-
3
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
Arbaugh, W.A.; Fithen, W.L.; and McHugh, J. Windows of vulnerability: A case study analysis. Computer, 33, 12 (2000), 52-58.
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 52-58
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
4
-
-
33644916146
-
Sell first, fix later: Impact of patching on software quality
-
Arora, A.; Caulkins, J.P.; and Telang, R. Sell first, fix later: Impact of patching on software quality. Management Science, 52, 3 (2006), 465-471.
-
(2006)
Management Science
, vol.52
, Issue.3
, pp. 465-471
-
-
Arora, A.1
Caulkins, J.P.2
Telang, R.3
-
5
-
-
33846183559
-
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
-
Arora, A.; Nandkumar, A.; and Telang, R. Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers, 8, 5 (2006), 350-362.
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.5
, pp. 350-362
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
6
-
-
61849175198
-
Optimal policy for software vulnerability disclosure
-
Arora, A.; Telang, R.; and Xu, H. Optimal policy for software vulnerability disclosure. Management Science, 54, 4 (2008), 642-656.
-
(2008)
Management Science
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
7
-
-
77649179868
-
Competition and patching of security vulnerabilities: An empirical analysis
-
Arora, A.; Forman, C.; Nandkumar, A.; and Telang, R. Competition and patching of security vulnerabilities: An empirical analysis. Information Economics and Policy, 22, 2 (2010), 164-177.
-
(2010)
Information Economics and Policy
, vol.22
, Issue.2
, pp. 164-177
-
-
Arora, A.1
Forman, C.2
Nandkumar, A.3
Telang, R.4
-
8
-
-
77954250852
-
An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure
-
Arora, A.; Krishnan, R.; Telang, R.; and Yang, Y. An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure. Information Systems Research, 21, 1 (2010), 115-132.
-
(2010)
Information Systems Research
, vol.21
, Issue.1
, pp. 115-132
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.4
-
9
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A.; Laprie, J.C.; Randell, B.; and Landwehr, C. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1, 1 (2004), 11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.C.2
Randell, B.3
Landwehr, C.4
-
10
-
-
0034556312
-
The moderating effects of structure on volatility and complexity in software enhancement
-
Banker, R.D., and Slaughter, S.A. The moderating effects of structure on volatility and complexity in software enhancement. Information Systems Research, 11, 3 (2000), 219-240.
-
(2000)
Information Systems Research
, vol.11
, Issue.3
, pp. 219-240
-
-
Banker, R.D.1
Slaughter, S.A.2
-
11
-
-
33847021395
-
Understanding the impact of collaboration software on product design and development
-
Banker, R.D.; Bardhan, I.; and Asdemir, O. Understanding the impact of collaboration software on product design and development. Information Systems Research, 17, 4 (2006), 352-373.
-
(2006)
Information Systems Research
, vol.17
, Issue.4
, pp. 352-373
-
-
Banker, R.D.1
Bardhan, I.2
Asdemir, O.3
-
12
-
-
0032050741
-
Software development practices, software complexity, and software maintenance performance: A field study
-
Banker, R.D.; Davis, G.B.; and Slaughter, S.A. Software development practices, software complexity, and software maintenance performance: A field study. Management Science, 44, 4 (1998), 433-450.
-
(1998)
Management Science
, vol.44
, Issue.4
, pp. 433-450
-
-
Banker, R.D.1
Davis, G.B.2
Slaughter, S.A.3
-
13
-
-
0035580741
-
Private politics, corporate social responsibility, and integrated strategy
-
Baron, D.P. Private politics, corporate social responsibility, and integrated strategy. Journal of Economics & Management Strategy, 10, 1 (2001), 7-45.
-
(2001)
Journal of Economics & Management Strategy
, vol.10
, Issue.1
, pp. 7-45
-
-
Baron, D.P.1
-
14
-
-
78249276668
-
Timing the application of security patches for optimal uptime
-
Berkeley, CA: USENIX Association
-
Beattie, S.; Arnold, S.; Cowan, C.; Wagle, P.; and Wright, C. Timing the application of security patches for optimal uptime. In Proceedings of LISA '02: Sixteenth Systems Administration Conference. Berkeley, CA: USENIX Association, 2002, pp. 233-242.
