-
1
-
-
84976842520
-
Lessons learned from modeling the dynamics of software development
-
Abdel-Hamid T, Madnick S. 1989. Lessons learned from modeling the dynamics of software development. Communications of the ACM 32(12):1426-1455.
-
(1989)
Communications of the ACM
, vol.32
, Issue.12
, pp. 1426-1455
-
-
Abdel-Hamid, T.1
Madnick, S.2
-
2
-
-
34249871944
-
A qualitative study of user's view on information security
-
Albrechtsen E. 2007. A qualitative study of user's view on information security. Computers and Security 26(4): 276.
-
(2007)
Computers and Security
, vol.26
, Issue.4
, pp. 276
-
-
Albrechtsen, E.1
-
3
-
-
33750440197
-
The economics of information security
-
Anderson R, Moore T. 2006. The economics of information security. Science 314(5799): 610-613.
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
4
-
-
33846183559
-
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
-
Arora A, Nandkumar A, Telang R. 2006. Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers 8(5): 350.
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.5
, pp. 350
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
5
-
-
33750703619
-
Network software ecurity and user incentives
-
August T, Tunca TI. 2006. Network software "ecurity and user incentives. Management Science 52(11): 1703-1720.
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
6
-
-
61349202831
-
Let the pirates patch? An economic analysis of software security patch restrictions
-
August T, Tunca TI. 2008. Let the pirates patch? An economic analysis of software security patch restrictions. Information Systems Research 19(1): 48-70.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 48-70
-
-
August, T.1
Tunca, T.I.2
-
7
-
-
2642549662
-
Computer security. and risky computing practices: A rational choice perspective
-
Aytes K, Connolly T. 2004. Computer security. and risky computing practices: a rational choice perspective. Journal of Organizational and End User Computing 16(3): 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
8
-
-
19944380112
-
Database security: Concepts, approaches, and challenges
-
Bertino E, Sandhu R. 2005. Database security: concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing 2(1): 2-19.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.2
-
9
-
-
63649151361
-
Security breaches hitting home. American Banker$ Association
-
Bielski L. 2005. Security breaches hitting home. American Banker$ Association. ABA Banking Journal 97(6): 7-8.
-
(2005)
ABA Banking Journal
, vol.97
, Issue.6
, pp. 7-8
-
-
Bielski, L.1
-
10
-
-
63649123786
-
Data security no longer a technical issue: Lawyers point to corporate legal obligations
-
Bologna M. 2005. Data security no longer a technical issue: lawyers point to corporate legal obligations. BNA's Banking Report 84(15): 681-682.
-
(2005)
BNA's Banking Report
, vol.84
, Issue.15
, pp. 681-682
-
-
Bologna, M.1
-
12
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell K, Gordon LA, Loeb MP, Zhou L. 2003. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11(3): 431-448.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
13
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu H, Mishra B, Raghunathan S. 2005. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16(1): 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
14
-
-
61849135265
-
Security patch management: Share the burden or share the damage?
-
Cavusoglu H, Cavusoglu H, Zhang J. 2008. Security patch management: share the burden or share the damage? Management Science 54(4): 657-670.
-
(2008)
Management Science
, vol.54
, Issue.4
, pp. 657-670
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
15
-
-
61349159889
-
Perceptions of information security in the workplace: Linking information security climate to compliant behavior
-
Chan M, Woon I, Kankanhalli A. 2005. Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of Information Privacy and Security 1(3): 18-41.
-
(2005)
Journal of Information Privacy and Security
, vol.1
, Issue.3
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
16
-
-
60049085275
-
Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system
-
Chen CC, Shaw RS, Yang SC. 2006. Mitigating information security risks by increasing user security awareness: a case study of an information security awareness system. Information Technology, Learning, and Performance Journal 24(1): 1-14.
