IS

Chaudhury, Aby

Topic Weight Topic Terms
0.209 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative
0.152 methods information systems approach using method requirements used use developed effective develop determining research determine
0.116 technology investments investment information firm firms profitability value performance impact data higher evidence diversification industry
0.110 percent sales average economic growth increasing total using number million percentage evidence analyze approximately does
0.107 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Rao, H. Raghav 1 Wang, Jingguo 1
extreme value analysis 1 information assurance 1 security investment 1 value-at-risk (VaR) 1

Articles (1)

A Value-at-Risk Approach to Information Security Investment. (Information Systems Research, 2008)
Authors: Abstract:
    Information security investment has been getting increasing attention in recent years. Various methods have been proposed to determine the effective level of security investment. However, traditional expected value methods (such as annual loss expectancy) cannot fully characterize the information security risk confronted by organizations, considering some extremal yet perhaps relatively rare cases in which a security failure may be critical and cause high losses. In this research note we introduce the concept of value-at-risk to measure the risk of daily losses an organization faces due to security exploits and use extreme value analysis to quantitatively estimate the value at risk. We collect a set of internal daily activity data from a large financial institution in the northeast United States and then simulate its daily losses with information based on data snapshots and interviews with security managers at the institution. We illustrate our methods using these simulated daily losses. With this approach, decision makers can make a proper investment choice based on their own risk preference instead of pursuing a solution that minimizes only the expected cost.