期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Effective Utilization of Government-Provided CTI by Small Businesses within the Defense Industrial Base
1
作者 Josiah Dykstra Lawrence A. Gordon +2 位作者 Martin P. Loeb Benjamin Wall Lei Zhou 《Journal of Information Security》 2024年第2期196-217,共22页
There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small... There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small businesses within the U.S. Defense Industrial Base (DIB). Second, we identify ways of improving the effectiveness of government-provided CTI to small businesses within the DIB. Based on a questionnaire-based survey, our findings suggest that government-provided CTI helps businesses within the DIB in preventing, or responding to, cyber-attacks providing a firm is familiar with the CTI. Unfortunately, a large percentage of small firms are not familiar with the government-provided CTI feeds and consequently are not utilizing the CTI. This latter situation is largely due to financial constraints confronting small businesses that prevent firms from having the wherewithal necessary to effectively utilize the government-provided CTI. However, we found a significant positive association between a firm’s familiarity with the government-provided CTI and whether a firm is being periodically reviewed by the Defense Counterintelligence and Security Agency (DCSA) or is compliant with the Cybersecurity Maturity Model Certification (CMMC) program. The findings from our study also show that the participating firms believe that external cyber threats are more likely to be the cause of a future cybersecurity breach than internal cybersecurity threats. Finally, our study found that the portion of the IT budget that small businesses within the DIB spend on cybersecurity-related activities is dependent on the perception that a firm would be the target of an external cyber-attack. 展开更多
关键词 Government-Provided CTI Small Businesses Defense Industrial Base
下载PDF
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model 被引量:4
2
作者 Lawrence A. Gordon Martin P. Loeb +1 位作者 William Lucyshyn Lei Zhou 《Journal of Information Security》 2015年第1期24-30,共7页
Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy a... Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy and national defense at risk. Hence, the issue of cyber security investment has risen to the top of the agenda of business and government executives. This paper examines how the existence of well-recognized externalities changes the maximum a firm should, from a social welfare perspective, invest in cyber security activities. By extending the cyber security investment model of Gordon and Loeb [1] to incorporate externalities, we show that the firm’s social optimal investment in cyber security increases by no more than 37% of the expected externality loss. 展开更多
关键词 Economics of Information SECURITY Cyber SECURITY Investment
下载PDF
Empirical Research on Relationship between Corporate Brand Value and Apparel Market Sales Revenue of Apparel Enterprise 被引量:1
3
作者 阮艳雯 吴非 +2 位作者 顾力文 顾雯 刘晓刚 《Journal of Donghua University(English Edition)》 EI CAS 2017年第3期459-465,共7页
Among the existing researches on brand value,few of them focused on the demands of the companies in the clothing industry to brand value. There were three innovation points as follows: first of all,two key demands of ... Among the existing researches on brand value,few of them focused on the demands of the companies in the clothing industry to brand value. There were three innovation points as follows: first of all,two key demands of apparel companies to existing brand value were summarized through investigation; then,the concept of rapid brand value evaluation and multi-dimensional factors( MDFs) was presented; finally,the relationship between apparel corporate brand value and the sales revenue in apparel market with the sales revenue was proven by empirical research.During the process of empirical study,the sales revenue data of 66 apparel enterprises domestic and abroad were collected,and the regression analysis has been done on the relationship between the corporate brand value and the apparel market sales revenue of apparel enterprise. The empirical research showed that they were positively correlated to each other. This conclusion presented a method of judging brand value development trend quickly by single indicator. 展开更多
