JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Research Trends in Information Security Economics: Focused on the Articles Presented at WEIS
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Research Trends in Information Security Economics: Focused on the Articles Presented at WEIS
Kang, Mi-Hwa; Kim, Tae-Sung;
  PDF(new window)
 Abstract
Even though much investment to prevent or mitigate damage from information security breaches have been considered, researches on economically rational information security decision-making such as investment, management, etc. are not introduced in Korea. This study analyzes research themes and methodologies of articles presented at the Workshop on the Economics of Information Security (WEIS) for 2002 - 2014. Results of the study can suggest future research topics for researchers, and help make rational information security decision-making for practitioners.
 Keywords
Security Economics;Decision-Making;WEIS;Research Trends;
 Language
Korean
 Cited by
1.
보안경제성 연구동향 분석 : IS 저널 중심으로,강미화;김태성;

Journal of Information Technology Applications and Management, 2016. vol.23. 1, pp.79-96 crossref(new window)
 References
1.
Digital Times, "Stock price of credit card companies, 'joy and sorrow'." 2014.01.23.

2.
Maeil Business Newspaper, "Three card companies which disclosed personal information would make a loss of over 160 billion," 2014.05.19.

3.
Korean Bar Newspaper, "Privacy, now when you need to invest," 2014.04.21.

4.
R. Anderson, "Why information security is hard - an economic perspective," In Computer Security Applications Conference, pp. 358-365, IEEE, Dec. 2001.

5.
A. Odlyzko, "Economics, psychology, and sociology of security," In Financial Cryptography, pp. 182-189, Springer Berlin Heidelberg, Jan. 2003.

6.
R. Anderson and T. Moore, "The economics of information security," Science, vol. 314, no. 5799, pp. 610-613, Oct. 2006. crossref(new window)

7.
R. Anderson, R. Böhme, R. Clayton, and T. Moore, "Security economics and european policy," Managing Information Risk and the Economics of Security, Springer US, pp. 55-80. 2009.

8.
T. Moore, "The economics of cybersecurity: Principles and policy options," International Journal of Critical Infrastructure Protection, vol. 3, no. 3-4, pp. 103-117, Dec. 2010. crossref(new window)

9.
T. Moore and R. Anderson, "Economics and internet security: A survey of recent analytical, empirical and behavioral research," Harvard University Computer Science Group, 2011.

10.
Hyo-Jung Jun, Hye-Won Yoo, and Tae-Sung Kim, "Analysis on knowledge and skills for information security professionals," Information Systems Review, 10(2), pp. 253-267. Aug. 2008.

11.
F. Belanger and R.E. Crossler, "Privacy in the digital age: A review of information privacy research in information systems," MIS Quarterly, vol. 35, no. 4, pp. 1017-1042, Dec. 2011. crossref(new window)

12.
J.R. Cordoba, A. Pilkington, and E. WN Bernroider, "Information systems as a discipline in the making: comparing EJIS and MISQ between 1995 and 2008," European Journal of Information Systems, vol. 21, no. 5, pp. 479-495, Jan. 2012. crossref(new window)

13.
N. Mustafee, "Evolution of IS research based on literature published in two leading IS journals-EJIS and MISQ," In 19th European Conference on Information Systems, pp. 2658-2668. Jul. 2011.

14.
P. Palvia, P. Pinjani, and E.H. Sibley, "A profile of information systems research published in Information & Management," Information & Management, vol. 44, no. 1, pp. 1-11, Jan. 2007. crossref(new window)

15.
H.J. Smith, T. Dinev, and H. Xu, "Information privacy research: An interdisciplinary review," MIS Quarterly, vol. 35, no. 4, pp. 989-1016, Dec. 2011. crossref(new window)

16.
E.B. Swanson and N.C. Ramiller, "Information systems research thematics: Submissions to a new journal, 1987-1992," Information Systems Research, vol. 4, no. 4, pp. 299-330, Dec. 1993. crossref(new window)

17.
R.D. Banker and R.J. Kauffman, "The evolution of research on information systems: A fiftieth-year survey of the literature in management science," Management Science, vol. 50, no. 3, pp. 281-298, Mar. 2004. crossref(new window)

18.
K. Davies, "Content analysis of research articles in information systems (LIS) journals," Library and Information Research, vol. 36, no. 112, pp. 16-28, 2012.

19.
M. Siponen and R. Willison, "A critical assessment of IS security research between 1990-2004," Copenhagen Business School, Feb. 2007.

20.
Ministry of Knowledge Economy (Current Ministry of Trade, Industry and Energy), "By 2013, Knowledge Information Security Industry 18 trillion won Market Creation", Dec. 2008.

21.
Standard Korean Dictionary of The Natio nal Institute of The Korean Language, http://stdweb2.korean.go.kr/

22.
WEIS 2002, http://www2.sims.berkeley.edu/re sources/affiliates/workshops/econsecurity/

23.
WEIS 2003, http://www.cpppe.umd.edu/rhsmi th3/agenda.htm

24.
WEIS 2004, https://www.dtc.umn.edu/seminars/events.php?eventdesc=207&menuid=2

25.
WEIS 2005, http://infosecon.net/workshop/schedule.php

26.
WEIS 2006, http://weis2006.econinfosec.org/prog.html

27.
WEIS 2007, http://weis2007.econinfosec.org/program.htm

28.
WEIS 2008, http://weis2008.econinfosec.org/program.htm

29.
WEIS 2009, http://weis09.infosecon.net/programme.html

30.
WEIS 2010, http://weis2010.econinfosec.org/

31.
WEIS 2011, http://weis2011.econinfosec.org/

32.
WEIS 2012, http://weis2012.econinfosec.org/

33.
WEIS 2013, http://weis2013.econinfosec.org/

34.
WEIS 2014, http://weis2014.econinfosec.org/

35.
Wikipedia, https://en.wikipedia.org/wiki/Economics_of_security