-
1
-
-
33744922914
-
Outsourcing internet security: Economic analysis of incentives for managed security service providers
-
W. Ding, W. Yurcik, X. Yin, "Outsourcing internet security: Economic analysis of incentives for managed security service providers", Journal of Internet and Network Economics, pp. 947-958, 2005.
-
(2005)
Journal of Internet and Network Economics
, pp. 947-958
-
-
Ding, W.1
Yurcik, W.2
Yin, X.3
-
2
-
-
70849110813
-
Managing Risk of IT Security Outsourcing in the Decision-Making Stage
-
IEEE
-
S. Oladapo, P. Zavarsky, R. Ruhl, D. Lindskog, A. Igonor, "Managing Risk of IT Security Outsourcing in the Decision-Making Stage", Proc. of the International Conference on Computational Science and Engineering, pp. 456-461, IEEE, 2009.
-
(2009)
Proc. of the International Conference on Computational Science and Engineering
, pp. 456-461
-
-
Oladapo, S.1
Zavarsky, P.2
Ruhl, R.3
Lindskog, D.4
Igonor, A.5
-
3
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, A., R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "A view of cloud computing", Com. of the ACM, Vol. 53, pp. 50-58, 2010.
-
(2010)
Com. of the ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, A.R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
10144232763
-
Validating measures of information technology outsourcing risk factors
-
DOI 10.1016/j.omega.2004.04.003, PII S0305048304000635
-
B. Bahli, S. Rivard, "Validating measures of information technology outsourcing risk factors", Journal Omega, Vol. 33, pp. 175-187, 2005 (Pubitemid 39615362)
-
(2005)
Omega
, vol.33
, Issue.2
, pp. 175-187
-
-
Bahli, B.1
Rivard, S.2
-
5
-
-
84979792294
-
IT security outsourcing: How safe is your IT security?
-
DOI 10.1016/S0267-3649(02)03009-1, PII S0267364902030091
-
C. Fenn, R. Shooter, K. Allan, "IT Security Outsourcing: How safe is it your IT Security", Computer Law & Security Report, Vol. 18, pp. 109-111, 2002. (Pubitemid 34249783)
-
(2002)
Computer Law and Security Report
, vol.18
, Issue.2
, pp. 109-111
-
-
Fenn, C.1
Shooter, R.2
Allan, K.3
-
6
-
-
1242265180
-
Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors
-
A. Khalfan, "Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors", International Journal of Information Management, Vol. 24, pp. 29-42, 2004.
-
(2004)
International Journal of Information Management
, vol.24
, pp. 29-42
-
-
Khalfan, A.1
-
7
-
-
78049379327
-
Information security risk management: An empirical study on the importance and practices in ICT outsourcing
-
IEEE
-
N. Khidzir, N. Arshad, A. Mohamed, "Information security risk management: An empirical study on the importance and practices in ICT outsourcing", in Proc. of the International Symposium in Information Technology (ITSim), pp. 1610-1615, IEEE, 2010.
-
(2010)
Proc. of the International Symposium in Information Technology (ITSim)
, pp. 1610-1615
-
-
Khidzir, N.1
Arshad, N.2
Mohamed, A.3
-
8
-
-
0037004470
-
The case for outsourcing security
-
B. Schneier, "The case for outsourcing security", Computer, Vol. 35, pp. 20-26, 2002.
-
(2002)
Computer
, vol.35
, pp. 20-26
-
-
Schneier, B.1
-
9
-
-
33751160564
-
A framework for information technology outsourcing risk management
-
B. Aubert, M. Patry, S. Rivard, "A framework for information technology outsourcing risk management", ACM SIGMIS Database, Vol. 36, pp. 9-28, 2005.
