-
1
-
-
84876667596
-
-
Febrary 12, Available
-
Abdulmutallab, U. F. (Febrary 12, 2010). Umar Farouk Abdulmutallab. Available: http://topics.nytimes.comtop/reference/timestopics/people/a/umar- farouk-abdul mutallab/index.html
-
(2010)
Umar Farouk Abdulmutallab.
-
-
Abdulmutallab, U.F.1
-
2
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Albert, R., Jcong, H., and Baraba'si, A.-L., "Error and Attack Tolerance of Complex Networks," Nature, vol. 406, pp. 378-382, 2000.
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Albert, R.1
Jcong, H.2
Baraba'Si, A.-L.3
-
3
-
-
84925923967
-
The social organization of deviants
-
Best, J. and Luckenbill, D. F., "The Social Organization of Deviants," Social Problems, vol. 28, pp. 14-31, 1980.
-
(1980)
Social Problems
, vol.28
, pp. 14-31
-
-
Best, J.1
Luckenbill, D.F.2
-
5
-
-
0001316531
-
Factoring and weighting approaches to status scores and clique identification
-
Bonacich, P., "Factoring and Weighting Approaches to Status Scores and Clique Identification," Journal of Mathematical Sociology, vol. 2, pp. 113-120, 1972.
-
(1972)
Journal of Mathematical Sociology
, vol.2
, pp. 113-120
-
-
Bonacich, P.1
-
6
-
-
0003863956
-
-
ed. Harvard, MA: Analytic Technologies
-
Borgatti, S., Everett, M. G., and Freeman, L. C., "Ucinet 6 for Windows: Software for Social Network Analysis," ed. Harvard, MA: Analytic Technologies, 2002.
-
(2002)
Ucinet 6 for Windows: Software for Social Network Analysis
-
-
Borgatti, S.1
Everett, M.G.2
Freeman, L.C.3
-
7
-
-
84903445527
-
ORA user's guide 2007
-
Carley, K., et al., "ORA User's Guide 2007," Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report Pittsburgh, PA 2007.
-
(2007)
Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report Pittsburgh, PA
-
-
Carley, K.1
-
8
-
-
0004588719
-
Coding choices for textual analysis: A comparison of content analysis and map analysis
-
P. Marsden, Ed., ed Oxford: Blackwell
-
Carley, K. M., "Coding Choices for Textual Analysis: A Comparison of Content Analysis and Map Analysis," in Sociological Methodology 23, P. Marsden, Ed., ed Oxford: Blackwell, 1993, pp. 75-126.
-
(1993)
Sociological Methodology 23
, pp. 75-126
-
-
Carley, K.M.1
-
9
-
-
29144478725
-
Dynamic network analysis
-
R. Breiger, K. M. Carley, and P. Pattison, Eds., ed: Committee on Human Factors, National Research Council
-
Carley, K. M., "Dynamic Network Analysis," in Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, R. Breiger, K. M. Carley, and P. Pattison, Eds., ed: Committee on Human Factors, National Research Council, 2003, pp. 133-145.
-
(2003)
Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers
, pp. 133-145
-
-
Carley, K.M.1
-
10
-
-
34547683560
-
Toward an interoperable dynamic network analysis toolkit
-
Carley, K. M., et al., "Toward an Interoperable Dynamic Network Analysis Toolkit," Decision Support Systems, vol. 43, pp. 1324-1347, 2007.
-
(2007)
Decision Support Systems
, vol.43
, pp. 1324-1347
-
-
Carley, K.M.1
-
11
-
-
33751163289
-
Mining communities and their relationships in blogs: A study of online hate groups
-
Chau, M. and Xu, J., "Mining Communities and Their Relationships in Blogs: A Study of Online Hate Groups," International Journal of Human-Computer Studies, vol. 65, pp. 57-70, 2007.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 57-70
-
-
Chau, M.1
Xu, J.2
-
12
-
-
70349346926
-
Management of information security: Challenges and research directions
-
Choobineh, J., et al., "Management of Information Security: Challenges and Research Directions," Journal of the Association for Information Systems, vol. 20, pp. 958-971, 2007.
