The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Methods on Determining the Investment in IT Security
|
Author(s): Amanda Eisenga (Lutgert College of Business, Florida Gulf Coast University, USA), Walter Rodriguez (Florida Gulf Coast University, USA)and Travis L. Jones (Lutgert College of Business, Florida Gulf Coast University, USA)
Copyright: 2014
Pages: 13
Source title:
Analyzing Security, Trust, and Crime in the Digital World
Source Author(s)/Editor(s): Hamid R. Nemati (The University of North Carolina at Greensboro, USA)
DOI: 10.4018/978-1-4666-4856-2.ch002
Purchase
|
Abstract
Setting aside capital to invest in Information Technology (IT) security is critical in the current digital age. In almost all large (or small) corporations, it is prudent to allocate a sufficient amount of resources to IT infrastructure. However, it is often difficult to determine at what level it is appropriate to invest in IT security in addition to the point at which the rate of return of this investment begins to diminish. This chapter examines methods to help determine the appropriate investment allocation to IT security in addition to how to apply these methods. It also looks at some of the assumptions and pitfalls of each.
Related Content
Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini.
© 2024.
14 pages.
|
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
30 pages.
|
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan.
© 2024.
19 pages.
|
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi.
© 2024.
14 pages.
|
Meryeme Bououchma, Brahim Herrou.
© 2024.
14 pages.
|
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
16 pages.
|
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly.
© 2024.
10 pages.
|
|
|