Optimal Timing of Information Security Investment: A Real Options Approach

  • Tatsumi K
  • Goto M
N/ACitations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter applies real options analytic framework to firms' investment activity in information security technology and then a dynamic analysis of information security investment is explored by extending Gordon-Loeb (2002). The current research provides how firms have to respond to immediate or remote threat numerically. It shows that although positive drift of threat causes both larger and later investment expenditure, negative drift causes immediate investment and lower investment expenditure. The efficiency of vulnerability reduction technology encourages firms to invest earlier and induces cost reduction. To know the form of vulnerability is important because the effect of high vulnerability on timing and amount of the investment expenditure is mixed.

Cite

CITATION STYLE

APA

Tatsumi, K., & Goto, M. (2010). Optimal Timing of Information Security Investment: A Real Options Approach. In Economics of Information Security and Privacy (pp. 211–228). Springer US. https://doi.org/10.1007/978-1-4419-6967-5_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free