-
(2007)
Journal of the Association for Information Systems
, vol.20
, pp. 958-971
-
-
Choobineh, J.1
-
14
-
-
23044525969
-
Current directions in information security research: Toward socio-organizational perspectives
-
Dhillon, G. and Backhouse, J., "Current Directions in Information Security Research: Toward Socio-Organizational Perspectives," Information Systems Journal, vol. 11, pp. 127-153, 2001.
-
(2001)
Information Systems Journal
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
15
-
-
34547708394
-
Automap 1.2- extract, analyze, represent, and compare mental models from texts
-
Diesner, J. and Carley, K. M., "AutoMap 1.2- Extract, Analyze, Represent, and Compare Mental Models from Texts," Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Technical Report CMU-ISRI-04-100,2004.
-
(2004)
Carnegie Mellon University, School of Computer Science, Institute for Software Research International, Technical Report CMU-ISRI-04-100
-
-
Diesner, J.1
Carley, K.M.2
-
16
-
-
31044446654
-
Revealing social structure from texts: Metamatrix text analysis as a novel method for network text analysis
-
V. K. Narayanan and D. J. Armstrong, Eds., ed Harrisburg, PA: IDEA Group Publishing
-
Diesner, J. and Carley, K. M., "Revealing Social Structure from Texts: Metamatrix Text Analysis as a Novel Method for Network Text Analysis," in Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations, V. K. Narayanan and D. J. Armstrong, Eds., ed Harrisburg, PA: IDEA Group Publishing, 2005, pp. 81-108.
-
(2005)
Causal Mapping for Information Systems and Technology Research: Approaches, Advances, and Illustrations
, pp. 81-108
-
-
Diesner, J.1
Carley, K.M.2
-
17
-
-
33750177351
-
Centrality in social networks: Conceptual clarification
-
Freeman, L., "Centrality in Social Networks: Conceptual Clarification," Social Networks, vol. 1, pp. 215-239, 1979.
-
(1979)
Social Networks
, vol.1
, pp. 215-239
-
-
Freeman, L.1
-
21
-
-
79951840237
-
Hacks, cracks, and crime: An examination of the subculture and social
-
Ph.D., University of Missouri, St. Louis, Missouri
-
Holt, T. J., "Hacks, Cracks, and Crime: An Examination of the Subculture and Social," Ph.D., Criminology and Criminal Justice, University of Missouri, St. Louis, Missouri, 2005.
-
(2005)
Criminology and Criminal Justice
-
-
Holt, T.J.1
-
22
-
-
85035287319
-
Attack vulnerability of complex networks
-
Homle, P., et al., "Attack Vulnerability of Complex Networks," Physical Review E, vol. 65, 2002.
-
(2002)
Physical Review e
, vol.65
-
-
Homle, P.1
-
23
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A. C and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, vol. 34, 2010.
-
(2010)
MIS Quarterly
, vol.34
-
-
Johnston, A.C.1
Warkentin, M.2
-
28
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K. D., Carr, H. H., and Warkentin, M. E., "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly, vol. 16, pp. 173-186, 1991.
-
(1991)
MIS Quarterly
, vol.16
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
30
-
-
84884439164
-
-
September 26, Available
-
McCormick, J. and Gage, D. (September 26, 2008). Shadowcrew: Web Mobs. Available: http://www.baselinemag.com/c/a/Security/Shadowcrew-Web-Mobs/
-
(2008)
Shadowcrew: Web Mobs.
-
-
McCormick, J.1
Gage, D.2
-
31
-
-
79951825882
-
A data mining approach to intelligence operations
-
Washington, USA
-
Memon, N., Hicks, D., and Harkiolakis, N. I., "A Data Mining Approach to Intelligence Operations," in Data Mining, Intrusion Detection, Information Assurance and Data Networks Security 2008, Washington, USA, 2008.
-
(2008)
Data Mining, Intrusion Detection, Information Assurance and Data Networks Security 2008
-
-
Memon, N.1
Hicks, D.2
Harkiolakis, N.I.3
-
34
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
Ng, B.-Y., Kankanhalli, A., and Xu, Y., "Studying users' computer security behavior: A health belief perspective," Decision Support Systems, vol. 46, pp. 815-825, 2009.
