-
1
-
-
84865253334
-
A model of return on investment for information systems security
-
M. Al-Humaigani D. B. Dunn 2003 A model of return on investment for information systems security Circuits and Systems 1 483 485
-
(2003)
Circuits and Systems
, vol.1
, pp. 483-485
-
-
Al-Humaigani, M.1
Dunn, D.B.2
-
2
-
-
84925838576
-
Why information security is hard-an economic perspective
-
Anderson, R. (2001). Why information security is hard-an economic perspective. Computer Security Application Conference (pp. 358-365).
-
(2001)
Computer Security Application Conference
, pp. 358-365
-
-
Anderson, R.1
-
3
-
-
41649112685
-
Structural equation modeling in practice: A review and recommended two-step approach
-
10.1037/0033-2909.103.3.411
-
J. C. Anderson D. W. Gerbing 1988 Structural equation modeling in practice: a review and recommended two-step approach Psychological Bulletin 103 411 423 10.1037/0033-2909.103.3.411
-
(1988)
Psychological Bulletin
, vol.103
, pp. 411-423
-
-
Anderson, J.C.1
Gerbing, D.W.2
-
5
-
-
0000153880
-
Multitrait-multimethod matrices in consumer research
-
10.1086/208568
-
R. P. Bagozzi Y. Yi 1991 Multitrait-multimethod matrices in consumer research Journal of Consumer Research 17 4 426 439 10.1086/208568
-
(1991)
Journal of Consumer Research
, vol.17
, Issue.4
, pp. 426-439
-
-
Bagozzi, R.P.1
Yi, Y.2
-
6
-
-
0037786271
-
Performance and satisfaction in and industrial sales force: An examination of their antecedents and simultaneity
-
10.2307/1249978
-
R. P. Bagozzi 1988 Performance and satisfaction in and industrial sales force: An examination of their antecedents and simultaneity Journal of Marketing 44 65 77 10.2307/1249978
-
(1988)
Journal of Marketing
, vol.44
, pp. 65-77
-
-
Bagozzi, R.P.1
-
7
-
-
84865226671
-
Returns on security investment: An imprecise but necessary calculation
-
B. Blakely 2001 Returns on security investment: An imprecise but necessary calculation Secure Business Quarterly 1 2 27
-
(2001)
Secure Business Quarterly
, vol.1
, Issue.2
, pp. 27
-
-
Blakely, B.1
-
8
-
-
58149320754
-
Information Security Controls Are They Cost-effective
-
10.1016/0960-2593(95)90080-2
-
C. Blatchford 1995 Information Security Controls Are They Cost-effective Computer Audit Journal 3 11 19 10.1016/0960-2593(95)90080-2
-
(1995)
Computer Audit Journal
, vol.3
, pp. 11-19
-
-
Blatchford, C.1
-
9
-
-
13444274614
-
Evaluating information security investments using the analytic hierarchy process
-
10.1145/1042091.1042094
-
L. D. Bodin L. A. Gordon M. P. Loeb 2005 Evaluating information security investments using the analytic hierarchy process Communications of the ACM 48 79 83 10.1145/1042091.1042094
-
(2005)
Communications of the ACM
, vol.48
, pp. 79-83
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.P.3
-
10
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
K. Campbell L. A. Gordon M. P. Loeb L. Zhou 2003 The economic cost of publicly announced information security breaches: Empirical evidence from the stock market Journal of Computer Security 11 3 431 448
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
13
-
-
4243109556
-
A model for evaluating IT security investments
-
10.1145/1005817.1005828
-
H. Cavusoglu B. Mishra S. Raghunathan 2004 A model for evaluating IT security investments Communications of the ACM 47 7 87 92 10.1145/1005817. 1005828
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
15
-
-
29344445891
-
Return on security investment-proving it's worth it
-
10.1016/S1353-4858(05)70301-9
-
A. Davis 2005 Return on security investment-proving it's worth it Network Security 2 8 10 10.1016/S1353-4858(05)70301-9
-
(2005)
Network Security
, vol.2
, pp. 8-10
-
-
Davis, A.1
-
16
-
-
0036738975
-
Antecedent of B2C channel satisfaction and preference: Validating e-Commerce metrics
-
10.1287/isre.13.3.316.77
-
S. Devaraj M. Fan R. Kohli 2002 Antecedent of B2C channel satisfaction and preference: Validating e-Commerce metrics Information Systems Research 13 3 316 333 10.1287/isre.13.3.316.77
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 316-333
-
-
Devaraj, S.1
Fan, M.2
Kohli, R.3
-
17
-
-
0000009769
-
Evaluating structural equations models with unobservable variables and measurement error
-
10.2307/3151312
-
C. Fornell D. Larcker 1981 Evaluating structural equations models with unobservable variables and measurement error Journal of Marketing Research 18 39 50 10.2307/3151312
-
(1981)
Journal of Marketing Research
, vol.18
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.2
-
21
-
-
84865265876
-
The effect of information security breach and security investment announcement on the market value of Korean firms
-
(in Korean)
-
Gwon, Y. O.; & Kim, B. D. (2007) The effect of information security breach and security investment announcement on the market value of Korean firms. Information Systems Review, 9(1), 105-120. (in Korean).
