-
1
-
-
0347741428
-
Exponentially fading memory learning in forward-looking economic models
-
Barucci, E. Exponentially fading memory learning in forward-looking economic models. Journal of Economic Dynamics and Control, 24, 5 (2000), 1027-1046.
-
(2000)
Journal of Economic Dynamics and Control
, vol.24
, Issue.5
, pp. 1027-1046
-
-
Barucci, E.1
-
2
-
-
0002638023
-
Securing network software applications: Introduction
-
Bashir, L; Serafini, E.; and Wall, K. Securing network software applications: Introduction. Communications of the ACM, 44, 2 (2001), 28-30.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 28-30
-
-
Bashir, L.1
Serafini, E.2
Wall, K.3
-
3
-
-
66549119254
-
-
Berinato, S. Finally, a return on security spending. CIO Magazine (February 2002) (available at www.cio.com.au/index.php/id;557330171;fp;;fpid;).
-
Berinato, S. Finally, a return on security spending. CIO Magazine (February 2002) (available at www.cio.com.au/index.php/id;557330171;fp;;fpid;).
-
-
-
-
4
-
-
13444274614
-
Evaluating information security investments using the analytic hierarchy process
-
Bodin, L.D.; Gordon, L.A.; and Loeb, M.P. Evaluating information security investments using the analytic hierarchy process. Communications of the ACM, 48, 2 (2005), 78-83.
-
(2005)
Communications of the ACM
, vol.48
, Issue.2
, pp. 78-83
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.P.3
-
5
-
-
0036497756
-
Real options analysis of the timing of IT investment decisions
-
Campbell, J.A. Real options analysis of the timing of IT investment decisions. Information and Management, 39, 5 (2002), 337-344.
-
(2002)
Information and Management
, vol.39
, Issue.5
, pp. 337-344
-
-
Campbell, J.A.1
-
7
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu, H., and Raghunathan, S. Configuration of detection software: A comparison of decision and game theory approaches. INFORMS Decision Analysis, 1, 3 (2005), 131-148.
-
(2005)
INFORMS Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
8
-
-
7444242205
-
The effect of Internet security breach announcements on market value: Capital market reaction for breached firms and Internet security developers
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The effect of Internet security breach announcements on market value: Capital market reaction for breached firms and Internet security developers. International Journal of Electronic Commerce, 9, 1 (2004), 69-105.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-105
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
9
-
-
4243109556
-
A model for evaluating IT security investments
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. A model for evaluating IT security investments. Communications of the ACM, 47, 7 (2004), 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
10
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16, 1 (2005), 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
11
-
-
66549117203
-
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
-
forthcoming
-
Cavusoglu, H.; Raghunathan, S.; and H. Cavusoglu. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, forthcoming (2008).
-
(2008)
Information Systems Research
-
-
Cavusoglu, H.1
Raghunathan, S.2
Cavusoglu, H.3
-
12
-
-
0025755093
-
Evaluation of strategic investments in information technology
-
Clemons, E.K. Evaluation of strategic investments in information technology. Communications of the ACM, 34, 1 (1991), 22-36.
-
(1991)
Communications of the ACM
, vol.34
, Issue.1
, pp. 22-36
-
-
Clemons, E.K.1
-
13
-
-
84909999858
-
Understanding and influencing attackers' decisions: Implications for security investment strategies
-
Paper presented at the, Cambridge, UK, June 26-28
-
Cremonini, M., and Nizovtsev, D. Understanding and influencing attackers' decisions: Implications for security investment strategies. Paper presented at the Workshop on the Economics of Information Security (WEIS), Cambridge, UK, June 26-28, 2006.
-
(2006)
Workshop on the Economics of Information Security (WEIS)
-
-
Cremonini, M.1
Nizovtsev, D.2
-
15
-
-
0001936936
-
Strategic considerations in auditing
-
October
-
Fellingham, J.C., and Newman, D.P. Strategic considerations in auditing. Accounting Review, 60, 4 (October 1985), 634-650.
-
(1985)
Accounting Review
, vol.60
, Issue.4
, pp. 634-650
-
-
Fellingham, J.C.1
Newman, D.P.2
-
17
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E.A., and Ghose, A. The economic incentives for sharing security information. Information Systems Research, 16, 2 (2005), 186-208.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.A.1
Ghose, A.2
-
18
-
-
84990029315
-
The economics of information security investment
-
Gordon, L.A., and Loeb, M.P. The economics of information security investment. ACM Transactions on Information and System Security, 5, 4 (2002), 438-457.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
19
-
-
0344899914
-
Sharing information on computer systems: An economic analysis
-
Gordon, L.A.; Loeb, M.P; and Lucyshyn, W. Sharing information on computer systems: An economic analysis. Journal of Accounting and Public Policy, 22, 6 (2003), 461-485.
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
20
-
-
3242665740
-
Information exploitation and interorganizational systems ownership
-
Fall
-
Han, K.; Kauffman, R.J.; and Nault, B.R. Information exploitation and interorganizational systems ownership. Journal of Management Information Systems, 21, 2 (Fall 2004), 109-135.
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.2
, pp. 109-135
-
-
Han, K.1
Kauffman, R.J.2
Nault, B.R.3
-
21
-
-
33751256271
-
Income, interdependence, and substitution effects affecting incentives for security investment
-
Hausken, K. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25, 6 (2006), 629-665.
-
(2006)
Journal of Accounting and Public Policy
, vol.25
, Issue.6
, pp. 629-665
-
-
Hausken, K.1
-
22
-
-
35348950536
-
Strategic defense and attack for series and parallel reliability systems
-
Hausken, K. Strategic defense and attack for series and parallel reliability systems. European Journal of Operational Research, 186, 2 (2008), 856-881.
-
(2008)
European Journal of Operational Research
, vol.186
, Issue.2
, pp. 856-881
-
-
Hausken, K.1
-
23
-
-
0005788035
-
How firms decide on technology
-
R.E. Litan and A.M. Santomero eds, Washington, DC: Brookings Institution Press
-
Hitt, L.M.; Frei, F.X.; and Harker, P.T. How firms decide on technology. In R.E. Litan and A.M. Santomero (eds.), Brookings/Wharton Papers on Financial Services. Washington, DC: Brookings Institution Press, 1999, pp. 93-136.
-
(1999)
Brookings/Wharton Papers on Financial Services
, pp. 93-136
-
-
Hitt, L.M.1
Frei, F.X.2
Harker, P.T.3
-
25
-
-
66549098332
-
-
Kaplan, R.S. Must CIM be justified by faith alone. Harvard Business Review, 64, 2 (March-April 1986), 87-95.
-
Kaplan, R.S. Must CIM be justified by faith alone. Harvard Business Review, 64, 2 (March-April 1986), 87-95.
-
-
-
-
26
-
-
3042809894
-
Return on security investment: Calculating the security investment equation
-
Karofsky, E. Return on security investment: Calculating the security investment equation. Secure Business Quarterly, 1, 2 (2001).
-
(2001)
Secure Business Quarterly
, vol.1
, pp. 2
-
-
Karofsky, E.1
-
27
-
-
0042260582
-
Editorial - IT investment payoff in e-business environments: Research issues
-
Kohli, R.; Sherer, S.A.; and Baron, A. Editorial - IT investment payoff in e-business environments: Research issues. Information Systems Frontiers, 5, 3 (2003), 239-247.
-
(2003)
Information Systems Frontiers
, vol.5
, Issue.3
, pp. 239-247
-
-
Kohli, R.1
Sherer, S.A.2
Baron, A.3
-
28
-
-
0030307359
-
A note on project risk and option values of investments in information technologies
-
Summer
-
Kumar, R.L. A note on project risk and option values of investments in information technologies. Journal of Management Information Systems, 13, 1 (Summer 1996), 187-193.
-
(1996)
Journal of Management Information Systems
, vol.13
, Issue.1
, pp. 187-193
-
-
Kumar, R.L.1
-
29
-
-
0037786763
-
Interdependent security
-
Kunreuther, H., and Heal, G. Interdependent security. Journal of Risk and Uncertainty, 26, 3(2003), 231-249.
-
(2003)
Journal of Risk and Uncertainty
, vol.26
, Issue.3
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
30
-
-
66549088878
-
The economics of computer hacking
-
Leeson, P., and Coyne, C.J. The economics of computer hacking. Journal of Law, Economics and Policy, 1, 2 (2006), 511-532.
-
(2006)
Journal of Law, Economics and Policy
, vol.1
, Issue.2
, pp. 511-532
-
-
Leeson, P.1
Coyne, C.J.2
-
31
-
-
0034501202
-
Are we forgetting the risk of information technology?