-
(2006)
Information Technology, Learning, and Performance Journal
, vol.24
, Issue.1
, pp. 1-14
-
-
Chen, C.C.1
Shaw, R.S.2
Yang, S.C.3
-
17
-
-
34249060259
-
Evaluating application service provisioning using system dynamics methodology
-
Currie WL, Joyce P, Winch G. 2007. Evaluating application service provisioning using system dynamics methodology. British Journal of Management 18(2): 172-191.
-
(2007)
British Journal of Management
, vol.18
, Issue.2
, pp. 172-191
-
-
Currie, W.L.1
Joyce, P.2
Winch, G.3
-
19
-
-
0037534168
-
Performance impacts of information technology: Is actual usage the missing link?
-
Devaraj S, Kohli R. 2003. Performance impacts of information technology: is actual usage the missing link? Management Science 49(3): 273-289.
-
(2003)
Management Science
, vol.49
, Issue.3
, pp. 273-289
-
-
Devaraj, S.1
Kohli, R.2
-
20
-
-
0036765493
-
Management's role in information security in a cyber economy
-
Dutta A, McCrohan K. 2002. Management's role in information security in a cyber economy. California Management Review 45(1): 67-87.
-
(2002)
California Management Review
, vol.45
, Issue.1
, pp. 67-87
-
-
Dutta, A.1
McCrohan, K.2
-
21
-
-
28844477995
-
Offshore outsourcing: A dynamic causal modell of counteracting forces
-
Dutta A, Roy R. 2005. Offshore outsourcing: a dynamic causal modell of counteracting forces, Journal of Management Information Systems 22(2): 15-35.
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.2
, pp. 15-35
-
-
Dutta, A.1
Roy, R.2
-
22
-
-
63649153633
-
Customer information: Protecting the organization's most critical asset from misappropriation and identity theft
-
Ellison RJ, LeClerc R. 2006. Customer information: protecting the organization's most critical asset from misappropriation and identity theft. Journal of Information Privacy and Security 2(1): 3-15.
-
(2006)
Journal of Information Privacy and Security
, vol.2
, Issue.1
, pp. 3-15
-
-
Ellison, R.J.1
LeClerc, R.2
-
23
-
-
63649158641
-
In wake of FTC investigation, monster touts new safeguards
-
Frauenheim E. 2008. In wake of FTC investigation, monster touts new safeguards. Workforce Management 87(4): 4.
-
(2008)
Workforce Management
, vol.87
, Issue.4
, pp. 4
-
-
Frauenheim, E.1
-
24
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or E, Ghose A. 2005. The economic incentives for sharing security information. Information Systems Research 16(2): 186-208.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
25
-
-
63449140968
-
Disruptive innovation strategy effects the on hard-disk maker population: A system dynamics study
-
Georgantzas NC, Katsamakas E. 2007. Disruptive innovation strategy effects the on hard-disk maker population: a system dynamics study. Information Resources Management Journal 20(2): 90-107.
-
(2007)
Information Resources Management Journal
, vol.20
, Issue.2
, pp. 90-107
-
-
Georgantzas, N.C.1
Katsamakas, E.2
-
29
-
-
33846128415
-
Economic aspects of information security: An emerging field of research
-
Gordon LA, Loeb MP. 2006. Economic aspects of information security: an emerging field of research. Information Systemg Frontiers 8(5): 335.
-
(2006)
Information Systemg Frontiers
, vol.8
, Issue.5
, pp. 335
-
-
Gordon, L.A.1
Loeb, M.P.2
-
30
-
-
0038445906
-
Quality improvement and infrastructure activity costs in software development: A longitudinal analysis
-
Harter DE, Slaughter SA. 2003. Quality improvement and infrastructure activity costs in software development: a longitudinal analysis. Management Science 49(6): 784-800.
-
(2003)
Management Science
, vol.49
, Issue.6
, pp. 784-800
-
-
Harter, D.E.1
Slaughter, S.A.2
-
31
-
-
33846138611
-
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
-
Hausken K. 2006. Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers 8(5): 338.
