-
1
-
-
58349083820
-
-
Althoff, K. D., Auriol, E., Bergmann, R., Breen, S., Dittrich, S., & Johnston, R., et al. (1995). Case-based reasoning for decision support and diagnostic problem solving: The INRECA approach. In B. Bartsch-Sp rl, D. Janetzko & S. Wess (Eds.), Proceedings of the 3rd German workshop on CBR, LSA-Report 95-02, Centre for Learning and Applications, University of Kaiserlautern (pp. 63-72).
-
Althoff, K. D., Auriol, E., Bergmann, R., Breen, S., Dittrich, S., & Johnston, R., et al. (1995). Case-based reasoning for decision support and diagnostic problem solving: The INRECA approach. In B. Bartsch-Sp rl, D. Janetzko & S. Wess (Eds.), Proceedings of the 3rd German workshop on CBR, LSA-Report 95-02, Centre for Learning and Applications, University of Kaiserlautern (pp. 63-72).
-
-
-
-
2
-
-
58349103433
-
-
Chan, S., Govindan, M., Picard, J. Y., Leschiutta, E. (1993). EDI for Managers and Auditors, Electronic Data Interchange Council of Canada.
-
Chan, S., Govindan, M., Picard, J. Y., Leschiutta, E. (1993). EDI for Managers and Auditors, Electronic Data Interchange Council of Canada.
-
-
-
-
3
-
-
33750447991
-
A hybrid system by evolving case-based reasoning with genetic algorithm in wholesaler's returning book forecasting
-
Chang P.C., Lai C.Y., and Lai K.R. A hybrid system by evolving case-based reasoning with genetic algorithm in wholesaler's returning book forecasting. Decision Support Systems 42 3 (2006) 1715-1729
-
(2006)
Decision Support Systems
, vol.42
, Issue.3
, pp. 1715-1729
-
-
Chang, P.C.1
Lai, C.Y.2
Lai, K.R.3
-
4
-
-
0141749138
-
Portfolios of control in outsourced software development projects
-
Choudhury V., and Sabherwal R. Portfolios of control in outsourced software development projects. Information Systems Research 14 3 (2003) 291-314
-
(2003)
Information Systems Research
, vol.14
, Issue.3
, pp. 291-314
-
-
Choudhury, V.1
Sabherwal, R.2
-
5
-
-
32544441740
-
Fighting cybercrime: A review and the Taiwan experience
-
Chung W., Chen H., Chang W., and Chou S. Fighting cybercrime: A review and the Taiwan experience. Decision Support Systems 41 3 (2006) 669-682
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
, pp. 669-682
-
-
Chung, W.1
Chen, H.2
Chang, W.3
Chou, S.4
-
6
-
-
58349085026
-
-
Computer Security Institute (2006). CSI/FBI computer crime and security survey.
-
Computer Security Institute (2006). CSI/FBI computer crime and security survey.
-
-
-
-
7
-
-
33845945922
-
Coefficient alpha and the internal structure of tests
-
(September)
-
Cronbach L.J. Coefficient alpha and the internal structure of tests. Psychometrica 16 3 (1951) 297-334 (September)
-
(1951)
Psychometrica
, vol.16
, Issue.3
, pp. 297-334
-
-
Cronbach, L.J.1
-
8
-
-
0042367634
-
Mining e-mail content for author identification forensics
-
de Vel O., Anderson A., Corney M., and Mohay G. Mining e-mail content for author identification forensics. SIGMOD Record 30 4 (2001) 55-64
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 55-64
-
-
de Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
9
-
-
0003487716
-
Case-based reasoning and risk assessment in audit judgment
-
Denna E.L., Hansen J.V., Meservy R.D., and Wood L.E. Case-based reasoning and risk assessment in audit judgment. Intelligent Systems in Accounting, Finance and Management 1 3 (1992) 163-171
-
(1992)
Intelligent Systems in Accounting, Finance and Management
, vol.1
, Issue.3
, pp. 163-171
-
-
Denna, E.L.1
Hansen, J.V.2
Meservy, R.D.3
Wood, L.E.4
-
13
-
-
32544451794
-
Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
-
Gupta M., Rees J., Chaturvedi A., and Chi J. Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach. Decision Support Systems 41 (2006) 592-603
-
(2006)
Decision Support Systems
, vol.41
, pp. 592-603
-
-
Gupta, M.1
Rees, J.2
Chaturvedi, A.3
Chi, J.4
-
15
-
-
34547798962
-
Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
-
Hansen J.V., Lowry P.B., Meservy R.D., and McDonald D.M. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems 43 (2007) 1362-1374
-
(2007)
Decision Support Systems
, vol.43
, pp. 1362-1374
-
-
Hansen, J.V.1
Lowry, P.B.2
Meservy, R.D.3
McDonald, D.M.4
-
16
-
-
58349118652
-
-
ISACF (Information Systems Audit and Control Foundation) (1992). Control objectives, controls in an information systems environments: Controls guidelines and audit procedures (4th ed.). Rolling Meadows, IL, USA.
-
ISACF (Information Systems Audit and Control Foundation) (1992). Control objectives, controls in an information systems environments: Controls guidelines and audit procedures (4th ed.). Rolling Meadows, IL, USA.
-
-
-
-
18
-
-
21144465094
-
Control combinations in marketing: Conceptual framework and empirical evidence
-
Jaworski J.B., Stathakopoulos V., and Krishnan H.S. Control combinations in marketing: Conceptual framework and empirical evidence. Journal of Marketing 57 January (1993) 57-69
-
(1993)
Journal of Marketing
, vol.57
, Issue.January
, pp. 57-69
-
-
Jaworski, J.B.1
Stathakopoulos, V.2
Krishnan, H.S.3
-
19
-
-
13244253851
-
Deploying common systems globally: The dynamics of control
-
Kirsch L.J. Deploying common systems globally: The dynamics of control. Information Systems Research 15 4 (2004) 374-395
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 374-395
-
-
Kirsch, L.J.1
-
20
-
-
0026173429
-
Improving human decision making through case-based decision aiding
-
Kolodner J.L. Improving human decision making through case-based decision aiding. AI Magazine 12 2 (1991) 52-68
-
(1991)
AI Magazine
, vol.12
, Issue.2
, pp. 52-68
-
-
Kolodner, J.L.1
-
22
-
-
0343922164
-
The design of EDI controls using case-based reasoning: EDICBR
-
Lee S., and Han I. The design of EDI controls using case-based reasoning: EDICBR. International Journal of Intelligent Systems in Accounting, Finance, and Management 7 3 (1998) 135-152
-
(1998)
International Journal of Intelligent Systems in Accounting, Finance, and Management
, vol.7
, Issue.3
, pp. 135-152
-
-
Lee, S.1
Han, I.2
-
24
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee S.M., Lee S.G., and Yoo S. An integrative model of computer abuse based on social control and general deterrence theories. Information & Management 41 (2004) 707-718
-
(2004)
Information & Management
, vol.41
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
25
-
-
58349095090
-
-
Lee, W., & Stolfo, S. J. (2000). Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX security symposium, advanced computing systems association (pp. 66-72).
-
Lee, W., & Stolfo, S. J. (2000). Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX security symposium, advanced computing systems association (pp. 66-72).
-
-
-
-
28
-
-
0013279426
-
Case-based reasoning: Market applications and fit with other technologies
-
Mott S. Case-based reasoning: Market applications and fit with other technologies. Expert Systems With Applications 6 1 (1993) 97-104
-
(1993)
Expert Systems With Applications
, vol.6
, Issue.1
, pp. 97-104
-
-
Mott, S.1
-
29
-
-
58349099138
-
-
Warren, Gorham & Lamont, Inc., Boston, MA
-
Murphy M.A., and Parker X.L. Handbook of EDP auditing (1989), Warren, Gorham & Lamont, Inc., Boston, MA
-
(1989)
Handbook of EDP auditing
-
-
Murphy, M.A.1
Parker, X.L.2
-
30
-
-
1242310120
-
The matrix of control: Combining process and structure approaches to managing software development
-
Nidumolu S.R., and Subramni M.R. The matrix of control: Combining process and structure approaches to managing software development. Journal of Management Information Systems 20 3 (2003) 159-196
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.3
, pp. 159-196
-
-
Nidumolu, S.R.1
Subramni, M.R.2
-
33
-
-
9144274460
-
Trust and the unintended effects of behavior control in virtual teams
-
Piccoli G., and Ives B. Trust and the unintended effects of behavior control in virtual teams. MIS Quarterly 27 3 (2003) 365-395
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 365-395
-
-
Piccoli, G.1
Ives, B.2
-
35
-
-
0034838197
-
-
IEEE Computer Society Press, Oakland CA, USA pp. 38-49
-
Schultz M.G., Eskin E., Zadok E., and Stolfo S.J. Data mining methods for detection of new malicious executables. IEEE symposium on security and privacy (2001), IEEE Computer Society Press, Oakland CA, USA pp. 38-49
-
(2001)
IEEE symposium on security and privacy
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
36
-
-
58349087787
-
-
AAAI, Menlo Park, CA
-
Senator T., Goldberg H., Wooton J., Cottini A., Umar A., Klinger C., et al. The FinCEN artificial intelligence system: Identifying potential money laundering from reports of large cash transactions. Proceedings of the 7th conference on innovative applications of AI (1995), AAAI, Menlo Park, CA
-
(1995)
Proceedings of the 7th conference on innovative applications of AI
-
-
Senator, T.1
Goldberg, H.2
Wooton, J.3
Cottini, A.4
Umar, A.5
Klinger, C.6
-
39
-
-
0036004583
-
An empirical examination of the concern for information privacy instrument
-
Stewart K.A., and Segars A.H. An empirical examination of the concern for information privacy instrument. Information Systems Research 13 1 (2002) 36-49
-
(2002)
Information Systems Research
, vol.13
, Issue.1
, pp. 36-49
-
-
Stewart, K.A.1
Segars, A.H.2
-
40
-
-
67649967226
-
The impact of customer trust and perception of security control on the acceptance of electronic commerce
-
Suh B., and Han I. The impact of customer trust and perception of security control on the acceptance of electronic commerce. International Journal of Electronic Commerce 7 3 (2003) 135-161
-
(2003)
International Journal of Electronic Commerce
, vol.7
, Issue.3
, pp. 135-161
-
-
Suh, B.1
Han, I.2
-
41
-
-
1942521938
-
Taxonomy of security considerations and software quality
-
Wang H., and Wang C. Taxonomy of security considerations and software quality. Communications of the ACM 46 6 (2003) 75-78
-
(2003)
Communications of the ACM
, vol.46
, Issue.6
, pp. 75-78
-
-
Wang, H.1
Wang, C.2
-
43
-
-
1242265154
-
In defense of the realm: Understanding the threats to information security
-
Whitman M.E. In defense of the realm: Understanding the threats to information security. International Journal of Information Management 24 4 (2004) 3-57
-
(2004)
International Journal of Information Management
, vol.24
, Issue.4
, pp. 3-57
-
-
Whitman, M.E.1
|