volume 8: 1 Issue (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing