-
1
-
-
77249159222
-
When the law chases the internet
-
"When the Law Chases the Internet," Christian Science Monitor, vol.98, no.77, 2006, p. 8.
-
(2006)
Christian Science Monitor
, vol.98
, Issue.77
, pp. 8
-
-
-
2
-
-
77249119594
-
Firms trying to crack down on cybercrime
-
9 Feb
-
C. Madden, "Firms Trying to Crack Down on Cybercrime," The Irish Times, 9 Feb. 2007, p. 14.
-
(2007)
The Irish Times
, pp. 14
-
-
Madden, C.1
-
3
-
-
84891427413
-
Authentication technology: Identity theft and account takeover
-
J. Pollock and J. May, "Authentication Technology: Identity Theft and Account Takeover," FBI Law Enforcement Bulletin, vol.71, no.6, 2002, pp. 1-4; www.fbi. gov/publications/leb/2002/june2002/june02leb.htm.
-
(2002)
FBI Law Enforcement Bulletin
, vol.71
, Issue.6
, pp. 1-4
-
-
Pollock, J.1
May, J.2
-
4
-
-
34250015784
-
Embedding information security into the organization
-
M.E. Johnson and E. Goetz, "Embedding Information Security into the Organization," IEEE Security & Privacy, vol.5, no.3, 2007, pp. 16-24.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.3
, pp. 16-24
-
-
Johnson, M.E.1
Goetz, E.2
-
5
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
K. Campbell et al., "The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market," J. Computer Security, vol.11, no.3, 2003, pp. 431-448.
-
(2003)
J. Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
-
6
-
-
54049098864
-
A life or death infosec subversion
-
C. Viecco and J. Camp, "A Life or Death InfoSec Subversion," IEEE Security & Privacy, vol.6, no.5, 2008, pp. 74-76.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.5
, pp. 74-76
-
-
Viecco, C.1
Camp, J.2
-
7
-
-
33750966470
-
Exploring the characteristics of internet security breaches that impact the market value of breached firms
-
F.K. Andoh-Baidoo and K.-M. Osei-Bryson, "Exploring the Characteristics of Internet Security Breaches that Impact the Market Value of Breached Firms," Expert Systems with Applications, vol.32, no.3, 2007, pp. 703-725.
-
(2007)
Expert Systems with Applications
, vol.32
, Issue.3
, pp. 703-725
-
-
Andoh-Baidoo, F.K.1
Osei-Bryson, K.-M.2
-
8
-
-
0003531721
-
-
PhD thesis, Dept. of Engineering and Public Policy, Carnegie Mellon Univ.
-
J. Howard, An Analysis of Security Incidents on the Internet 1989-1995, PhD thesis, Dept. of Engineering and Public Policy, Carnegie Mellon Univ., 1997; www.cert. org/archive/pdf/JHThesis.pdf.
-
(1997)
An Analysis of Security Incidents on the Internet 1989-1995
-
-
Howard, J.1
-
9
-
-
0041766623
-
Information security expenditures and real options: A wait-and-see approach
-
L.A. Gordon, M.P. Loeb, and W. Lucyshyn, "Information Security Expenditures and Real Options: A Wait-and-See Approach," Computer Security J., vol.19, no.2, 2003, pp. 1-7.
-
(2003)
Computer Security J.
, vol.19
, Issue.2
, pp. 1-7
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
10
-
-
0001884696
-
The adjustment of stock prices to new information
-
E.F. Fama et al., "The Adjustment of Stock Prices to New Information," Int'l Economic Rev., vol.10, no.1, 1969, pp. 1-21.
-
(1969)
Int'l Economic Rev.
, vol.10
, Issue.1
, pp. 1-21
-
-
Fama, E.F.1
-
11
-
-
0001217228
-
A simplified model for portfolio analysis
-
W. Sharpe, "A Simplified Model for Portfolio Analysis," Management Science, vol.9, no.2, 1963, pp. 277-293.
-
(1963)
Management Science
, vol.9
, Issue.2
, pp. 277-293
-
-
Sharpe, W.1
-
12
-
-
34249838773
-
Nonparametric event study tests
-
A.R. Cowan, "Nonparametric Event Study Tests," Rev. Quantitative Finance and Accounting, vol.2, no.4, 1992, pp. 343-358.
-
(1992)
Rev. Quantitative Finance and Accounting
, vol.2
, Issue.4
, pp. 343-358
-
-
Cowan, A.R.1
-
13
-
-
3142771235
-
Reexamining the value relevance of e-commerce initiatives
-
B. Dehning et al., "Reexamining the Value Relevance of E-Commerce Initiatives," J. Management Information Systems, vol.21, no.1, 2004, pp. 55-82.
-
(2004)
J. Management Information Systems
, vol.21
, Issue.1
, pp. 55-82
-
-
Dehning, B.1
-
14
-
-
33745926506
-
Splitting methods for decision-tree induction: An exploration of the relative performance of two entropy-based families
-
K.-M. Osei-Bryson and K. Giles, "Splitting Methods for Decision-Tree Induction: An Exploration of the Relative Performance of Two Entropy-Based Families," Information Systems Frontiers, vol.8, no.3, 2006, pp. 195-209.
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.3
, pp. 195-209
-
-
Osei-Bryson, K.-M.1
Giles, K.2
-
15
-
-
84990029315
-
The economics of information security investment
-
L.A. Gordon and M.P. Loeb, "The Economics of Information Security Investment," ACM Trans. Information and System Security, vol.5, no.4, 2002, pp. 438-457.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
16
-
-
13444274614
-
Evaluating information security investments using the analytic hierarchy process
-
L.D. Bodin, L.A. Gordon, and M.P. Loeb, "Evaluating Information Security Investments Using the Analytic Hierarchy Process," Comm. ACM, vol.48, no.2, 2005, pp. 79-83.
-
(2005)
Comm. ACM
, vol.48
, Issue.2
, pp. 79-83
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.P.3
-
18
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
E.E. Schultz, "A Framework for Understanding and Predicting Insider Attacks," Computers & Security, vol.21, no.6, 2002, pp. 526-531.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
19
-
-
3242808612
-
CSI computer crime and security survey
-
Computer Security Inst.
-
R. Richardson, "CSI Computer Crime and Security Survey," 12th Ann. Computer Crime and Security Survey, Computer Security Inst., 2007; http://netscale.cse. nd.edu/twiki/bin/view/Repository/CsiSurvey2007.
-
(2007)
12th Ann. Computer Crime and Security Survey
-
-
Richardson, R.1
|