-
2
-
-
33750966470
-
Exploring the characteristics of Internet security breaches that impact the market value of breached firms
-
F.K. Andoh-Baidoo, and K.-M. Osei-Bryson Exploring the characteristics of Internet security breaches that impact the market value of breached firms Expert Systems With Applications 32 2007 703 725
-
(2007)
Expert Systems with Applications
, vol.32
, pp. 703-725
-
-
Andoh-Baidoo, F.K.1
Osei-Bryson, K.-M.2
-
3
-
-
78049439161
-
If compliance is son critical, why are we still failing audits?
-
A. Bakman If compliance is son critical, why are we still failing audits? Information Systems Control Journal 5 2007 37 40
-
(2007)
Information Systems Control Journal
, vol.5
, pp. 37-40
-
-
Bakman, A.1
-
4
-
-
78049419974
-
Control self-assessment for information and related technology
-
S. Bakshi Control self-assessment for information and related technology Information Systems Control Journal 1 2004 55 62
-
(2004)
Information Systems Control Journal
, vol.1
, pp. 55-62
-
-
Bakshi, S.1
-
6
-
-
39749149995
-
Expert consensus on the top IT controls for a small business
-
B. Busta, and J. Strong Expert consensus on the top IT controls for a small business Information Systems Control Journal 6 2006 22 24
-
(2006)
Information Systems Control Journal
, vol.6
, pp. 22-24
-
-
Busta, B.1
Strong, J.2
-
8
-
-
48749128392
-
An integrated neural network and data envelopment analysis for supplier evaluation under incomplete information
-
D. Çelebi, and D. Bayraktar An integrated neural network and data envelopment analysis for supplier evaluation under incomplete information Expert Systems with Applications 35 4 2008 1698 1710
-
(2008)
Expert Systems with Applications
, vol.35
, Issue.4
, pp. 1698-1710
-
-
Çelebi, D.1
Bayraktar, D.2
-
9
-
-
78049445455
-
Threat assessment and security measures justification for advanced IT networks
-
M.J. Cerullo, and V. Cerullo Threat assessment and security measures justification for advanced IT networks Information Systems Control Journal 1 2005 35 43
-
(2005)
Information Systems Control Journal
, vol.1
, pp. 35-43
-
-
Cerullo, M.J.1
Cerullo, V.2
-
11
-
-
0037507339
-
Constructing amulti-valued and multi-labeled decision tree
-
Y.L. Chen, C.L. Hsu, and S.C. Chou Constructing amulti-valued and multi-labeled decision tree Expert Systems with Applications 25 2 2003 199 209
-
(2003)
Expert Systems with Applications
, vol.25
, Issue.2
, pp. 199-209
-
-
Chen, Y.L.1
Hsu, C.L.2
Chou, S.C.3
-
13
-
-
84990029315
-
The economics of information security investment
-
L. Gordon, and M. Loeb The economics of information security investment ACM Transactions on IS Security 5 4 2002 438 457
-
(2002)
ACM Transactions on IS Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.1
Loeb, M.2
-
16
-
-
78049416879
-
Siebel's ebusiness application and controls
-
K. Jansen Siebel's ebusiness application and controls Information Systems Control Journal 2 2002 43 50
-
(2002)
Information Systems Control Journal
, vol.2
, pp. 43-50
-
-
Jansen, K.1
-
18
-
-
1242263532
-
Why there aren't more information security research studies
-
A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Information & Management 41 2004 597 607
-
(2004)
Information & Management
, vol.41
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
20
-
-
58349117665
-
Using case based reasoning for the design of controls for Internet-based information systems
-
S. Lee, and K. Kim Using case based reasoning for the design of controls for Internet-based information systems Expert Systems With Applications 36 3 2009 5582 5591
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.3
, pp. 5582-5591
-
-
Lee, S.1
Kim, K.2
-
21
-
-
10644254906
-
Efficiency analysis of controls in EDI applications
-
S. Lee, K. Lee, and I. Kang Efficiency analysis of controls in EDI applications Information & Management 42 3 2005 425 439
-
(2005)
Information & Management
, vol.42
, Issue.3
, pp. 425-439
-
-
Lee, S.1
Lee, K.2
Kang, I.3
-
22
-
-
23344453209
-
Investigating factors affecting the adoption of anti-spyware systems
-
Y. Lee, and K.A. Kozar Investigating factors affecting the adoption of anti-spyware systems Communication of the ACM 48 8 2005 72 78
-
(2005)
Communication of the ACM
, vol.48
, Issue.8
, pp. 72-78
-
-
Lee, Y.1
Kozar, K.A.2
-
23
-
-
0041050969
-
Measuring productivity of software projects: A data envelopment analysis approach