-
(2005)
ACM SIGMIS Database
, vol.36
, pp. 9-28
-
-
Aubert, B.1
Patry, M.2
Rivard, S.3
-
10
-
-
0242611448
-
The information technology outsourcing risk: A transaction cost and agency theory-based perspective
-
DOI 10.1080/0268396032000130214
-
B. Bahli, S. Rivard, "The information technology outsourcing risk: A transaction cost and agency theory-based perspective", Journal of Information Technology, Vol. 18, pp. 211-221, 2003. (Pubitemid 37406519)
-
(2003)
Journal of Information Technology
, vol.18
, Issue.3
, pp. 211-221
-
-
Bahli, B.1
Rivard, S.2
-
11
-
-
18844385758
-
Information systems outsourcing risks: A study of large firms
-
DOI 10.1108/02635570510575180
-
R. Gonzalez, J. Gasco, J. Llopis, "Information systems outsourcing risks: A study of large firms", Industrial Management and Data Systems, Vol. 105, pp. 45-62, 2005. (Pubitemid 40690939)
-
(2005)
Industrial Management and Data Systems
, vol.105
, Issue.1
, pp. 45-62
-
-
Gonzalez, R.1
Gasco, J.2
Llopis, J.3
-
12
-
-
33749496395
-
A framework for outsourcing IS/IT security services
-
DOI 10.1108/09685220610707421
-
M. Karyda, E. Mitrou, G. Quirchmayr, "A framework for outsourcing IS/IT security services", Information Management & Computer Security, pp. 402-415, 2006. (Pubitemid 44515714)
-
(2006)
Information Management and Computer Security
, vol.14
, Issue.5
, pp. 402-415
-
-
Karyda, M.1
Mitrou, E.2
Quirchmayr, G.3
-
13
-
-
1542532493
-
Auctions Versus Negotiations
-
J. Bulow, P. Klemperer, "Auctions versus Negotiations", The American Economic Review, Vol. 86, No. 1, pp. 180-194, 1996. (Pubitemid 126420170)
-
(1996)
American Economic Review
, vol.86
, Issue.1
, pp. 180-194
-
-
Bulow, J.1
Klemperer, P.2
-
15
-
-
0141590641
-
Combinatorial Auction Design
-
National Academy Press, . USA
-
D. Porter, R. Stephen, R. Anil, S. Vernon, "Combinatorial Auction Design", in Proc. of the National Academy of Sciences, National Academy Press, pp. 11153-11157, USA, 2003.
-
(2003)
Proc. of the National Academy of Sciences
, pp. 11153-11157
-
-
Porter, D.1
Stephen, R.2
Anil, R.3
Vernon, S.4
-
16
-
-
80052757814
-
-
Federal Communications Commission (FCC), http://www.fcc.gov
-
-
-
-
17
-
-
0141495795
-
-
San Diego Academic Press, USA
-
V. Krishna, Auction Theory, San Diego Academic Press, USA, 2002.
-
(2002)
Auction Theory
-
-
Krishna, V.1
-
18
-
-
0032804976
-
Auction theory: A guide to the literature
-
P. Klemperer, "Auction Theory: A Guide to the Literature", Journal of Economic Surveys, Vol. 13, pp. 227-286, 1999. (Pubitemid 29392123)
-
(1999)
Journal of Economic Surveys
, vol.13
, Issue.3
, pp. 227-286
-
-
Klemperer, P.1
-
19
-
-
0000077429
-
Strategic Analysis of Auctions
-
R. Aumann, et al. (Eds.), USA
-
R. Wilson, "Strategic Analysis of Auctions", in Handbook of Game Theory, R. Aumann, et al. (Eds.), USA, 1990.
-
(1990)
Handbook of Game Theory
-
-
Wilson, R.1
-
21
-
-
21844482630
-
Design competition through multidimensional auctions
-
Y. Che, "Design competition through multidimensional auctions", RAND Journal of Economics, Vol. 24, pp. 668-680, 1993.
-
(1993)
RAND Journal of Economics
, vol.24
, pp. 668-680
-
-
Che, Y.1
-
23
-
-
84980096808
-
Counterspeculation, Auctions and Competitive Sealed Tenders
-
W. Vickrey, "Counterspeculation, Auctions and Competitive Sealed Tenders", Journal of Finance, Vol. 16, No. 1, pp. 8-37, 1961.
