Please use this identifier to cite or link to this item:
https://repository.iimb.ac.in/handle/123456789/10311
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Venkatesh, G | |
dc.contributor.author | Seth, Anuj | |
dc.date.accessioned | 2017-09-26T04:22:12Z | |
dc.date.accessioned | 2019-03-18T09:20:33Z | - |
dc.date.available | 2017-09-26T04:22:12Z | |
dc.date.available | 2019-03-18T09:20:33Z | - |
dc.date.issued | 2005 | |
dc.identifier.uri | http://repository.iimb.ac.in/handle/123456789/10311 | |
dc.description.abstract | This report is aimed towards (lOs and IT Managers looking at a framework to calculate ROl on their projects security investments. The report does not provide a "one-size fit all" framework but provides guidelines to make the necessary ROI calculations. The approach used for writing this report was to use a combination of literature survey as well as original analysis to fill in the gaps. The literature survey was done on various online databases like the EBSCO database, besides analyzing research reports from Forrester Research, and research reports from some universities. The report looks at answering the following questions: What does ROI for security investments mean? Why do we need to address ROI for Security Investments? Models for calculating ROI To determine the level of security awareness in IT companies, two surveys were carried out and the results of the surveys form a core part of this report. | |
dc.language.iso | en_US | |
dc.publisher | Indian Institute of Management Bangalore | |
dc.relation.ispartofseries | PGSM-PR-P5-32 | - |
dc.subject | Security investments | |
dc.title | ROI of I.T security investments | |
dc.type | Project Report-PGSM | |
dc.pages | 63p. | |
Appears in Collections: | 2005 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
PR_PGSM_P5_32.pdf | 1.64 MB | Adobe PDF | View/Open Request a copy |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.