Resources Allocation Analysis of Information Security Defense in Network Information System——In Perspective of Theory of Constrains
XIONG Qiang1,2, ZHONG Wei-jun1, LI Zhi-wen2
1. School of Economic and Management, Southeast University, Nanjing 210096, China; 2. School of Management, Jiangsu University, Zhenjiang 212013, China
XIONG Qiang, ZHONG Wei-jun, LI Zhi-wen. Resources Allocation Analysis of Information Security Defense in Network Information System——In Perspective of Theory of Constrains[J]. Operations Research and Management Science, 2014, 23(3): 163-169.
[1] Gordon L A, Loeb M P. The economics of information security investment[J]. ACM Transactions on Information and System Security, 2002, 5(4)(November 2002): 438-457. [2] Bodin L, Gordon L, Loeb M. Evaluating information security investments using the analytic hierarchy proeess[J]. Communicatoins of The ACM, 2005, 48(2): 79-83. [3] Gordon L, Loeb M. Budgeting process for information security expenditures[J]. Communications of The ACM, 2006, 49(1): 121-125. [4] Grossklags J, Christin N, Chuang J. Secure or insure: a game-theoretic analysis of information security games[J]. Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08. 2008. 209-218. [5] Yue W T, akanyldrm M, Ryu Y U, et al. Network externalities, layered protection and IT security risk management[J]. Decision Support Systems, 2007, 44(1): 1-16. [6] Cremonini M, Nizovtsev D. Risks and benefits of signaling information system characteristics to strategic attackers[J]. Journal of Management Information Systems, 2009, 26(3): 241-274. [7] 孙薇,孔祥维,何德全,等.组织信息安全投资博弈的均衡分析[J].运筹与管理,2008,17(5):85-90. [8] 姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827. [9] 教材编写组运筹学.运筹学[M].北京:清华大学出版社,2001.154-180.