-
(2009)
Decision Support Systems
, vol.46
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.3
-
36
-
-
85001770273
-
-
Committee on the Judiciary Subcommittee on Crime, Terrorism and Homeland Security, ed
-
Parsky, L., "Legislative Hearing on H.R. 5318, the "Cyber-Security Enhancement and Consumer Data Protection Act of 2006"," in Committee on the Judiciary Subcommittee on Crime, Terrorism and Homeland Security, ed, 2006.
-
(2006)
Legislative Hearing on H.R. 5318, the "Cyber-Security Enhancement and Consumer Data Protection Act of 2006"
-
-
Parsky, L.1
-
37
-
-
34249671060
-
Operations security awareness: The mind has no firewall
-
Rhodes, K., "Operations security awareness: the mind has no firewall," Computer Security Journal, vol. 18, 2001.
-
(2001)
Computer Security Journal
, vol.18
-
-
Rhodes, K.1
-
40
-
-
0036326689
-
Taking a stand on hackers
-
Schultz, E., "Taking a stand on hackers," Computers & Security, vol. 21, pp. 382-384, 2002.
-
(2002)
Computers & Security
, vol.21
, pp. 382-384
-
-
Schultz, E.1
-
41
-
-
30744438863
-
An analysis of the traditional is security approaches: Implications for research and practice
-
Siponen, M. T., "An Analysis of the Traditional IS Security Approaches: Implications for Research and Practice," European Journal of Information Systems, vol. 14, pp. 303-315, 2005.
-
(2005)
European Journal of Information Systems
, vol.14
, pp. 303-315
-
-
Siponen, M.T.1
-
42
-
-
76649092853
-
Behavioral information security: Two end user survey studies of motivation and security practices, in
-
New York City, New York
-
Stanton, J. M., et al., "Behavioral information security: two end user survey studies of motivation and security practices," in the Tenth America's Conference on Information Systems, New York City, New York, 2004.
-
(2004)
The Tenth America's Conference on Information Systems
-
-
Stanton, J.M.1
-
43
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. W., "Effective IS Security: An Empirical Study," Information Systems Research, vol. 1, pp. 255-276, 1990.
-
(1990)
Information Systems Research
, vol.1
, pp. 255-276
-
-
Straub, D.W.1
-
44
-
-
79951820897
-
Framing of information security policies and practice
-
D. W. Straub, S. Goodman, and R. Baskerville, Eds., ed Armonk, NY: M. E. Sharpe
-
Straub, D. W., Goodman, S., and Baskerville, R., "Framing of Information Security Policies and Practice," in Information Security Policies, Processes, and Practices, D. W. Straub, S. Goodman, and R. Baskerville, Eds., ed Armonk, NY: M. E. Sharpe, 2008.
-
(2008)
Information Security Policies, Processes, and Practices
-
-
Straub, D.W.1
Goodman, S.2
Baskerville, R.3
-
45
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W. and Welke, R. J., "Coping with systems risk: security planning models for management decision making," MIS Quarterly, vol. 22, pp. 441-469, 1998.
-
(1998)
MIS Quarterly
, vol.22
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
48
-
-
0345257994
-
-
Minneapolis, MN: University of Minnesote Press
-
Thomas, D., Hacker Culture. Minneapolis, MN: University of Minnesote Press, 2002.
-
(2002)
Hacker Culture.
-
-
Thomas, D.1
-
52
-
-
27844472177
-
Transnational criminal networks
-
J. Aquilla and D. Ronfeldt, Eds., ed
-
Williams, P., "Transnational Criminal Networks," in Networks and Netwars: The Future of Terror, Crime, and Militancy, J. Aquilla and D. Ronfeldt, Eds., ed, 2001.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
-
-
Williams, P.1
-
53
-
-
20344376408
-
Criminal network analysis and visualization
-
Xu, J. and Chen, H., "Criminal Network Analysis and Visualization," Commun. ACM, vol. 48, pp. 100-107, 2005.
-
(2005)
Commun. ACM
, vol.48
, pp. 100-107
-
-
Xu, J.1
Chen, H.2
|