-
(2002)
Proceedings of LISA '02: Sixteenth Systems Administration Conference
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
-
17
-
-
0000758307
-
A three-dimensional conceptual model of corporate social performance
-
Carroll, A.B. A three-dimensional conceptual model of corporate social performance. Academy of Management Review, 4 (1979), 497-505.
-
(1979)
Academy of Management Review
, vol.4
, pp. 497-505
-
-
Carroll, A.B.1
-
18
-
-
33947376004
-
Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
-
Cavusoglu, H.; Cavusoglu, H.; and Raghunathan, S. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Transactions on Software Engineering, 33, 3 (2007), 171-184.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.3
, pp. 171-184
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
19
-
-
33845524230
-
Common vulnerability scoring system
-
Chandramouli, R.; Grance, T.; Kuhn, R.; and Landau, S. Common vulnerability scoring system. IEEE Security & Privacy, 4, 6 (2006), 85-89.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.6
, pp. 85-89
-
-
Chandramouli, R.1
Grance, T.2
Kuhn, R.3
Landau, S.4
-
20
-
-
0000336139
-
Regression models and life tables
-
Cox, D.R. Regression models and life tables. Journal of the Royal Statistical Society, Series B (Methodological), 34, 2 (1972), 187-220.
-
(1972)
Journal of the Royal Statistical Society, Series B (Methodological)
, vol.34
, Issue.2
, pp. 187-220
-
-
Cox, D.R.1
-
21
-
-
38349093900
-
Team knowledge and coordination in geographically distributed software development
-
Summer
-
Espinosa, J.A.; Slaughter, S.A.; Kraut, R.E.; and Herbsleb, J.D. Team knowledge and coordination in geographically distributed software development. Journal of Management Information Systems, 24, 1 (Summer 2007), 135-169.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 135-169
-
-
Espinosa, J.A.1
Slaughter, S.A.2
Kraut, R.E.3
Herbsleb, J.D.4
-
22
-
-
0034478781
-
Coordinating expertise in software development teams
-
Faraj, S., and Sproull, L. Coordinating expertise in software development teams. Management Science, 46, 12 (2000), 1554-1568.
-
(2000)
Management Science
, vol.46
, Issue.12
, pp. 1554-1568
-
-
Faraj, S.1
Sproull, L.2
-
25
-
-
72449210441
-
Improving cvss-based vulnerability prioritization and response with context information
-
Washington, DC: IEEE Computer Society
-
Frühwirth, C., and Männistö, T. Improving CVSS-based vulnerability prioritization and response with context information. In Proceedings of the 3rd International Symposium on Empirical Software Engineering and Measurement. Washington, DC: IEEE Computer Society, 2009, pp. 535-544.
-
(2009)
Proceedings of the 3rd International Symposium on Empirical Software Engineering and Measurement
, pp. 535-544
-
-
Frühwirth, C.1
Männistö, T.2
-
26
-
-
3242808612
-
-
Computer Security Institute, New York
-
Gordon, L.A.; Loeb, M.P.; Lucyshyn, W.; and Richardson, R. 2006 CSI/FBI Computer Crime and Security Survey. Computer Security Institute, New York, 2006.
-
(2006)
2006 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
28
-
-
77955420733
-
Estimating impact and frequency of risks to safety and mission critical systems using cvss
-
Seattle, November 11
-
Houmb, S.H.; Nunes Leal Franqueira, V.; and Engum, E.A. Estimating impact and frequency of risks to safety and mission critical systems using CVSS. Paper presented at the ISSRE 2008: 1st Workshop on Dependable Software Engineering, Seattle, November 11, 2008.
-
(2008)
Paper Presented at the ISSRE 2008: 1st Workshop on Dependable Software Engineering
-
-
Houmb, S.H.1
Nunes Leal Franqueira, V.2
Engum, E.A.3
-
29
-
-
0347856275
-
-
New York: Institute of Electrical and Electronics Engineers
-
IEEE Standard for Software Maintenance. New York: Institute of Electrical and Electronics Engineers, 1993.
