dc.contributor.author | Τσιάκης, Θεοδόσιος | el |
dc.contributor.author | Νοταράς, Δημήτρης | el |
dc.contributor.author | Πανοδήμος, Δημήτρης | el |
dc.date.accessioned | 2015-02-01T22:37:58Z | |
dc.date.available | 2015-02-01T22:37:58Z | |
dc.date.issued | 2015-02-02 | |
dc.identifier.uri | http://hdl.handle.net/11400/5402 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Quantitative research | |
dc.subject | Qualitative research | |
dc.subject | Security | |
dc.subject | Κίνδυνοι | |
dc.subject | Ποσοτική ανάλυση | |
dc.subject | Ποιοτική ανάλυση | |
dc.subject | Ασφάλεια | |
dc.subject | Risk | |
dc.title | Techno-economic analysis of information security expenditures | en |
heal.type | conferenceItem | |
heal.generalDescription | ISSN Σειράς Πρακτικών: 1791 – 8499 | el |
heal.generalDescription | Proceedings Series: 1791 - 8499 | en |
heal.classification | Computer network resources | |
heal.classification | Economics | |
heal.classification | Ηλεκτρονικές πηγές πληροφόρησης | |
heal.classification | Οικονομική | |
heal.classificationURI | http://id.loc.gov/authorities/subjects/sh95000713 | |
heal.classificationURI | http://id.loc.gov/authorities/subjects/sh85040850 | |
heal.classificationURI | **N/A**-Ηλεκτρονικές πηγές πληροφόρησης | |
heal.classificationURI | **N/A**-Οικονομική | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh2007000909 | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh99004969 | |
heal.contributorName | Φράγκος, Χρήστος Κ. (1949-) (επιμ.) | el |
heal.language | en | |
heal.access | campus | |
heal.recordProvider | Τεχνολογικό Εκπαιδευτικό Ίδρυμα Αθήνας. Σχολή Διοίκησης και Οικονομίας. Τμήμα Διοίκησης Επιχειρήσεων. Κατεύθυνση Διοίκησης Επιχειρήσεων. | el |
heal.publicationDate | 2009-05 | |
heal.bibliographicCitation | Tsiakis, T., Notaras, D. and Panodimos, D. (2009). Techno-economic analysis of information security expenditures. In Proceedings of the 2nd International Conference: Quantitative and Qualitative Methodologies in the Economic and Administrative Sciences. Athens, 25th to 27th May 2009. Athens: TEI of Athens. pp. 501-507. | en |
heal.abstract | Information Security is considered to be an inextricable part of companies' expenditures and there are defined amounts that are invested for its accomplishment, although it is really difficult to determine the best Security Solution. The substantive problem of information security risk is value proportion of information properties or assets. Risk analysis can be approached from two evaluation models: the qualitative and the quantitative. Quantitative analysis refers to the use of numeric calculations and statistical techniques. Qualitative analysis describes methods that consider loss in a subjective form. Without measurement and metrics of information security we will not be able to estimate and process Information Security Strategies. The aims of this paper are to gain an understanding of Quantitative and Qualitative analysis and furthermore to both evaluate and improve the use of those methods. | en |
heal.publisher | Τεχνολογικό Εκπαιδευτικό Ίδρυμα Αθήνας | el |
heal.publisher | TEI of Athens | en |
heal.fullTextAvailability | true | |
heal.conferenceName | 2nd International Conference: Quantitative and Qualitative Methodologies in the Economic and Administrative Sciences | en |
heal.conferenceItemType | full paper |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: