-
1
-
-
34249871944
-
A qualitative study of users' view on information security
-
DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
-
E. Albrechtsen A qualitative study of users' view on information security Computers & Security 26 4 2007 276 289 (Pubitemid 46873753)
-
(2007)
Computers and Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
2
-
-
67649708310
-
The information security digital divide between information security managers and users
-
E. Albrechtsen, and J. Hovden The information security digital divide between information security managers and users Computers & Security 28 6 2009 476 490
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 476-490
-
-
Albrechtsen, E.1
Hovden, J.2
-
3
-
-
77951204516
-
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
-
E. Albrechtsen, and J. Hovden Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study Computers & Security 29 4 2010 432 445
-
(2010)
Computers & Security
, vol.29
, Issue.4
, pp. 432-445
-
-
Albrechtsen, E.1
Hovden, J.2
-
4
-
-
43149116934
-
Preliminary System Dynamics Maps of the Insider Cyber-threat Problem
-
Oxford, UK
-
Andersen DF, Cappelli D, Gonzalez JJ, Mojtahedzadeh M, Moore A, Rich E, Sarriegui JM, Shimeall TJ, Stanton J, Weaver E, & Zagonel A. Preliminary System Dynamics Maps of the Insider Cyber-threat Problem. Paper presented at the Proceedings of the 22nd International Conference of the System Dynamics Society, Oxford, UK; 2004.
-
(2004)
Paper Presented at the Proceedings of the 22nd International Conference of the System Dynamics Society
-
-
Andersen, D.F.1
Cappelli, D.2
Gonzalez, J.J.3
Mojtahedzadeh, M.4
Moore, A.5
Rich, E.6
Sarriegui, J.M.7
Shimeall, T.J.8
Stanton, J.9
Weaver, E.10
Zagonel, A.11
-
6
-
-
0005096601
-
Requisite variety and its implications for the control of complex systems
-
W.R. Ashby Requisite variety and its implications for the control of complex systems Cybernetica 1 2 1958 83 99
-
(1958)
Cybernetica
, vol.1
, Issue.2
, pp. 83-99
-
-
Ashby, W.R.1
-
7
-
-
0001022016
-
Formal aspects of model validity and validation in system dynamics
-
Y. Barlas Formal aspects of model validity and validation in system dynamics System Dynamics Review 12 3 1996 183 210 (Pubitemid 126646439)
-
(1996)
System Dynamics Review
, vol.12
, Issue.3
, pp. 183-210
-
-
Barlas, Y.1
-
10
-
-
34249322529
-
Organismic achievement and environmental probability
-
E. Brunswik Organismic achievement and environmental probability Psychological Review 50 1943 255 272
-
(1943)
Psychological Review
, vol.50
, pp. 255-272
-
-
Brunswik, E.1
-
12
-
-
0008761925
-
The validity of computational models in organization science: From model realism to purpose of the model
-
R.M. Burton, and B. Obel The validity of computational models in organization science: from model realism to purpose of the model Computational & Mathematical Organization Theory 1 1 1995 57 71
-
(1995)
Computational & Mathematical Organization Theory
, vol.1
, Issue.1
, pp. 57-71
-
-
Burton, R.M.1
Obel, B.2
-
13
-
-
18644365144
-
Experienced-weighted attraction learning in normal games
-
C. Camerer, and T. Ho Experienced-weighted attraction learning in normal games Econometrica 67 4 1999 827 874
-
(1999)
Econometrica
, vol.67
, Issue.4
, pp. 827-874
-
-
Camerer, C.1
Ho, T.2
-
15
-
-
74449092722
-
A framework and assessment instrument for information security culture
