-
1
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
D. W. Straub and R. J. Welke, "Coping with systems risk: Security planning models for management decision making," MIS Quarterly, vol. 22, no. 4, pp. 441-469, 1998.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
2
-
-
71549173177
-
Toward an assessment of software development risk
-
H. S. Barki, S. Rivard, and J. Talbot, "Toward an assessment of software development risk," Journal of Management Information Systems, vol. 10, no. 2, pp. 203-225, 1993.
-
(1993)
Journal of Management Information Systems
, vol.10
, Issue.2
, pp. 203-225
-
-
Barki, H.S.1
Rivard, S.2
Talbot, J.3
-
3
-
-
0034899940
-
An integrative contingency model of software project risk management
-
H. S. Barki, S. Rivard, and J. Talbot, "An integrative contingency model of software project risk management," Journal of Management Information Systems, vol. 17, no. 4, pp. 37-69, 2001.
-
(2001)
Journal of Management Information Systems
, vol.17
, Issue.4
, pp. 37-69
-
-
Barki, H.S.1
Rivard, S.2
Talbot, J.3
-
4
-
-
1142273446
-
PFIRES: A policy framework for information security
-
J. Rees, S. Bandyopadhyay, and E. H. Spafford, "PFIRES: A policy framework for information security," Communications of the ACM, vol. 46, no. 7, pp. 101-106, 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.7
, pp. 101-106
-
-
Rees, J.1
Bandyopadhyay, S.2
Spafford, E.H.3
-
6
-
-
70449846056
-
Risk analysis for information technology
-
R. K. Rainer, Jr., C. A. Snyder, and H. H. Carr, "Risk analysis for information technology," Journal of Management Information Systems, vol. 8, no. 1, pp. 129-147, 1991.
-
(1991)
Journal of Management Information Systems
, vol.8
, Issue.1
, pp. 129-147
-
-
Rainer Jr., R.K.1
Snyder, C.A.2
Carr, H.H.3
-
7
-
-
0028731436
-
TOPM: A formal approach to the optimization of information technology risk management
-
K. P. Badenhorst and J. H. P. Eloff, "TOPM: A formal approach to the optimization of information technology risk management," Computers & Security, vol. 13, no. 5, pp. 411-435, 1994.
-
(1994)
Computers & Security
, vol.13
, Issue.5
, pp. 411-435
-
-
Badenhorst, K.P.1
Eloff, J.H.P.2
-
8
-
-
55049093339
-
Client issues for critical infrastructure protection
-
R. Mogull and R. Wagner, "Client issues for critical infrastructure protection," Gartner Group Research Note K-20-7776, 2003.
-
(2003)
Gartner Group Research Note
, vol.K-20-7776
-
-
Mogull, R.1
Wagner, R.2
-
10
-
-
0030658708
-
Risk analysis: Requirements, conflicts and problems
-
Z. Ciechanowicz, "Risk analysis: Requirements, conflicts and problems," Computers & Security, vol. 16, no. 3, pp. 223-232, 1997.
-
(1997)
Computers & Security
, vol.16
, Issue.3
, pp. 223-232
-
-
Ciechanowicz, Z.1
-
11
-
-
0025862343
-
Applications of probabilistic risk assessments: The selection of appropriate tools
-
J. Linnerooth-Bayer and B. Wahlstrom, "Applications of probabilistic risk assessments: The selection of appropriate tools," Risk Analysis, vol. 11, no. 2, pp. 239-248 1991.
-
(1991)
Risk Analysis
, vol.11
, Issue.2
, pp. 239-248
-
-
Linnerooth-Bayer, J.1
Wahlstrom, B.2
-
12
-
-
0034581332
-
A modeling framework for exposing risks in complex systems
-
J. Sharit, "A modeling framework for exposing risks in complex systems," Risk Analysis, vol. 20, no. 4, pp. 469-482, 2000.
-
(2000)
Risk Analysis
, vol.20
, Issue.4
, pp. 469-482
-
-
Sharit, J.1
-
13
-
-
0019540987
-
On the quantitative definition of risk
-
S. Kaplan and B. J. Garrick, "On the quantitative definition of risk," Risk Analysis, vol. 1, no. 1, pp. 11-27, 1981.
-
(1981)
Risk Analysis
, vol.1
, Issue.1
, pp. 11-27
-
-
Kaplan, S.1
Garrick, B.J.2
-
15
-
-
55249117122
-
A stochastic dominance approach to risk analysis of computer systems
-
Dec
-
G. V Post and J. D. Diltz, "A stochastic dominance approach to risk analysis of computer systems," MIS Quarterly, pp. 363-375, Dec. 1986.
-
(1986)
MIS Quarterly
, pp. 363-375
-
-
Post, G.V.1
Diltz, J.D.2
-
16
-
-
72249114849
-
Information systems success: The quest for the dependent variable
-
W. H. Delone and E. R. Mclean, "Information systems success: The quest for the dependent variable," Information Systems Research, vol. 3, no. 1, pp. 60-95, 1992.
-
(1992)
Information Systems Research
, vol.3
, Issue.1
, pp. 60-95
-
-
Delone, W.H.1
Mclean, E.R.2
-
17
-
-
0031482189
-
A respecification and extension of the DeLone and McLean Model of IS success
-
P. B. Seddon, "A respecification and extension of the DeLone and McLean Model of IS success," Information Systems Research, vol. 8, no. 3, pp. 240-253, 1997.
-
(1997)
Information Systems Research
, vol.8
, Issue.3
, pp. 240-253
-
-
Seddon, P.B.1
-
18
-
-
0036004587
-
Assessing the validity of IS success models: An empirical test and theoretical analysis
-
A. Rai, S. S. Lang, and R. B. Welker, "Assessing the validity of IS success models: An empirical test and theoretical analysis," Information Systems Research, vol. 13, no. 1, pp. 50-69, 2002.
-
(2002)
Information Systems Research
, vol.13
, Issue.1
, pp. 50-69
-
-
Rai, A.1
Lang, S.S.2
Welker, R.B.3
-
19
-
-
0000280419
-
Effective IS security: An empirical study
-
D. W. Straub, Jr., "Effective IS security: An empirical study," Information Systems Research, vol. 1, no. 3, pp. 255-276, 1990.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub Jr., D.W.1
-
20
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
K. Campbell, L. A. Gordon, M. P. Loeb, and L. Zhou, "The economic cost of publicly announced information security breaches: Empirical evidence from the stock market," Journal of Computer Security, vol. 11, pp. 431-447, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 431-447
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
21
-
-
7444242205
-
The effect of Internet security breach announcements on market value of breached firms and Internet security developers
-
Forthcoming
-
H. Cavusoglu, B. Mishra, and S. Raghunathan, "The effect of Internet security breach announcements on market value of breached firms and Internet security developers," International Journal of Electronic Commerce (Forthcoming), 2004.
-
(2004)
International Journal of Electronic Commerce
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
|