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.5
, pp. 338
-
-
Hausken, K.1
-
33
-
-
33644533141
-
Information security: Management's effect on culture and policy
-
Knapp KJ, Marshall TE, Rainer RK, Ford FN. 2006. Information security: management's effect on culture and policy. Information Management and Computer Security 14(1): 24-36.
-
(2006)
Information Management and Computer Security
, vol.14
, Issue.1
, pp. 24-36
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
-
34
-
-
33750513188
-
Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
-
Kraemer S, Carayon P. 2007. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. Applied Ergonomics 38(2): 143.
-
(2007)
Applied Ergonomics
, vol.38
, Issue.2
, pp. 143
-
-
Kraemer, S.1
Carayon, P.2
-
35
-
-
7444249783
-
A framework for assessing the business value of information technology infrastructures
-
Kumar R. 2004. A framework for assessing the business value of information technology infrastructures. Journal of Management Information Systems 21(2): 11-32.
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.2
, pp. 11-32
-
-
Kumar, R.1
-
36
-
-
63649139643
-
The human element: The weakest link in information security
-
44-46
-
Lineberry S. 2007. The human element: the weakest link in information security. Journal of Accountancy 204(5): 44-46, 49.
-
(2007)
Journal of Accountancy
, vol.204
, Issue.5
, pp. 49
-
-
Lineberry, S.1
-
37
-
-
46149087323
-
Modeling the emergence of insider threat vulnerabilities
-
Monterey, CA;
-
Martinez-Moyano IJ, Rich EH, Conrad SH, Aridersen DF. 2006. Modeling the emergence of insider threat vulnerabilities. In Proceedings of 38th Winter Simulation Conference, Monterey, CA; 562-568.
-
(2006)
Proceedings of 38th Winter Simulation Conference
, pp. 562-568
-
-
Martinez-Moyano, I.J.1
Rich, E.H.2
Conrad, S.H.3
Aridersen, D.F.4
-
38
-
-
35348859021
-
Perception of risk and the strategic impact of existing IT on information security strategy at board level
-
McFadzean E, Ezingeard JN, Birchall D. 2007. Perception of risk and the strategic impact of existing IT on information security strategy at board level. Online Information Review 31(5): 622.
-
(2007)
Online Information Review
, vol.31
, Issue.5
, pp. 622
-
-
McFadzean, E.1
Ezingeard, J.N.2
Birchall, D.3
-
39
-
-
63649142259
-
-
Moore A, Cappelli D, Joseph H, Trzeciak R. 2007. An experience using system dynamics to facilitate an insider threat workshop. In Proceedings of the International System Dynamics Conference, Boston, MA.
-
Moore A, Cappelli D, Joseph H, Trzeciak R. 2007. An experience using system dynamics to facilitate an insider threat workshop. In Proceedings of the International System Dynamics Conference, Boston, MA.
-
-
-
-
40
-
-
0022093750
-
Rationality in the analysis of behavioral simulatidn models
-
Morecroft JDW. 1985. Rationality in the analysis of behavioral simulatidn models. Management Science 31(7): 900-916.
-
(1985)
Management Science
, vol.31
, Issue.7
, pp. 900-916
-
-
Morecroft, J.D.W.1
-
41
-
-
63649157114
-
VA creating-security culture
-
Mosquera M. 2008. VA creating-security culture. Federal Computer Week 22(7): 12.
-
(2008)
Federal Computer Week
, vol.22
, Issue.7
, pp. 12
-
-
Mosquera, M.1
-
42
-
-
63649115332
-
Data secured? Taking on cyber-thievery
-
22 24
-
O'Rourke M. 2005. Data secured? Taking on cyber-thievery. Risk Management 52(10): 18-20, 22, 24.
-
(2005)
Risk Management
, vol.52
, Issue.10
, pp. 18-20
-
-
O'Rourke, M.1
-
44
-
-
0000633713
-
Boom, bust and failures to learn in experimental markets
-
Paich M, Sterman JD. 1993. Boom, bust and failures to learn in experimental markets. Management Science 39(12): 1439-1458.
