Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

The two sides of ROI: return on investment vs. risk of incarceration

Published: 01 April 2005 Publication History

Abstract

Legislative mandates potentially replace CIO's primary concerns of technology risk management with the possibility of serving jail time.

Cited By

View all
  • (2021)Managerial decision-making (DM) in Kosovo organizations based on SPACE model analysis by using AHP fuzzy methodJournal of Sustainable Finance & Investment10.1080/20430795.2021.189178613:1(248-263)Online publication date: 5-Mar-2021
  • (2020)Cyber Security Assessment Education for E-Governance SystemsInnovations in Cybersecurity Education10.1007/978-3-030-50244-7_10(181-212)Online publication date: 22-Nov-2020
  • (2017)Forensically ready digital identity management systems, issues of digital identity life cycle and context of usageInternational Journal of Electronic Security and Digital Forensics10.1504/IJESDF.2017.0817819:1(62-83)Online publication date: 1-Jan-2017
  • Show More Cited By

Index Terms

  1. The two sides of ROI: return on investment vs. risk of incarceration

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Communications of the ACM
      Communications of the ACM  Volume 48, Issue 4
      Transforming China
      April 2005
      106 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/1053291
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 April 2005
      Published in CACM Volume 48, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)92
      • Downloads (Last 6 weeks)10
      Reflects downloads up to 10 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Managerial decision-making (DM) in Kosovo organizations based on SPACE model analysis by using AHP fuzzy methodJournal of Sustainable Finance & Investment10.1080/20430795.2021.189178613:1(248-263)Online publication date: 5-Mar-2021
      • (2020)Cyber Security Assessment Education for E-Governance SystemsInnovations in Cybersecurity Education10.1007/978-3-030-50244-7_10(181-212)Online publication date: 22-Nov-2020
      • (2017)Forensically ready digital identity management systems, issues of digital identity life cycle and context of usageInternational Journal of Electronic Security and Digital Forensics10.1504/IJESDF.2017.0817819:1(62-83)Online publication date: 1-Jan-2017
      • (2016)Governance and complianceHandbook of SCADA/Control Systems Security, Second Edition10.1201/b19545-13(201-228)Online publication date: 28-Apr-2016
      • (2013)Protected Health Information (PHI) in a Small BusinessSmall and Medium Enterprises10.4018/978-1-4666-3886-0.ch059(1208-1218)Online publication date: 2013
      • (2013)ReferencesResponsive Security10.1201/b15861-10(199-216)Online publication date: 17-Sep-2013
      • (2013)- Threat VectorsHandbook of SCADA/Control Systems Security10.1201/b13869-11(58-69)Online publication date: 19-Feb-2013
      • (2013)Assessing the status of library information systems securityJournal of Librarianship and Information Science10.1177/096100061347767645:3(232-247)Online publication date: 11-Mar-2013
      • (2013)Conclusion and OutlookEnterprise Identity Management10.1007/978-3-642-35040-5_8(169-177)Online publication date: 15-Jan-2013
      • (2013)Empirical Evaluation of the Theoretical ModelEnterprise Identity Management10.1007/978-3-642-35040-5_7(153-165)Online publication date: 15-Jan-2013
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Magazine Site

      View this article on the magazine site (external)

      Magazine Site

      Get Access

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media