Effectiveness Evaluation of Investment in Information Security Based on Fuzzy Sets

Pervadchuk V.P., Beletsky V.A.


The quantitative approach to investments in information security is considered. The uncertainty is modeled with fuzzy sets.


information security; fuzzy sets; investments

References References

Aubuchon K. Applying NPV and ROI to Security Investment Decisions. - URL : http://defaultdenyjournal.com/ blog/2009/10/30/extended-article-applying-npv-and-roi-to-security-investment-decisions (дата обращения 12.05.10).

National Bureau of Standards, Guideline for Automatic Data Processing Risk Analysis, FIPS PUB 65. - Washington, DC : U.S. General Printing Office, 1979.

Hoo S. How much is enough? A risk management approach to Computer Security. - 2000. - URL : http://www. eecs.harvard.edu/~stuart/papers/thesis.pdf <http://www.eecs.harvard.edu/~stuart/papers/thesis.pdf> (дата обращения 24.03.10).

Недосекин А. О. Нечетко-множественный анализ риска фондовых инвестиций. - СПб. : Тип. «Сезам», 2002.

Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Copyright (c) 2011 Bulletin of Kalashnikov ISTU

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

ISSN 1813-7903 (Print)
ISSN 2413-1172 (Online)