This paper presents a portfolio optimization approach to information technology (IT) security investment decisions in an organization. This approach has been motivated by the extreme variations that are found in IT security requirements for organizations in addition to the diversity of starting conditions found in organizations that choose to embark on a formal approach to managing their security. Often, a budgetary allocation is made for IT security and IT managers and management are faced with the problem of how to allocate these monies or resources across competing projects and products that can potentially improve or enhance IT security in an organization. Instead of ranking or rating the various alternatives based on their benefits onl...
The need to protect resources against attackers is reflected by huge information security investment...
Information Technology Portfolio Management (ITPM) is a topic of intense interest in the strategic m...
We analyse the resource allocation problem arising in the context of information security strategy p...
This paper presents a portfolio optimization approach to information technology (IT) security invest...
This paper provides a methodological framework in which the problem of IT project portfolio selectio...
The protection of assets, including IT resources, intellectual property and business processes, agai...
Open Access journalChoosing an optimal investment in information security is an issue most companies...
AbstractChoosing an optimal investment in information security is an issue most companies face these...
Kiesling E, Ekelhart A, Grill B, Strauss C, Stummer C. Selecting security control portfolios: A mult...
This dissertation consists of three chapters. The primary objectives of this dissertation are: (1) t...
As companies are increasingly exposed to information security threats, decision makers are permanent...
Software project proposals, solicited from various sources across an organization, could significant...
In this paper, we present a new quantitative optimization model to support decision makers in determ...
Information systems are an integral part of today\u27s business environment. Businesses, government ...
With increasing level of security threats and constant budget limitations, it is critical for a comp...
The need to protect resources against attackers is reflected by huge information security investment...
Information Technology Portfolio Management (ITPM) is a topic of intense interest in the strategic m...
We analyse the resource allocation problem arising in the context of information security strategy p...
This paper presents a portfolio optimization approach to information technology (IT) security invest...
This paper provides a methodological framework in which the problem of IT project portfolio selectio...
The protection of assets, including IT resources, intellectual property and business processes, agai...
Open Access journalChoosing an optimal investment in information security is an issue most companies...
AbstractChoosing an optimal investment in information security is an issue most companies face these...
Kiesling E, Ekelhart A, Grill B, Strauss C, Stummer C. Selecting security control portfolios: A mult...
This dissertation consists of three chapters. The primary objectives of this dissertation are: (1) t...
As companies are increasingly exposed to information security threats, decision makers are permanent...
Software project proposals, solicited from various sources across an organization, could significant...
In this paper, we present a new quantitative optimization model to support decision makers in determ...
Information systems are an integral part of today\u27s business environment. Businesses, government ...
With increasing level of security threats and constant budget limitations, it is critical for a comp...
The need to protect resources against attackers is reflected by huge information security investment...
Information Technology Portfolio Management (ITPM) is a topic of intense interest in the strategic m...
We analyse the resource allocation problem arising in the context of information security strategy p...