关键词 apparel enterprise sales revenue corporate brand value rapid judgment
下载PDF
Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms
4
作者 Lawrence A. Gordon Martin P. Loeb +1 位作者 William Lucyshyn Lei Zhou 《Journal of Information Security》 2018年第2期133-153,共21页
Investments in cybersecurity are critical to the national and economic security of a nation. There is, however, a strong tendency for firms in the private sector to underinvest in cybersecurity activities. This paper ... Investments in cybersecurity are critical to the national and economic security of a nation. There is, however, a strong tendency for firms in the private sector to underinvest in cybersecurity activities. This paper reports the results of a survey designed to empirically assess whether treating cybersecurity as an important component of a firm’s internal control system for financial reporting purposes serves as a driver for private sector firms to invest in cybersecurity activities. The findings, in this regard, are significantly positive. The study also shows that a firm’s concern over the risk of incurring a large loss due to a cybersecurity breach and the degree the firm treats cybersecurity investments as generating a competitive advantage are drivers of the level of private sector investment in cybersecurity activities. The implications of the empirical results for designing public policies to mitigate the tendency of private sector firms to underinvest in cybersecurity are also explored. 展开更多
关键词 CYBERSECURITY INVESTMENT Determinants Survey
下载PDF
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
5
作者 Josiah Dykstra Lawrence A. Gordon +1 位作者 Martin P. Loeb Lei Zhou 《Journal of Information Security》 2022年第3期85-100,共16页
This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber... This paper extends the literature on the economics of sharing cybersecurity information by and among profit-seeking firms by modeling the case where a government agency or department publicly shares unclassified cyber threat information with all organizations. In prior cybersecurity information sharing models a common element was reciprocity—i.e., firms receiving shared information are also asked to share their private cybersecurity information with all other firms (via an information sharing arrangement). In contrast, sharing of unclassified cyber threat intelligence (CTI) by a government agency or department is not based on reciprocal sharing by the recipient organizations. After considering the government’s cost of preparing and disseminating CTI, as well as the benefits to the recipients of the CTI, we provide sufficient conditions for sharing of CTI to result in an increase in social welfare. Under a broad set of general conditions, sharing of CTI will increase social welfare gross of the costs to the government agency or department sharing the information. Thus, if the entity can keep the sharing costs low, sharing cybersecurity information will result in an increase in net social welfare. 展开更多
关键词 Cyber Threat Intelligence Economics of Information Sharing
下载PDF
Investing in Cybersecurity: Insights from the Gordon-Loeb Model 被引量:6
6
作者 Lawrence A. Gordon Martin P. Loeb Lei Zhou 《Journal of Information Security》 2016年第2期49-59,共11页
Given the importance of cybersecurity to the survival of an organization, a fundamental economics-based question that must be addressed by all organizations is: How much should be invested in cybersecurity related act... Given the importance of cybersecurity to the survival of an organization, a fundamental economics-based question that must be addressed by all organizations is: How much should be invested in cybersecurity related activities? Gordon and Loeb [1] presented a model to address this question, and that model has received a significant amount of attention in the academic and practitioner literature. The primary objective of this paper is to discuss the Gordon-Loeb Model with a focus on gaining insights for the model’s use in a practical setting. 展开更多
关键词 Economics of Information Security Cybersecurity Investment
下载PDF
商品陈列的画面效应——陈列秩序影响商品评价的机制与条件 被引量:3
7
作者 叶巍岭 黄蓉 张子敬 《营销科学学报(辑刊)》 CSSCI 2016年第3期-,共18页