-
(1993)
IEEE Standard for Software Maintenance
-
-
-
30
-
-
66549101204
-
The impact of open source software on the strategic choices of firms developing proprietary software
-
Winter
-
Jaisingh, J.; See-To, E.W.K.; and Tam, K.Y. The impact of open source software on the strategic choices of firms developing proprietary software. Journal of Management Information Systems, 25, 3 (Winter 2008-9), 241-275.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.3
, pp. 241-275
-
-
Jaisingh, J.1
See-To, E.W.K.2
Tam, K.Y.3
-
31
-
-
58849133506
-
Information risk of inadvertent disclosure: An analysis of file-sharing risk in the financial supply chain
-
Fall
-
Johnson, M.E. Information risk of inadvertent disclosure: An analysis of file-sharing risk in the financial supply chain. Journal of Management Information Systems, 25, 2 (Fall 2008), 97-123.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 97-123
-
-
Johnson, M.E.1
-
32
-
-
35948938098
-
Market reactions to information security breach announcements: An empirical analysis
-
Kannan, K.; Rees, J.; and Sridhar, S. Market reactions to information security breach announcements: An empirical analysis. International Journal of Electronic Commerce, 12, 1 (2007), 69-91.
-
(2007)
International Journal of Electronic Commerce
, vol.12
, Issue.1
, pp. 69-91
-
-
Kannan, K.1
Rees, J.2
Sridhar, S.3
-
33
-
-
2342524827
-
Software complexity and software maintenance: A survey of empirical research
-
Kemerer, C.F. Software complexity and software maintenance: A survey of empirical research. Annals of Software Engineering, 1, 1 (1995), 1-22.
-
(1995)
Annals of Software Engineering
, vol.1
, Issue.1
, pp. 1-22
-
-
Kemerer, C.F.1
-
34
-
-
0034155864
-
Classification-tree models of software-quality over multiple releases
-
Khoshgoftaar, T.M.; Allen, E.B.; Jones, W.D.; and Hudepohl, J.P. Classification-tree models of software-quality over multiple releases. IEEE Transactions on Reliability, 49, 1 (2000), 4-11.
-
(2000)
IEEE Transactions on Reliability
, vol.49
, Issue.1
, pp. 4-11
-
-
Khoshgoftaar, T.M.1
Allen, E.B.2
Jones, W.D.3
Hudepohl, J.P.4
-
35
-
-
84892372742
-
The robust inference for the cox proportional hazards model
-
Lin, D.Y., and Wei, L.J. The robust inference for the Cox proportional hazards model. Journal of the American Statistical Association, 84, 408 (1989), 1074-1078.
-
(1989)
Journal of the American Statistical Association
, vol.84
, Issue.408
, pp. 1074-1078
-
-
Lin, D.Y.1
Wei, L.J.2
-
36
-
-
84870973846
-
Design architecture, developer networks, and performance of open source software projects
-
Atlanta: Association for Information Systems available at
-
Liu, X., and Iyer, B. Design architecture, developer networks, and performance of open source software projects. In Proceedings of the 2007 International Conference on Information Systems. Atlanta: Association for Information Systems, 2007 (available at http://aisel.aisnet .org/icis2007/90/).
-
Proceedings of the 2007 International Conference on Information Systems
, vol.2007
-
-
Liu, X.1
Iyer, B.2
-
37
-
-
34648837018
-
Improving the common vulnerability scoring system
-
Mell, P., and Scarfone, K. Improving the common vulnerability scoring system. IET Information Security, 1, 3 (2007), 119-127.
-
(2007)
IET Information Security
, vol.1
, Issue.3
, pp. 119-127
-
-
Mell, P.1
Scarfone, K.2
-
40
-
-
0029613841
-
Importance of events per independent variable in proportional hazards regression analysis ii: Accuracy and precision of regression estimates
-
Peduzzi, P.; Concato, J.; Feinstein, A.R.; and Holford, T.R. Importance of events per independent variable in proportional hazards regression analysis II: Accuracy and precision of regression estimates. Journal of Clinical Epidemiology, 48, 12 (1995), 1503-1510.
