College of Economics and Management: Zhao Liurong
ClickTimes: Release Date:Apr.13,2022
Tutor Information
Name |
Zhao Liurong |
Gender |
Female |

|
Date of Birth |
1986.8 |
Professional Title |
Associate Professor |
E-mail |
zhaoliurong@njtech.edu.cn |
Research Fields |
Information Security Management |
Personal Profile |
Associate Professor of Nanjing Tech University School of Economics & Management, Master Tutor, Visiting Scholar of the University of Maryland. Ms. Zhao has presided over scientific research projects of the National Natural Science Foundation of China, Social Science Foundation of Jiangsu Province, China Postdoctoral Science Foundation, Jiangsu Postdoctoral Science Foundation, Philosophy and Social Science Foundation of Jiangsu Universities, and Social Science Foundation for Young Teachers. In addition, she has directed many lateral projects such as Digital Economy, Transformation of Old Residential Areas and Optimization of Chemical Industry; and she has also taken charge of the First-Class Undergraduate Courses in Jiangsu Province and the Teaching Reform of Nanjing Tech University. Ms. Zhao has published more than 20 academic papers, 2 papers on teaching reform, 1 monograph and 1 textbook. She has served as the tutor of Jiangsu Provincial Postgraduate Practice and Innovation Project, National Undergraduate Innovation and Entrepreneurship Project, and Excellent Undergraduates' Papers of Jiangsu Province. |
Representative Research Projects / Works / Papers |
Scientific research project: the Young Scientists Fund of the National Natural Science Foundation of China: "Research on Decision-Making Mechanism and Strategy Optimization of Information Security Outsourcing Based on Considering Risk Dependence and Competitive Externality". Academic monograph: The Management Strategy of Information System Security Technology: An Information Security Economics Perspective. Southwest University of Finance and Economics Press. 2020. Academic papers: 1、An economic analysis of the interaction between firewall, IDS and vulnerability scan [J]. Economic Computation and Economic Cybernetics Studies and Research, 2015, 49(4): 323-340. 2. Analysis of Configuration Strategy of Honeypot and Intrusion Detection System Based on Gaming [J]. Systems Engineering-Theory Methodology Application. 2018. 27 (3): 512-519. 3. Analysis of Configuration Strategy of Firewall and Intrusion Detection Systems Based on Evolutionary Game Theory. Mathematics in Practice and Theory. 2019. 49(10): 97-105. 4. Information Security Strategy Selection of Competitive Enterprises: Independent Defense or Outsourcing. Information Studies:Theory & Application. 2019. 42(12): 94-100 +59. 5. Evolution Game Research on Enterprise Information Security Sharing in View of Reputation. Mathematics in Practice and Theory. 2020. 50(16): 285-291. |