商品陈列的秩序是消费者进行商品评价的重要线索,为什么整齐的陈列(相较于凌乱的陈列)会有利于消费者对商品给出较高的质量预估?除了现有成果中已经发现的污染效应,本研究提出了“画面效应”的作用机制及条件:当商品陈列整齐(相对于凌... 商品陈列的秩序是消费者进行商品评价的重要线索,为什么整齐的陈列(相较于凌乱的陈列)会有利于消费者对商品给出较高的质量预估?除了现有成果中已经发现的污染效应,本研究提出了“画面效应”的作用机制及条件:当商品陈列整齐(相对于凌乱)时,消费者对陈列画面的态度更加积极正面,继而导致消费者对商品质量的预估评价也显著提高,这就是本研究定义的“画面效应”,其中,消费者对陈列画面的态度在画面效应中起到完全中介作用;但是,画面效应并不总是会发生,商品外观重要性起到调节作用,当消费者认为商品的外观不重要时,画面效应不发生,即凌乱与整齐的陈列不会引起消费者对陈列画面的态度差别,也不会引起消费者对商品质量预估评价的差异;而当商品的外观重要时,画面效应才会发生.这个研究在陈列秩序的商品污染和消费者污染效应之外,证明了“画面效应”的存在,对有关商品陈列的研究有理论贡献.在应用方面,这个研究给予零售现场管理关于“理货的必要性”更多的支持,并进一步回答了针对什么样的商品更应该花时间整理,保持商品陈列的整齐有序. 展开更多
关键词 陈列秩序 货架陈列 商品评价 线索利用理论 零售管理
下载PDF
Information Segmentation and Investing in Cybersecurity
8
作者 Lawrence A. Gordon Martin P. Loeb Lei Zhou 《Journal of Information Security》 2021年第1期115-136,共22页
This paper provides an analysis of how the benefits of information segmentation can assist an organization to derive the appropriate amount to invest in cybersecurity from a cost-benefit perspective. An analytical mod... This paper provides an analysis of how the benefits of information segmentation can assist an organization to derive the appropriate amount to invest in cybersecurity from a cost-benefit perspective. An analytical model based on the framework of the Gordon-Loeb Model (<span><span><span style="font-family:Verdana;">[1]</span><span></span></span></span><span><span></span></span><span></span><span><span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">) is presented that provides a set of sufficient conditions for information segmentation to lower the total investments in cybersecurity and the expected loss from cybersecurity breaches. A numerical example illustrating the insights gained from the model is also presented.</span></span></span> 展开更多
关键词 Cybersecurity Investments Information Segmentation Economics of Information Security
下载PDF
Now decision theory
9
作者 Dilip B.Madan Wim Schoutens King Wang 《Probability, Uncertainty and Quantitative Risk》 2023年第3期391-416,共26页
The spirit of now in nowcasting suggests expanding the current to include the near future.Decision theory is then developed by incorporating the consequences of actions into the present.With the future falling into th... The spirit of now in nowcasting suggests expanding the current to include the near future.Decision theory is then developed by incorporating the consequences of actions into the present.With the future falling into the present discounting it is no longer permitted.Value functions are then observed to be determinate only up to scale and shift that are then locked down by fixing values arbitrarily in two selected states,much like declaring water to freeze and boil at zero and a hundred degrees celsius.The locked down value functions associated policy functions are seen to exist in decision contexts in where the only time is now.Examples are studied in univariate and multivariate dimensions for the decision state space and the dimension of shocks delivering state transitions.The policy functions are expanded from realisitic training sets to the full state space using Gaussian Process Regression.They are implemented on real data with reported performances. 展开更多
关键词 State dependent discounting Bilateral gamma process Probability distortion Measure distortion Gamma discounted averaging Multivariate bilateral gamma model
原文传递
Measure distorted arrival rate risks and their rewards
10
作者 Dilip B.Madan 《Probability, Uncertainty and Quantitative Risk》 2017年第1期171-191,共21页
Risks embedded in asset price dynamics are taken to be accumulations of surprise jumps.A Markov pure jump model is formulated on making variance gamma parameters deterministic functions of the price level.Estimation i... Risks embedded in asset price dynamics are taken to be accumulations of surprise jumps.A Markov pure jump model is formulated on making variance gamma parameters deterministic functions of the price level.Estimation is done by matrix exponentiation of the transition rate matrix for a continuous time finite state Markov chain approximation.The motion is decomposed into a space dependent drift and a space dependent martingale component.Though there is some local mean reversion in the drift,space dependence of the martingale component renders the dynamics to be of the momentum type.Local risk is measured using market calibrated measure distortions that introduce risk charges into the lower and upper prices of two price economies.These risks are compensated by the exponential variation of space dependent arrival rates.Estimations are conducted for the S&P 500 index(SPX),the exchange traded fund for the financial sector(XLF),J.P.Morgan stock prices(JPM),the ratio of JPM to XLF,and the ratio of XLF to SPX. 展开更多
