Real option applications to information security.(Papers): An article from: Communications & Strategies
Book Details
Author(s)Pythagoras Petratos
PublisherIDATE
ISBN / ASINB003DSTUGQ
ISBN-13978B003DSTUG9
AvailabilityAvailable for download now
MarketplaceUnited States 🇺🇸
Description
This digital document is an article from Communications & Strategies, published by IDATE on April 1, 2008. The length of the article is 3838 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available immediately after purchase. You can view it with any web browser.
From the author: Real options present advantages over the standard discounting methods. In this paper we analyze them briefly and examine their potential applications on information security. The applications of real options on valuation of information assets, information security investment and capital budgeting provide considerable benefits. Finally portfolios of real options and other financial products can reduce information security risk. Key words: Real options, information security, valuation, information security investment, capital budgeting, portfolio theory, information security risk.
Citation Details
Title: Real option applications to information security.(Papers)
Author: Pythagoras Petratos
Publication:Communications & Strategies (Magazine/Journal)
Date: April 1, 2008
Publisher: IDATE
Issue: 70 Page: 15(11)
Distributed by Gale, a part of Cengage Learning
From the author: Real options present advantages over the standard discounting methods. In this paper we analyze them briefly and examine their potential applications on information security. The applications of real options on valuation of information assets, information security investment and capital budgeting provide considerable benefits. Finally portfolios of real options and other financial products can reduce information security risk. Key words: Real options, information security, valuation, information security investment, capital budgeting, portfolio theory, information security risk.
Citation Details
Title: Real option applications to information security.(Papers)
Author: Pythagoras Petratos
Publication:Communications & Strategies (Magazine/Journal)
Date: April 1, 2008
Publisher: IDATE
Issue: 70 Page: 15(11)
Distributed by Gale, a part of Cengage Learning