-
(1993)
Management Science
, vol.39
, Issue.12
, pp. 1439-1458
-
-
Paich, M.1
Sterman, J.D.2
-
45
-
-
63649130091
-
Intelligence is the best defense
-
Piazza P. 2004. Intelligence is the best defense. Security Management 48(9): 56-65.
-
(2004)
Security Management
, vol.48
, Issue.9
, pp. 56-65
-
-
Piazza, P.1
-
46
-
-
63649093962
-
-
Clickstream data reveals top five increases in vehicle make searches on kbb.com. 22 March
-
PR Newswire 2006. Clickstream data reveals top five increases in vehicle make searches on kbb.com. 22 March.
-
(2006)
PR Newswire
-
-
-
48
-
-
63649149545
-
Simulating insider cyber-threat risks: A model-based case and a case-based model
-
Boston, MA
-
Rich E, Martinez-Moyano IJ, Conrad S, Cappelli DM, Moore AP, Shimeall TJ, Andersen DF, Gonzalez JJ, Ellison RJ, Lipson HF, Mundie DA, Sarriegui JM, Sawicka A, Stewart TR, Torres JM, Weaver EA, Wiik J. 2005. Simulating insider cyber-threat risks: a model-based case and a case-based model. In Proceedings of the International-System Dynamics Conference, Boston, MA.
-
(2005)
Proceedings of the International-System Dynamics Conference
-
-
Rich, E.1
Martinez-Moyano, I.J.2
Conrad, S.3
Cappelli, D.M.4
Moore, A.P.5
Shimeall, T.J.6
Andersen, D.F.7
Gonzalez, J.J.8
Ellison, R.J.9
Lipson, H.F.10
Mundie, D.A.11
Sarriegui, J.M.12
Sawicka, A.13
Stewart, T.R.14
Torres, J.M.15
Weaver, E.A.16
Wiik, J.17
-
51
-
-
33748594201
-
An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
-
Sun L, Srivastava RP, Mock TJ. 2006. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems 22(4): 109-142.
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.1
Srivastava, R.P.2
Mock, T.J.3
-
52
-
-
35548988920
-
Overcoming organizational challenges to secure knowledge
-
Sveen FO, Rich E, Jager M. 2007a. Overcoming organizational challenges to secure knowledge. Information Systems Frontiers 9(5): 481-492.
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 481-492
-
-
Sveen, F.O.1
Rich, E.2
Jager, M.3
-
53
-
-
34948812617
-
Toward viable information security reporting systems
-
Sveen FO, Sarriegi JM, Rich E, Gonzalez JJ. 2007b. Toward viable information security reporting systems. Information Management and Computer Security 15(5): 408-419.
-
(2007)
Information Management and Computer Security
, vol.15
, Issue.5
, pp. 408-419
-
-
Sveen, F.O.1
Sarriegi, J.M.2
Rich, E.3
Gonzalez, J.J.4
-
54
-
-
34547409379
-
Modeling The IT value paradox. Association for Computing Machinery
-
Thatcher ME, Pingry DE. 2007. Modeling The IT value paradox. Association for Computing Machinery. Communications of the ACM 50(8): 41-45.
-
(2007)
Communications of the ACM
, vol.50
, Issue.8
, pp. 41-45
-
-
Thatcher, M.E.1
Pingry, D.E.2
-
55
-
-
61349180141
-
A value-at-risk approach to information security investment
-
Wang J, Chaudhury A, Rao HR. 2008. A value-at-risk approach to information security investment. Information Systems Research 19(1): 106-123.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 106-123
-
-
Wang, J.1
Chaudhury, A.2
Rao, H.R.3
-
56
-
-
33750683067
-
Understanding the perpetration of employee computer crime in the organisational context
-
Willison R. 2006. Understanding the perpetration of employee computer crime in the organisational context. Information and Organization 16(4): 304.
-
(2006)
Information and Organization
, vol.16
, Issue.4
, pp. 304
-
-
Willison, R.1
|