Real options models for proactive uncertainty-reducing mitigations and applications in cybersecurity investment decision making

M Benaroch - Information Systems Research, 2018 - pubsonline.informs.org
Managerial flexibility, or real options, embedded in information technology (IT) investments
allows resolving uncertainty not only by passively waiting for new information to arrive …

Multi-criteria selection of capability-based cybersecurity solutions

T Llansó, M McNeil, C Noteboom - 2019 - scholarspace.manoa.hawaii.edu
Given the increasing frequency and severity of cyber attacks on information systems of all
kinds, there is interest in rationalized approaches for selecting the “best” set of cybersecurity …

Identifying and quantifying trade-offs in multi-stakeholder risk evaluation with applications to the data protection impact assessment of the GDPR

M Mollaeefar, S Ranise - Computers & Security, 2023 - Elsevier
Cybersecurity risk management consists of several steps including the selection of
appropriate controls to minimize risks. This is a difficult task that requires to search through …

MASISCo—Methodological Approach for the Selection of Information Security Controls

M Diéguez, C Cares, C Cachero, J Hochstetter - Applied Sciences, 2023 - mdpi.com
As cyber-attacks grow worldwide, companies have begun to realize the importance of being
protected against malicious actions that seek to violate their systems and access their …

PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs

MR Al-Eiadeh, M Abdallah - International Journal of Information Security, 2025 - Springer
Interdependent systems confront rapidly growing cybersecurity threats. This paper delves
into the realm of security decision-making within these complex interdependent systems. We …

Mapping the variations for implementing information security controls to their operational research solutions

M Diéguez, J Bustos, C Cares - Information Systems and e-Business …, 2020 - Springer
Abstract Information Security Management is currently guided by process-based standards.
Achieving one or some of these standards means deploying their corresponding set of …

Effect of security controls on patching window: A causal inference based approach

A Kuppa, L Aouad, NA Le-Khac - … of the 36th Annual Computer Security …, 2020 - dl.acm.org
In many organisations there are up to 15 security controls that help defenders accurately
identify and prioritise information security risks. Due to the lack of clarity into the …

[Retracted] Security Control Technology and Simulation of Network News Communication under the Environment of Internet of Things

X Zhou, J Wang, X Zhou - Wireless Communications and …, 2021 - Wiley Online Library
Internet of Things is an application of network news communication technology. Based on
the Internet, it uses physical access technologies such as radio frequency tag and wireless …

[图书][B] User interface challenges of banking ATM systems in Nigeria

FC Aguboshim - 2018 - search.proquest.com
The use of banking automated teller machine (ATM) technological innovations have
significant importance and benefits in Nigeria, but numerous investigations have shown that …

Matching possible mitigations to cyber threats: a document-driven decision support systems approach

MW McNeil - 2019 - scholar.dsu.edu
Cyber systems are ubiquitous in all aspects of society. At the same time, breaches to cyber
systems continue to be front-page news (Calfas, 2018; Equifax, 2017) and, despite more …