Font Size: a A A

Research On Theories And Models For The Investment Decisions Of Power Information Security

Posted on:2015-03-26Degree:DoctorType:Dissertation
Country:ChinaCandidate:S C YeFull Text:PDF
GTID:1109330470470972Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
The basic characteristics of modern power industry is information and marketization, the power industry information systems information technology in all aspects of the electric power industry production, management, and planning, construction, power generation, transformation, transmission and other aspects of the marketing, industrialization and information technology "integration of the two." Power Industry and Information Technology in the power industry to enhance the effectiveness, efficiency and effectiveness, it also brings information security risks. In recent years, with the continuous deterioration of the network space environment, the power of information security issues are also increasingly severe, frequent occurrence of major accidents, the power business investment for information security work every year. However, the power input in the construction of enterprise information security presents a non-controlled, non-standard phenomenon, the lack of investment in the power of information security management behavior theory.In this paper, the power of enterprise information security investment process as the main line, based on the analysis of information security investment behavior of the power factor, the use of logical analysis of information security economics, the analysis of investment decisions based on the classic theory, based on the "power of information security investment Value "and" power of information security risk value "of these two elements, for the power of enterprise information security investment process," the number of investment"," investment direction "and" post-evaluation of the level of investment and construction issues, "the establishment of the power of information security investment decisions model. The main research work and achievements of this paper is mainly reflected in the following five areas:(1) The principles of economics apply to the power of enterprise information security investment decision-making behavior in the past, based on the traditional investment decision theory, characteristics and influencing factors for the power of information security investment behavior, investment decisions based on real options theory to the power of information security investments the theoretical analysis. Proposed information security investment theory of power, not only to expand the scope of application of the theory of investment decisions,but also enriched the connotation of power theory of information security.(2) For the power characteristics of information security investment to construct the power of information security investment decision model. Feedback from the two levels of investment and the power of information security investment process,the power of information security investment process is divided into five levels,namely investment target analysis,the power of information security investment valuation, the value of electric power information security risk assessment to determine the power of information security investments electricity information security level evaluation.(3) According to the requirements of the investment decision-making process, to build a power information security investment valuation model to analyze the economic value of the power of information security evaluation method by studying the relationship between economic value and investment value is proposed to optimize the power of information security investment calculated amount, and information security risk assessment based on the theory of electricity, constructed power information security risk assessment model to analyze the value of the elements of power assets, made significant investments determine the extent of the power of information systems approach.(4) According to the Power Information Security Evaluation investment needs, proposed the construction of the power level of information security evaluation method can be quantified to construct the index system for information security level of power and uncertainty and ambiguity for the evaluation of fuzzy mathematical operators, information security evaluation method proposed investment for the power companies in the information security investment occurs, it is possible to effectively evaluate investment results to validate scientific investment.(5) To a provincial power company for an example, based on theories and models of this study, to calculate the value of their information security risk investment value and information systems to determine the amount of information security investments and investment direction, and use the power level of information security evaluation methods for enterprise information security investment effect empirical analysis of the next power of information security investments made reasonable proposals.
Keywords/Search Tags:Power Information Security, Information security value, risk value, investment decisions, comprehensive evaluation system
PDF Full Text Request
Related items