Your position: Home> Study> Tutor> 正文

College of Economics and Management: Zhao Liurong

Tutor Information

Name

Zhao Liurong

Gender

Female

Date of Birth

1986.8

Professional Title

Associate Professor

E-mail

zhaoliurong@njtech.edu.cn

Research Fields

Information Security Management

Personal Profile

Associate Professor ofNanjing Tech University School of Economics & Management,Master Tutor, Visiting Scholar of the University of Maryland. Ms. Zhao has presided over scientific research projects of the National Natural Science Foundation of China, Social Science Foundation of Jiangsu Province, China Postdoctoral Science Foundation, Jiangsu Postdoctoral Science Foundation, Philosophy and Social Science Foundation of Jiangsu Universities, and Social Science Foundation for Young Teachers. In addition, she has directed many lateral projects such as Digital Economy, Transformation of Old Residential Areas and Optimization of Chemical Industry; and she has also taken charge of the First-Class Undergraduate Courses in Jiangsu Province and the Teaching Reform of Nanjing Tech University.

Ms. Zhao has published more than 20 academic papers, 2 papers on teaching reform, 1 monograph and 1 textbook. She has served as the tutor of Jiangsu Provincial Postgraduate Practice and Innovation Project, National Undergraduate Innovation and Entrepreneurship Project, and Excellent Undergraduates' Papers of Jiangsu Province.

Representative Research Projects / Works / Papers

Scientific research project:the Young Scientists Fund of the National Natural Science Foundation of China: "Research on Decision-Making Mechanism and Strategy Optimization of Information Security Outsourcing Based on Considering Risk Dependence and Competitive Externality".

Academic monograph:The Management Strategy of Information System Security Technology: An Information Security Economics Perspective. Southwest University of Finance and Economics Press. 2020.

Academic papers:

1An economic analysis of the interaction between firewall, IDS and vulnerability scan [J]. Economic Computation and Economic Cybernetics Studies and Research, 2015, 49(4): 323-340.

2.Analysis of Configuration Strategy of Honeypot and Intrusion Detection System Based on Gaming [J]. Systems Engineering-Theory Methodology Application. 2018. 27 (3): 512-519.

3.Analysis of Configuration Strategy of Firewall and Intrusion Detection Systems Based on Evolutionary Game Theory. Mathematics in Practice and Theory. 2019. 49(10): 97-105.

4. Information Security Strategy Selection of Competitive Enterprises: Independent Defense or Outsourcing. Information Studies:Theory & Application. 2019. 42(12): 94-100 +59.

5.Evolution Game Research on Enterprise Information Security Sharing in View of Reputation. Mathematics in Practice and Theory. 2020. 50(16): 285-291.

Baidu