Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Business

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara May 2006

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Pre-Disaster Planning And Mitigation And Its Impact On Comprehensive Emergency Management And The Nation: Pre-Disaster Mitigation (Pdm) Program And The Population Protected, Thomas Lyons Carr Iii May 2006

Pre-Disaster Planning And Mitigation And Its Impact On Comprehensive Emergency Management And The Nation: Pre-Disaster Mitigation (Pdm) Program And The Population Protected, Thomas Lyons Carr Iii

Thomas Lyons (Thom) Carr III Appl.Sc., CEM

A Project for a Professional Degree submitted to The Faculty of School of Engineering and Applied Science of The George Washington University in partial fulfillment of the requirements for the degree of Applied Scientist of Engineering Management May 21, 2006

On October 10, 2000, The Disaster Mitigation Act of 2000 (DMA 2000 or DMA 2K) (Public Law 106-390) was enacted, amending the Robert T. Stafford Relief and Emergency Assistance Act and established new requirements for the national for hazard mitigation planning. States, Tribes, territories, and local governments now must have an approved mitigation plan in place prior to receiving certain …


Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott Apr 2006

Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott

George H Baker

The rise of the American homeland security endeavor under the leadership of the new Department of Homeland Security has been heralded by several major national strategy documents. These documents have served to organize efforts at top levels within the government and industry. However, the national strategy guidance is not getting to many organizations and people at the grass-roots level who can make the most difference in preventing attacks, protecting systems, and recovering from catastrophic events, viz. the general citizenry, private infrastructure owners, and local governments. To better understand grass-roots issues and solutions, James Madison University, in cooperation with the Federal …


Foreign Exchange Intervention By The Bank Of Japan: Bayesian Analysis Using A Bivariate Stochastic Volatility Model, Michael Smith, Andrew Pitts Dec 2005

Foreign Exchange Intervention By The Bank Of Japan: Bayesian Analysis Using A Bivariate Stochastic Volatility Model, Michael Smith, Andrew Pitts

Michael Stanley Smith

A bivariate stochastic volatility model is employed to measure the effect of intervention by the Bank of Japan (BOJ) on daily returns and volume in the USD/YEN foreign exchange market. Missing observations are accounted for, and a data-based Wishart prior for the precision matrix of the errors to the transition equation that is in line with the likelihood is suggested. Empirical results suggest there is strong conditional heteroskedasticity in the mean-corrected volume measure, as well as contemporaneous correlation in the errors to both the observation and transition equations. A threshold model is used for the BOJ reaction function, which is …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


The Development Of A Logistic Regression Model Used To Identify At-Risk Students On The Ohio Grade 3 Reading Achievement Test, John Fraas, Doug Marrah, Harold Wilson, Herb Broda, Jim Rycik Dec 2005

The Development Of A Logistic Regression Model Used To Identify At-Risk Students On The Ohio Grade 3 Reading Achievement Test, John Fraas, Doug Marrah, Harold Wilson, Herb Broda, Jim Rycik

John W. Fraas

No abstract provided.