关键词 Variance Gamma Hunt process Markov chain approximation Matrix exponentiation Momentum function Measure distortion
原文传递
Lower and upper pricing of financial assets
11
作者 Robert Elliott Dilip B.Madan Tak Kuen Siu 《Probability, Uncertainty and Quantitative Risk》 2022年第1期45-66,共22页
Modeling of uncertainty by probability errs by ignoring the uncertainty in probability.When financial valuation recognizes the uncertainty of probability,the best the market may offer is a two price framework of a low... Modeling of uncertainty by probability errs by ignoring the uncertainty in probability.When financial valuation recognizes the uncertainty of probability,the best the market may offer is a two price framework of a lower and upper valuation.The martingale theory of asset prices is then replaced by the theory of nonlinear martingales.When dealing with pure jump compensators describing probability,the uncertainty in probability is captured by introducing parametric measure distortions.The two price framework then alters asset pricing theory by requiring two required return equations,one each for the lower upper valuation.Proxying lower and upper valuations by daily lows and highs,the paper delivers the first empirical study of nonlinear martingales via the modeling and simultaneous estimation of the two required return equations. 展开更多
关键词 Bilateral gamma model Acceptable risks Probability distortions Hidden Markov model Filtered markets
原文传递
Zero covariation returns
12
作者 Dilip B.Madan Wim Schoutens 《Probability, Uncertainty and Quantitative Risk》 2018年第1期146-174,共29页
Asset returns are modeled by locally bilateral gamma processes with zero covariations.Covariances are then observed to be consequences of randomness in variations.Support vector machine regressions on prices are emplo... Asset returns are modeled by locally bilateral gamma processes with zero covariations.Covariances are then observed to be consequences of randomness in variations.Support vector machine regressions on prices are employed to model the implied randomness.The contributions of support vector machine regressions are evaluated using reductions in the economic cost of exposure to prediction residu-als.Both local and global mean reversion and momentum are represented by drift dependence on price levels.Optimal portfolios maximize conservative portfolio val-ues calculated as distorted expectations of portfolio returns observed on simulated path spaces.They are also shown to outperform classical alternatives. 展开更多
关键词 Bilateral gammaprocess Minmaxvardistortion Conic portfolio theory Distorted expectation
原文传递
Correlated squared returns
13
作者 Dilip B.Madan King Wang 《Probability, Uncertainty and Quantitative Risk》 2021年第2期139-158,共20页
Joint densities for a sequential pair of returns with weak autocorrelation and strong correlation in squared returns are formulated.The marginal return densities are either variance gamma or bilateral gamma.Two-dimens... Joint densities for a sequential pair of returns with weak autocorrelation and strong correlation in squared returns are formulated.The marginal return densities are either variance gamma or bilateral gamma.Two-dimensional matching of empirical characteristic functions to its theoretical counterpart is employed for dependency parameter estimation.Estimations are reported for 3920 daily return sequences of one thousand days.Path simulation is done using conditional distribution functions.The paths display levels of squared return correlation and decay rates for the squared return autocorrelation function that are comparable to these magnitudes in daily return data.Regressions of log characteristic functions at different time points are used to estimate time scaling coefficients.Regressions of these time scaling coefficients on squared return correlations support the view that autocorrelation in squared returns slows the rate of passage of economic time.An analysis of financial markets for 2020 in comparison with 2019 displays a post-COVID slowdown in financial markets. 展开更多
关键词 Correlated gamma processes Joint characteristic functions Digital moment estimation Path simulation
原文传递
Building Leaders for a Digital Economy
14
作者 Howard Frank 《China International Business》 2006年第8期I0002-I0002,共1页
关键词 数字经济 网络 易趣网 电子商务
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部