-
A. Da Veiga, and J.H.P. Eloff A framework and assessment instrument for information security culture Computers & Security 29 2 2010 196 207
-
(2010)
Computers & Security
, vol.29
, Issue.2
, pp. 196-207
-
-
Da Veiga, A.1
Eloff, J.H.P.2
-
17
-
-
33846794868
-
Phishing for user security awareness
-
DOI 10.1016/j.cose.2006.10.009, PII S0167404806001581
-
J.R.C. Dodge, C. Carver, and A.J. Ferguson Phishing for user security awareness Computers & Security 26 1 2007 73 80 (Pubitemid 46216498)
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 73-80
-
-
Dodge Jr., R.C.1
Carver, C.2
Ferguson, A.J.3
-
18
-
-
33846807812
-
Value-focused assessment of ICT security awareness in an academic environment
-
DOI 10.1016/j.cose.2006.10.006, PII S0167404806001544
-
L. Drevin, H.A. Kruger, and T. Steyn Value-focused assessment of ICT security awareness in an academic environment Computers & Security 26 1 2007 36 43 (Pubitemid 46216494)
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 36-43
-
-
Drevin, L.1
Kruger, H.A.2
Steyn, T.3
-
19
-
-
0032043480
-
Signal Detection by Human Observers: A Cutoff Reinforcement Learning Model of Categorization Decisions under Uncertainty
-
I. Erev Signal detection by human observers: A cutoff reinforcement learning model of categorization decisions under uncertainty Psychological Review 105 1998 280 298 (Pubitemid 128457848)
-
(1998)
Psychological Review
, vol.105
, Issue.2
, pp. 280-298
-
-
Erev, I.1
-
20
-
-
0000016841
-
Toward a generalization of signal detection theory to n-person games: The example of two-person safety problem
-
I. Erev, D. Gopher, R. Itkin, and Y. Greenshpan Toward a generalization of signal detection theory to n-person games: the example of two-person safety problem Journal of Mathematical Psychology 39 1995 360 375
-
(1995)
Journal of Mathematical Psychology
, vol.39
, pp. 360-375
-
-
Erev, I.1
Gopher, D.2
Itkin, R.3
Greenshpan, Y.4
-
21
-
-
0001283474
-
Reinforcement-based vs. belief-based learning models in experimental asymmetric-information games
-
N. Feltovich Reinforcement-based vs. belief-based learning models in experimental asymmetric-information games Econometrica 68 3 2000 605 641
-
(2000)
Econometrica
, vol.68
, Issue.3
, pp. 605-641
-
-
Feltovich, N.1
-
24
-
-
34547950128
-
Making security usable: Are things improving?
-
DOI 10.1016/j.cose.2007.06.003, PII S0167404807000788
-
S. Furnell Making security usable: are things improving? Computers & Security 26 6 2007 434 443 (Pubitemid 47268096)
-
(2007)
Computers and Security
, vol.26
, Issue.6
, pp. 434-443
-
-
Furnell, S.1
-
27
-
-
34547961325
-
Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences
-
DOI 10.1016/j.cose.2007.05.003, PII S0167404807000569
-
S.P. Goring, J.R. Rabaiotti, and A.J. Jones Anti-keylogging measures for secure Internet login: an example of the law of unintended consequences Computers & Security 26 6 2007 421 426 (Pubitemid 47268094)
-
(2007)
Computers and Security
, vol.26
, Issue.6
, pp. 421-426
-
-
Goring, S.P.1
Rabaiotti, J.R.2
Jones, A.J.3
-
29
-
-
38049148040
-
New academic fields as admittance-seeking social movements: The case of strategic management
-
D.C. Hambrick, and M.-J. Chen New academic fields as admittance-seeking social movements: the case of strategic management Academy of Management Review 33 1 2007 32 54