-
(1995)
Journal of Clinical Epidemiology
, vol.48
, Issue.12
, pp. 1503-1510
-
-
Peduzzi, P.1
Concato, J.2
Feinstein, A.R.3
Holford, T.R.4
-
42
-
-
63349088117
-
The deterrent and displacement effects of information security enforcement: International evidence
-
Fall
-
Png, I.P.L.; Wang, C.Y.; and Wang, Q.H. The deterrent and displacement effects of information security enforcement: International evidence. Journal of Management Information Systems, 25, 2 (Fall 2008), 125-144.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 125-144
-
-
Png, I.P.L.1
Wang, C.Y.2
Wang, Q.H.3
-
43
-
-
1842478892
-
Customer attrition analysis for financial services using proportional hazard models
-
Poel, D.V.D., and Lariviere, B. Customer attrition analysis for financial services using proportional hazard models. European Journal of Operational Research, 157, 1 (2004), 196-217.
-
(2004)
European Journal of Operational Research
, vol.157
, Issue.1
, pp. 196-217
-
-
Poel, D.V.D.1
Lariviere, B.2
-
44
-
-
67649548424
-
Choice and chance: A conceptual model of paths to information security compromise
-
Ransbotham, S., and Mitra, S. Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 20, 1 (2009), 121-139.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 121-139
-
-
Ransbotham, S.1
Mitra, S.2
-
46
-
-
13944255430
-
The effects of information technology project complexity on group interaction
-
Winter
-
Roberts, T.L.; Cheney, P.H.; Sweeney, P.D.; and Hightower, R.T. The effects of information technology project complexity on group interaction, Journal of Management Information Systems, 21, 3 (Winter 2004-5), 223-247.
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.3
, pp. 223-247
-
-
Roberts, T.L.1
Cheney, P.H.2
Sweeney, P.D.3
Hightower, R.T.4
-
47
-
-
38349118570
-
A strategic analysis of competition between open source and proprietary software
-
Summer
-
Sen, R. A strategic analysis of competition between open source and proprietary software. Journal of Management Information Systems, 24, 1 (Summer 2007), 233-257.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 233-257
-
-
Sen, R.1
-
48
-
-
0032131311
-
Evaluating the cost of software quality
-
Slaughter, S.A.; Harter, D.E.; and Krishnan, M.S. Evaluating the cost of software quality. Communications of the ACM, 41, 8 (1998), 67-73.
-
(1998)
Communications of the ACM
, vol.41
, Issue.8
, pp. 67-73
-
-
Slaughter, S.A.1
Harter, D.E.2
Krishnan, M.S.3
-
49
-
-
45449105171
-
Information accountability
-
Weitzner, D.J.; Abelson, H.; Berners-Lee, T.; Feigenbaum, J.; Hendler, J.; and Sussman, G.J. Information accountability. Communications of the ACM, 51, 6 (2008), 82-87.
-
(2008)
Communications of the ACM
, vol.51
, Issue.6
, pp. 82-87
-
-
Weitzner, D.J.1
Abelson, H.2
Berners-Lee, T.3
Feigenbaum, J.4
Hendler, J.5
Sussman, G.J.6
-
50
-
-
0000856630
-
Corporate social performance revisited
-
Wood, D.J. Corporate social performance revisited. Academy of Management Review, 16, 4 (1991), 691-718.
-
(1991)
Academy of Management Review
, vol.16
, Issue.4
, pp. 691-718
-
-
Wood, D.J.1
-
51
-
-
23744456455
-
Complexity of information systems development projects: Conceptualization and measurement development
-
Summer
-
Xia, W., and Lee, G. Complexity of information systems development projects: Conceptualization and measurement development. Journal of Management Information Systems, 22, 1 (Summer 2005), 45-83
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.1
, pp. 45-83
-
-
Xia, W.1
Lee, G.2
|