Reference Hub10
Investing in IT Security: How to Determine the Maximum Threshold

Investing in IT Security: How to Determine the Maximum Threshold

Amanda Eisenga, Travis L. Jones, Walter Rodriguez
Copyright: © 2012 |Volume: 6 |Issue: 3 |Pages: 13
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466612679|DOI: 10.4018/jisp.2012070104
Cite Article Cite Article

MLA

Eisenga, Amanda, et al. "Investing in IT Security: How to Determine the Maximum Threshold." IJISP vol.6, no.3 2012: pp.75-87. http://doi.org/10.4018/jisp.2012070104

APA

Eisenga, A., Jones, T. L., & Rodriguez, W. (2012). Investing in IT Security: How to Determine the Maximum Threshold. International Journal of Information Security and Privacy (IJISP), 6(3), 75-87. http://doi.org/10.4018/jisp.2012070104

Chicago

Eisenga, Amanda, Travis L. Jones, and Walter Rodriguez. "Investing in IT Security: How to Determine the Maximum Threshold," International Journal of Information Security and Privacy (IJISP) 6, no.3: 75-87. http://doi.org/10.4018/jisp.2012070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Investing in information technology (IT) security is a critical decision in the digital age. And, in most organizations, it is wise to allocate a significant amount of resources to IT infrastructure. However, it is difficult to determine how much to invest in IT as well as quantifying the maximum threshold where the rate of return of this investment is diminishing. The main research question in this paper is: how much and what financial resources should be allocated to IT security? This paper analyzes different practices and techniques used to determine the calculation for investments in IT security and analyzes and recommend some suitable methods for deciding how much should be invested in IT security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.