-
M.A. Mahmood, K.J. Pettingell, and A.I. Shaskevich Measuring productivity of software projects: a data envelopment analysis approach Decision Sciences 27 1 1996 57 80
-
(1996)
Decision Sciences
, vol.27
, Issue.1
, pp. 57-80
-
-
Mahmood, M.A.1
Pettingell, K.J.2
Shaskevich, A.I.3
-
25
-
-
0141855285
-
Decision tree classification of proteins identified by mass spectrometry of blood serum samples from people with and without lung cancer
-
M.K. Markey, G.D. Tourassi, and C.E. Floyd Decision tree classification of proteins identified by mass spectrometry of blood serum samples from people with and without lung cancer Proteomics 3 2003 1678 1679
-
(2003)
Proteomics
, vol.3
, pp. 1678-1679
-
-
Markey, M.K.1
Tourassi, G.D.2
Floyd, C.E.3
-
26
-
-
78049423762
-
Computer-assisted audit techniques: Value of data mining for corporate auditors
-
J. Ott, A. MacLeod, and K.M. Fan Computer-assisted audit techniques: value of data mining for corporate auditors Information Systems Control Journal 3 2008 45 48
-
(2008)
Information Systems Control Journal
, vol.3
, pp. 45-48
-
-
Ott, J.1
MacLeod, A.2
Fan, K.M.3
-
27
-
-
69849109894
-
Optimizing controls to test as part of a risk-based audit strategy
-
M. Pareek Optimizing controls to test as part of a risk-based audit strategy Information Systems Control Journal 2 2006 39 41
-
(2006)
Information Systems Control Journal
, vol.2
, pp. 39-41
-
-
Pareek, M.1
-
30
-
-
36148967741
-
Increasing the discriminatory power of DEA in the presence of the sample heterogeneity with cluster analysis and decision trees
-
S. Samoilenko, and K.-M. Osei-Bryson Increasing the discriminatory power of DEA in the presence of the sample heterogeneity with cluster analysis and decision trees Expert Systems with Applications 34 2 2008 1568 1581
-
(2008)
Expert Systems with Applications
, vol.34
, Issue.2
, pp. 1568-1581
-
-
Samoilenko, S.1
Osei-Bryson, K.-M.2
-
31
-
-
33750468638
-
A framework for benchmarking service process using data envelopment analysis and decision tree
-
H. Seol, J. Choi, G. Park, and Y. Park A framework for benchmarking service process using data envelopment analysis and decision tree Expert Systems with Applications 32 2 2007 432 440
-
(2007)
Expert Systems with Applications
, vol.32
, Issue.2
, pp. 432-440
-
-
Seol, H.1
Choi, J.2
Park, G.3
Park, Y.4
-
33
-
-
0036497748
-
Technical efficiency analysis of information technology investments: A two-stage empirical investigation
-
B.B.M. Shao, and W.T. Lin Technical efficiency analysis of information technology investments: a two-stage empirical investigation Information & Management 39 5 2002 391 401
-
(2002)
Information & Management
, vol.39
, Issue.5
, pp. 391-401
-
-
Shao, B.B.M.1
Lin, W.T.2
-
34
-
-
0346331362
-
Decision Tree based on data envelopment analysis for effective technology commercialization
-
S.Y. Sohn, and T.H. Moon Decision Tree based on data envelopment analysis for effective technology commercialization Expert Systems with Applications 26 2 2004 279 284
-
(2004)
Expert Systems with Applications
, vol.26
, Issue.2
, pp. 279-284
-
-
Sohn, S.Y.1
Moon, T.H.2
-
37
-
-
33644770285
-
Using DEA-neural network approach to evaluate branch efficiency of a large Canadian bank
-
D. Wu, Z. Yang, and L. Liang Using DEA-neural network approach to evaluate branch efficiency of a large Canadian bank Expert Systems with Applications 31 1 2006 108 115
-
(2006)
Expert Systems with Applications
, vol.31
, Issue.1
, pp. 108-115
-
-
Wu, D.1
Yang, Z.2
Liang, L.3
-
38
-
-
34447298085
-
Threats and countermeasures for information system security: A cross-industry study
-
Q.-J. Yeh, and A.J.-T. Chang Threats and countermeasures for information system security: a cross-industry study Information & Management 44 5 2007 480 491
-
(2007)
Information & Management
, vol.44
, Issue.5
, pp. 480-491
-
-
Yeh, Q.-J.1
Chang, A.J.-T.2
-
39
-
-
0037565967
-
Application of decision trees to the analysis of soil radon data for earthquake prediction
-
B. Zmazek, L. Todorovski, S. Džeroski, A. Vaupotič, and I. Kobal Application of decision trees to the analysis of soil radon data for earthquake prediction Applied Radiation and Isotopes 58 2003 697 706
-
(2003)
Applied Radiation and Isotopes
, vol.58
, pp. 697-706
-
-
Zmazek, B.1
Todorovski, L.2
Džeroski, S.3
Vaupotič, A.4
Kobal, I.5
|