-
(2007)
Academy of Management Review
, vol.33
, Issue.1
, pp. 32-54
-
-
Hambrick, D.C.1
Chen, M.-J.2
-
34
-
-
0002095008
-
Social judgment theory
-
M.F. Kaplan, S. Schwarts, Academic Press New York
-
K.R. Hammond, T.R. Stewart, B. Brehmer, and D.O. Steinmann Social judgment theory M.F. Kaplan, S. Schwarts, Human judgment and decision processes 1975 Academic Press New York 271 312
-
(1975)
Human Judgment and Decision Processes
, pp. 271-312
-
-
Hammond, K.R.1
Stewart, T.R.2
Brehmer, B.3
Steinmann, D.O.4
-
36
-
-
0020056875
-
The psychology of preferences
-
D. Kahneman, and A. Tversky The psychology of preferences Scientific American 246 1982 160 173 (Pubitemid 12178653)
-
(1982)
Scientific American
, vol.246
, Issue.1
, pp. 160-173
-
-
Kahneman, D.1
Tversky, A.2
-
38
-
-
0038466799
-
Learning from feedback in probabilistic environments
-
J. Klayman Learning from feedback in probabilistic environments Acta Psychologica 56 1984 81 92
-
(1984)
Acta Psychologica
, vol.56
, pp. 81-92
-
-
Klayman, J.1
-
39
-
-
0002550796
-
Cue discovery in probabilistic environments: Uncertainty and experimentation
-
J. Klayman Cue discovery in probabilistic environments: uncertainty and experimentation Learning, Memory, and Cognition 14 2 1988 317 330
-
(1988)
Learning, Memory, and Cognition
, vol.14
, Issue.2
, pp. 317-330
-
-
Klayman, J.1
-
40
-
-
70349590942
-
Information security policy: An organizational-level process model
-
K.J. Knapp, R. Franklin Morris Jr., T.E. Marshall, and T.A. Byrd Information security policy: an organizational-level process model Computers & Security 28 7 2009 493 508
-
(2009)
Computers & Security
, vol.28
, Issue.7
, pp. 493-508
-
-
Knapp, K.J.1
Franklin Morris Jr., R.2
Marshall, T.E.3
Byrd, T.A.4
-
42
-
-
70349448077
-
Human and organizational factors in computer and information security: Pathways to vulnerabilities
-
S. Kraemer, P. Carayon, and J. Clem Human and organizational factors in computer and information security: pathways to vulnerabilities Computers & Security 28 7 2009 509 520
-
(2009)
Computers & Security
, vol.28
, Issue.7
, pp. 509-520
-
-
Kraemer, S.1
Carayon, P.2
Clem, J.3
-
43
-
-
63049132678
-
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
-
D. Liginlal, I. Sim, and L. Khansa How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management Computers & Security 28 3-4 2009 215 228
-
(2009)
Computers & Security
, vol.28
, Issue.34
, pp. 215-228
-
-
Liginlal, D.1
Sim, I.2
Khansa, L.3
-
46
-
-
33745902501
-
Exploring the detection process: Integrating judgment and outcome decomposition
-
DOI 10.1007/11760146-97, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings
-
I.J. Martinez-Moyano, E. Rich, and S. Conrad Exploring the detection process: integrating judgment and outcome decomposition Lecture Notes in Computer Science 3975 2006 701 703 (Pubitemid 44045644)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3975
, pp. 701-703
-
-
Martinez-Moyano, I.J.1
Rich, E.H.2
Conrad, S.H.3
-
47
-
-
43149107471
-
A behavioral theory of insider-threat risks: A system dynamics approach
-
I.J. Martinez-Moyano, E. Rich, S. Conrad, D.F. Andersen, and T.R. Stewart A behavioral theory of insider-threat risks: a system dynamics approach ACM Transactions on Modeling Computer Simulation 18 2 2008 1 27
-
(2008)
ACM Transactions on Modeling Computer Simulation
