메뉴 건너뛰기




Volumn 10, Issue 4, 2008, Pages 14-19

Managing risk propagation in extended enterprise networks

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS NETWORKS; COORDINATION POLICIES; EXTENDED ENTERPRISES; INFORMATION SECURITY; MANAGE INFORMATION; SECURITY RISKS; SITUATION AWARENESS;

EID: 49249117338     PISSN: 15209202     EISSN: None     Source Type: Journal    
DOI: 10.1109/MITP.2008.90     Document Type: Article
Times cited : (19)

References (11)
  • 2
    • 4243109556 scopus 로고    scopus 로고
    • A Model for Evaluating IT Security Investments
    • H. Cavusoglu, B. Mishra, and S. Raghunathan, "A Model for Evaluating IT Security Investments," Comm. ACM, vol. 47, no. 7, 2004, pp. 87-92.
    • (2004) Comm. ACM , vol.47 , Issue.7 , pp. 87-92
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 3
    • 49849096421 scopus 로고    scopus 로고
    • In Data Leaks, Culprits often are Mom, Pop
    • 22-23 Sept
    • R. Sidel, "In Data Leaks, Culprits often are Mom, Pop," Wall Street J., 22-23 Sept. 2007, p. B1.
    • (2007) Wall Street J
    • Sidel, R.1
  • 5
    • 70450256774 scopus 로고    scopus 로고
    • Bill Would Punish Retailers for Leaks of Personal Data
    • 27 Feb
    • J. Pereira, "Bill Would Punish Retailers for Leaks of Personal Data," Wall Street J., 27 Feb. 2007, p. B1.
    • (2007) Wall Street J
    • Pereira, J.1
  • 6
    • 0033539175 scopus 로고    scopus 로고
    • Diameter of the World-Wide Web
    • R. Albert, H. Jeong, and A.L. Barabási, "Diameter of the World-Wide Web," Nature, vol. 401, no. 6749, 1999, pp. 130-131.
    • (1999) Nature , vol.401 , Issue.6749 , pp. 130-131
    • Albert, R.1    Jeong, H.2    Barabási, A.L.3
  • 7
    • 0034721164 scopus 로고    scopus 로고
    • Error and Attack Tolerance of Complex Networks
    • R. Albert, H. Jeong, and A.L. Barabási, "Error and Attack Tolerance of Complex Networks," Nature, vol. 406, no. 6794, 2000, pp. 378-382.
    • (2000) Nature , vol.406 , Issue.6794 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabási, A.L.3
  • 8
    • 19944417270 scopus 로고    scopus 로고
    • Infection Dynamics on the Internet
    • D.B. Chang, and C.S. Young, "Infection Dynamics on the Internet," Computer & Security, vol. 24, 2005, pp. 280-286.
    • (2005) Computer & Security , vol.24 , pp. 280-286
    • Chang, D.B.1    Young, C.S.2
  • 9
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of Scaling in Random Networks
    • A.L. Barabási and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, no. 5439, 1999, pp. 509-512.
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabási, A.L.1    Albert, R.2
  • 10
    • 34047184222 scopus 로고    scopus 로고
    • The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities
    • C.W. Craighead et al., "The Severity of Supply Chain Disruptions: Design Characteristics and Mitigation Capabilities," Decision Sciences, vol. 38, no. 1, 2007, pp. 131-156.
    • (2007) Decision Sciences , vol.38 , Issue.1 , pp. 131-156
    • Craighead, C.W.1
  • 11
    • 0002663868 scopus 로고    scopus 로고
    • The Bullwhip Effect in Supply Chains
    • H.L. Lee, V. Padmanabhan, and S. Whang, "The Bullwhip Effect in Supply Chains," Sloan Management Rev., vol. 38, no. 3, 1997, pp. 93-102.
    • (1997) Sloan Management Rev , vol.38 , Issue.3 , pp. 93-102
    • Lee, H.L.1    Padmanabhan, V.2    Whang, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.