-
December
-
Longstaff, T.; Chittister, C.; Pethia, R.; and Haimes, Y. Are we forgetting the risk of information technology? IEEE Computer, 33, 12 (December 2000), 43-51.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 43-51
-
-
Longstaff, T.1
Chittister, C.2
Pethia, R.3
Haimes, Y.4
-
32
-
-
4844227656
-
The survivability of network systems: An empirical analysis
-
Carnegie Mellon University, Pittsburgh, PA, December
-
Moitra, S.D., and Konda, S.L. The survivability of network systems: An empirical analysis. CMU/SEI-2000-TR-021, Software Engineering Institute/Computer Emergency Response Team (SEI/CERT) Report, Carnegie Mellon University, Pittsburgh, PA, December 2000.
-
(2000)
CMU/SEI-2000-TR-021, Software Engineering Institute/Computer Emergency Response Team (SEI/CERT) Report
-
-
Moitra, S.D.1
Konda, S.L.2
-
33
-
-
0035265977
-
CSI/FBI computer crime and security survey
-
Spring
-
Power, R. 2002 CSI/FBI computer crime and security survey. Computer Security Journal, 17, 2 (Spring 2002), 29-51.
-
(2002)
Computer Security Journal
, vol.17
, Issue.2
, pp. 29-51
-
-
Power, R.1
-
34
-
-
70449846056
-
Risk analysis for information technology
-
Summer
-
Rainer, R.K.; Snyder, C.A.; and Carr, H.H. Risk analysis for information technology. Journal of Management Information Systems, 8, 1 (Summer 1991), 129-148.
-
(1991)
Journal of Management Information Systems
, vol.8
, Issue.1
, pp. 129-148
-
-
Rainer, R.K.1
Snyder, C.A.2
Carr, H.H.3
-
36
-
-
0002290655
-
Eight imperatives for the new IT organization
-
Rockart, J.F.; Earl, M.J.; and Ross, J.W. Eight imperatives for the new IT organization. Sloan Management Review, 38, 1 (1996), 43-55.
-
(1996)
Sloan Management Review
, vol.38
, Issue.1
, pp. 43-55
-
-
Rockart, J.F.1
Earl, M.J.2
Ross, J.W.3
-
37
-
-
0034204627
-
-
Rothke, B. Hackers then and now: Answers to some perennial questions. Computer Security Journal, 16, 3 (2000), 11-14.
-
Rothke, B. Hackers then and now: Answers to some perennial questions. Computer Security Journal, 16, 3 (2000), 11-14.
-
-
-
-
38
-
-
35248853499
-
How much security is enough to stop a thief?
-
R.N. Wright ed, New York: Springer-Verlag
-
Schechter, S.E., and Smith, M.D. How much security is enough to stop a thief? In R.N. Wright (ed.), Proceedings of the Seventh International Financial Cryptography Conference. New York: Springer-Verlag, 2003, pp. 122-137.
-
(2003)
Proceedings of the Seventh International Financial Cryptography Conference
, pp. 122-137
-
-
Schechter, S.E.1
Smith, M.D.2
-
39
-
-
0347887514
-
Inside the minds of the insider
-
December
-
Shaw, D.S.; Post, J.M.; and Ruby, K.G. Inside the minds of the insider. Security Management, 43, 12 (December 1999), 34-44.
-
(1999)
Security Management
, vol.43
, Issue.12
, pp. 34-44
-
-
Shaw, D.S.1
Post, J.M.2
Ruby, K.G.3
-
40
-
-
84868947404
-
Hackers shift focus to financial gain
-
available at
-
Sieberg, D. Hackers shift focus to financial gain. CNN.com (available at www.cnn.com/2005/TECH/internet/09/26/identity.hacker/).
-
CNN.com
-
-
Sieberg, D.1
-
41
-
-
66549096068
-
-
Stoneburner, G.; Goguen, A.; and Feringa, A. Risk management guide for information technology systems. National Institute of Standards and Technology Special Publications 800-30, White Paper, U.S. Department of Commerce, Gaithersburg, MD, 2002.
-
Stoneburner, G.; Goguen, A.; and Feringa, A. Risk management guide for information technology systems. National Institute of Standards and Technology Special Publications 800-30, White Paper, U.S. Department of Commerce, Gaithersburg, MD, 2002.
-
-
-
-
42
-
-
33748594201
-
An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
-
Spring
-
Sun, L.; Srivastava, R.P.; and Mock, T.J. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22, 4 (Spring 2006), 109-142.
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.1
Srivastava, R.P.2
Mock, T.J.3
-
44
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive response
-
Summer
-
Yue, W, and Çakanyildirim, M. Intrusion prevention in information systems: Reactive and proactive response. Journal of Management Information Systems, 24, 1 (Summer 2007), 329-353.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.1
Çakanyildirim, M.2
|