-
(1961)
Journal of Finance
, vol.16
, Issue.1
, pp. 8-37
-
-
Vickrey, W.1
-
24
-
-
0000914216
-
Auctions: An introduction
-
E. Wolfstetter, "Auctions: An introduction", Journal of Economic Surveys, Vol. 10, No. 4, pp. 367-420, 1996.
-
(1996)
Journal of Economic Surveys
, vol.10
, Issue.4
, pp. 367-420
-
-
Wolfstetter, E.1
-
25
-
-
0030305641
-
The all-pay auction with complete information
-
M. Baye, D. Kovenock, C. De Vries, "The all-pay auction with complete information", Economic Theory, Vol. 8, pp. 291-305, 1996. (Pubitemid 126172221)
-
(1996)
Economic Theory
, vol.8
, Issue.2
, pp. 291-305
-
-
Baye, M.R.1
Kovenock, D.2
De Vries, C.G.3
-
27
-
-
1642365959
-
-
J. Wiley
-
C. Courcoubetis, R. Weber, Pricing communication networks: Economics, Technology and Modelling, pp. 309-330, J. Wiley, 2003.
-
(2003)
Pricing Communication Networks: Economics, Technology and Modelling
, pp. 309-330
-
-
Courcoubetis, C.1
Weber, R.2
-
28
-
-
78149396361
-
-
Information Assurance Technology Analysis Center (IATAC)
-
N. Bartol, B. Bates, K. Goertzel, T. Winograd, Measuring Cyber Security and Information Assurance, State-of-the-Art Report, Information Assurance Technology Analysis Center (IATAC), 2009.
-
(2009)
Measuring Cyber Security and Information Assurance, State-of-the-Art Report
-
-
Bartol, N.1
Bates, B.2
Goertzel, K.3
Winograd, T.4
-
31
-
-
24944573251
-
Security Metrics Guide for Information Technology Systems
-
National Institute of Standards & Technology, NIST, USA
-
National Institute of Standards & Technology, Security Metrics Guide for Information Technology Systems, NIST Special Publication 800-55, NIST, USA, 2003.
-
(2003)
NIST Special Publication 800-55
-
-
-
33
-
-
84867879496
-
Managing Risk from Information Systems - An Organizational Perspective
-
National Institute of Standards & Technology, NIST, USA
-
National Institute of Standards & Technology, Managing Risk from Information Systems - An Organizational Perspective, NIST Special Publication 800-39, NIST, USA, 2008.
-
(2008)
NIST Special Publication 800-39
-
-
-
34
-
-
0242622485
-
Combinatorial auction design
-
D. Porter, S. Rassenti, A. Roopnarine, V. Smith, "Combinatorial auction design", Journal of Management Science, Vol. 49, pp. 1485-1503, 1993.
-
(1993)
Journal of Management Science
, vol.49
, pp. 1485-1503
-
-
Porter, D.1
Rassenti, S.2
Roopnarine, A.3
Smith, V.4
-
35
-
-
78049440541
-
An Experimental Test of Flexible Combinatorial Spectrum Auction Formats
-
C. Brunner, J. Goecee, C. Holt, J. Ledyard, "An Experimental Test of Flexible Combinatorial Spectrum Auction Formats", American Economic Journal of Microeconomics, Vol. 2, pp. 39-57, 2010.
-
(2010)
American Economic Journal of Microeconomics
, vol.2
, pp. 39-57
-
-
Brunner, C.1
Goecee, J.2
Holt, C.3
Ledyard, J.4
-
36
-
-
0034389119
-
Mutually Destructive Bidding: The FCC Auction Design Problem
-
M. Bykowsky, R. Cull, J. Ledyard, "Mutually Destructive Bidding: The FCC Auction Design Problem", Journal of Regulatory Economics, Vol. 17, pp. 205-228, 2000.
-
(2000)
Journal of Regulatory Economics
, vol.17
, pp. 205-228
-
-
Bykowsky, M.1
Cull, R.2
Ledyard, J.3
|