, vol.18
, Issue.2
, pp. 1-27
-
-
Martinez-Moyano, I.J.1
Rich, E.2
Conrad, S.3
Andersen, D.F.4
Stewart, T.R.5
-
49
-
-
33750261074
-
A system dynamics model of an insider attack on an information system
-
J.J. Gonzalez, Høyskoleforlaget AS - Norwegian Academic Press Kristiansand, Norway
-
C. Melara, J.M. Sarriegui, J.J. Gonzalez, A. Sawicka, and D.L. Cooke A system dynamics model of an insider attack on an information system J.J. Gonzalez, From modeling to managing security: a system dynamics approach 2003 Høyskoleforlaget AS - Norwegian Academic Press Kristiansand, Norway 9 36
-
(2003)
From Modeling to Managing Security: A System Dynamics Approach
, pp. 9-36
-
-
Melara, C.1
Sarriegui, J.M.2
Gonzalez, J.J.3
Sawicka, A.4
Cooke, D.L.5
-
52
-
-
0012317604
-
Model calibration as a testing strategy for system dynamics models
-
R. Oliva Model calibration as a testing strategy for system dynamics models European Journal of Operational Research 151 3 2003 552 568
-
(2003)
European Journal of Operational Research
, vol.151
, Issue.3
, pp. 552-568
-
-
Oliva, R.1
-
53
-
-
77956393826
-
Network anomaly detection through nonlinear analysis
-
F. Palmieri, and U. Fiore Network anomaly detection through nonlinear analysis Computers & Security 29 7 2010 737 755
-
(2010)
Computers & Security
, vol.29
, Issue.7
, pp. 737-755
-
-
Palmieri, F.1
Fiore, U.2
-
54
-
-
32644465248
-
-
U.S. Secret Service and CERT Coordination Center/Software Engineering Institute
-
M.R. Randazzo, M.M. Keeney, E.F. Kowalski, D.M. Cappelli, and A.P. Moore Insider threat study: illicit cyber activity in the banking and finance sector: 25 2004 U.S. Secret Service and CERT Coordination Center/Software Engineering Institute
-
(2004)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
, vol.25
-
-
Randazzo, M.R.1
Keeney, M.M.2
Kowalski, E.F.3
Cappelli, D.M.4
Moore, A.P.5
-
56
-
-
49049121156
-
Simulating insider cyber-threat risks: A model-based case and a case-based model
-
Cambridge, MA
-
Rich E, Martinez-Moyano, IJ, Conrad S, Moore AP, Cappelli DM, Shimeall TJ, Andersen DF, Gonzalez JJ, Ellison RJ, Lipson HF, Mundie DA, Sarriegui JM, Sawicka A, Stewart, TR, Torres JM, Weaver EA, Wiik J, Zagonel AA. Simulating insider cyber-threat risks: a model-based case and a case-based model. Paper presented at the International Conference of the System Dynamics Society, Cambridge, MA; 2005.
-
(2005)
Paper Presented at the International Conference of the System Dynamics Society
-
-
Rich, E.1
Martinez-Moyano, I.J.2
Conrad, S.3
Moore, A.P.4
Cappelli, D.M.5
Shimeall, T.J.6
Andersen, D.F.7
Gonzalez, J.J.8
Ellison, R.J.9
Lipson, H.F.10
Mundie, D.A.11
Sarriegui, J.M.12
Sawicka, A.13
Stewart14
Tr15
Torres, J.M.16
Weaver, E.A.17
Wiik, J.18
Zagonel, A.A.19
-
58
-
-
33846849570
-
Organisational security culture: Extending the end-user perspective
-
DOI 10.1016/j.cose.2006.10.008, PII S016740480600157X
-
A.B. Ruighaver, S.B. Maynard, and S. Chang Organisational security culture: extending the end-user perspective Computers & Security 26 1 2007 56 62 (Pubitemid 46216497)
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 56-62
-
-
Ruighaver, A.B.1
Maynard, S.B.2
Chang, S.3
-
60
-
-
0002039123
-
Appropriate summary statistics for evaluating the historical fit of system dynamics models
-
Winter
-
