Search
Skip to Search Results
Filter
Author / Creator / Contributor
Subject / Keyword
- 1Continuous Time Markov Chain
- 1Controls
- 1Customer Utility
- 1Elasticity of Demand
- 1Hotelling
- 1Information Security
Item type
Collections
Year
Languages
Departments
-
Fall 2012
Enterprises must manage their information risk as part of their larger operational risk management program. Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in...
1 - 1 of 1