Your position: index > Study > Tutors > Content
College of Economics and Management: Zh​ao Liurong
ClickTimes:     Release Date:Apr.13,2022

Tutor Information

 

Name

Zhao Liurong

Gender

Female

Date   of Birth

1986.8

Professional   Title

Associate Professor

E-mail

zhaoliurong@njtech.edu.cn

Research   Fields

Information Security Management

Personal   Profile

Associate   Professor of Nanjing   Tech University School of Economics & Management, Master   Tutor, Visiting Scholar of the University of Maryland. Ms. Zhao has presided   over scientific research projects of the National Natural Science Foundation   of China, Social Science Foundation of Jiangsu Province, China Postdoctoral   Science Foundation, Jiangsu Postdoctoral Science Foundation, Philosophy and   Social Science Foundation of Jiangsu Universities, and Social Science   Foundation for Young Teachers. In addition, she has directed many lateral projects   such as Digital Economy, Transformation of Old Residential Areas and   Optimization of Chemical Industry; and she has also taken charge of the   First-Class Undergraduate Courses in Jiangsu Province and the Teaching Reform   of Nanjing Tech University.

Ms.   Zhao has published more than 20 academic papers, 2 papers on teaching reform,   1 monograph and 1 textbook. She has served as the tutor of Jiangsu Provincial   Postgraduate Practice and Innovation Project, National Undergraduate   Innovation and Entrepreneurship Project, and Excellent Undergraduates' Papers   of Jiangsu Province.

Representative   Research Projects / Works / Papers

Scientific   research project: the Young Scientists Fund of the National   Natural Science Foundation of China: "Research on Decision-Making   Mechanism and Strategy Optimization of Information Security Outsourcing Based   on Considering Risk Dependence and Competitive Externality".

 

Academic   monograph: The Management Strategy of Information   System Security Technology: An Information Security Economics Perspective.   Southwest University of Finance and Economics Press. 2020.

Academic   papers:

1An   economic analysis of the interaction between firewall, IDS and vulnerability   scan [J]. Economic Computation and Economic Cybernetics Studies and Research,   2015, 49(4): 323-340.

2. Analysis   of Configuration Strategy of Honeypot and Intrusion Detection System Based on   Gaming [J]. Systems Engineering-Theory   Methodology Application. 2018. 27 (3): 512-519.

3.   Analysis of Configuration Strategy of Firewall and Intrusion Detection   Systems Based on Evolutionary Game Theory. Mathematics in Practice and   Theory. 2019. 49(10): 97-105.

4.   Information Security Strategy Selection of Competitive Enterprises:   Independent Defense or Outsourcing. Information Studies:Theory &   Application. 2019. 42(12): 94-100 +59.

5. Evolution   Game Research on Enterprise Information Security Sharing in View of   Reputation. Mathematics in Practice and Theory.   2020. 50(16): 285-291.

 

 

Home
TOP