J.D. Sterman Appropriate summary statistics for evaluating the historical fit of system dynamics models Dynamica 10 Winter 1984 51 66
-
(1984)
Dynamica
, vol.10
, pp. 51-66
-
-
Sterman, J.D.1
-
62
-
-
0002153489
-
Judgment analysis: Procedures
-
B. Brehmer, C.R.B. Joyce, North-Holland Amsterdam
-
T. Stewart Judgment analysis: procedures B. Brehmer, C.R.B. Joyce, Human judgment: the SJT view 1988 North-Holland Amsterdam
-
(1988)
Human Judgment: The SJT View
-
-
Stewart, T.1
-
63
-
-
0011673029
-
Uncertainty, judgment, and error in prediction
-
D. Sarewitz, R.A. Pielke, R. Byerly, 1st ed. Island Press Washington, D.C
-
T.R. Stewart Uncertainty, judgment, and error in prediction D. Sarewitz, R.A. Pielke, R. Byerly, Prediction: science, decision making, and the future of nature 1st ed. 2000 Island Press Washington, D.C. 41 57
-
(2000)
Prediction: Science, Decision Making, and the Future of Nature
, pp. 41-57
-
-
Stewart, T.R.1
-
64
-
-
84979353538
-
Seven components of judgmental forecasting skill: Implications for research and the improvement of forecasts
-
T.R. Stewart, and C.M. Lusk Seven components of judgmental forecasting skill: implications for research and the improvement of forecasts Journal of Forecasting 13 1994 579 599
-
(1994)
Journal of Forecasting
, vol.13
, pp. 579-599
-
-
Stewart, T.R.1
Lusk, C.M.2
-
65
-
-
0026841607
-
The science of choosing the right decision threshold in high-stakes diagnostics
-
J. Swets The science of choosing the right decision threshold in high-stakes diagnostics American Psychologist 47 4 1992 522 532
-
(1992)
American Psychologist
, vol.47
, Issue.4
, pp. 522-532
-
-
Swets, J.1
-
66
-
-
0015731803
-
The relative operating characteristic in psychology
-
J.A. Swets The relative operating characteristic in psychology Science 182 4116 1973 990 1000
-
(1973)
Science
, vol.182-4116
, pp. 990-1000
-
-
Swets, J.A.1
-
68
-
-
2342475711
-
Towards information security behavioural compliance
-
C. Vroom, and R. von Solms Towards information security behavioural compliance Computers & Security 23 3 2004 191 198
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
69
-
-
33646514405
-
Threshold setting and the cycling of a decision threshold
-
E. Weaver, and G.P. Richardson Threshold setting and the cycling of a decision threshold System Dynamics Review 22 1 2006 1 26
-
(2006)
System Dynamics Review
, vol.22
, Issue.1
, pp. 1-26
-
-
Weaver, E.1
Richardson, G.P.2
-
70
-
-
78449304032
-
A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives
-
M. Workman A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives Computers & Security 29 8 2010 831 839
-
(2010)
Computers & Security
, vol.29
, Issue.8
, pp. 831-839
-
-
Workman, M.1
-
71
-
-
0009316633
-
Anxiety and decision making with delayed resolution of uncertainty
-
G. Wu Anxiety and decision making with delayed resolution of uncertainty Theory and Decisions 46 1999 159 198 (Pubitemid 129575797)
-
(1999)
Theory and Decision
, vol.46
, Issue.2
, pp. 159-198
-
-
Wu, G.1
-
72
-
-
34547961706
-
An adaptive method for anomaly detection in symmetric network traffic
-
DOI 10.1016/j.cose.2007.06.001, PII S0167404807000764
-
M. Yu, and X.-Y. Zhou An adaptive method for anomaly detection in symmetric network traffic Computers & Security 26 6 2007 427 433 (Pubitemid 47268095)
-
(2007)
Computers and Security
, vol.26
, Issue.6
, pp. 427-433
-
-
Yu, M.1
Zhou, X.-Y.2
|