-
(2007)
Information Systems Review
, vol.9
, Issue.1
, pp. 105-120
-
-
Gwon, Y.O.1
Kim, B.D.2
-
24
-
-
33846138611
-
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
-
10.1007/s10796-006-9011-6
-
K. Hausken 2006 Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability Information System Frontiers 8 5 338 349 10.1007/s10796-006-9011-6
-
(2006)
Information System Frontiers
, vol.8
, Issue.5
, pp. 338-349
-
-
Hausken, K.1
-
30
-
-
84865242079
-
A study on TCO-based return on security investment (ROSI)
-
(in Korean)
-
Kim, J. D.; & Park, J. E. (2003) A study on TCO-based return on security investment (ROSI). In Proceedings of the Korea Digital Policy Conference (Vol. 1, pp. 251-261) (in Korean).
-
(2003)
Proceedings of the Korea Digital Policy Conference
, vol.1
, pp. 251-261
-
-
Kim, J.D.1
Park, J.E.2
-
32
-
-
7444249783
-
A framework for assessing the business value of information technology infrastructures
-
K. L. Kumar 2004 A framework for assessing the business value of information technology infrastructures Journal of management Information Systems 21 2 11 32
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.2
, pp. 11-32
-
-
Kumar, K.L.1
-
33
-
-
35048852594
-
A fuzzy multi-criteria decision model for information system security investment
-
10.1007/978-3-540-45080-1-58
-
V. C. S. Lee 2003 A fuzzy multi-criteria decision model for information system security investment Lecture Notes in Computer Science 2690 436 441 10.1007/978-3-540-45080-1-58
-
(2003)
Lecture Notes in Computer Science
, vol.2690
, pp. 436-441
-
-
Lee, V.C.S.1
-
35
-
-
79958862451
-
A goal-oriented trust model for virtual organization creation
-
Mun, J. T.; Shin, M. S.; & Jung, M. Y. (2009). A goal-oriented trust model for virtual organization creation. Journal of Intelligent Manufacturing. http://www.springerlink.com/content/03685347x1837440/.
-
(2009)
Journal of Intelligent Manufacturing
-
-
Mun, J.T.1
Shin, M.S.2
Jung, M.Y.3
-
38
-
-
70449132594
-
Virtual organisation breeding environments value system and its elements
-
Romero, D.; Galeano, N.; & Molina1, A. (2008). Virtual organisation breeding environments value system and its elements. Journal of Intelligent Manufacturing. http://www.springerlink.com/content/x2374786057w57j3/.
-
(2008)
Journal of Intelligent Manufacturing
-
-
Romero, D.1
Galeano, N.2
Molina, A.3
-
42
-
-
84865220015
-
Review the economics means to information security
-
(in Korean)
-
Shin, I. S. (2004). Review the economics means to information security. Information Security Review, 1(1), 27-40. (in Korean).
-
(2004)
Information Security Review
, vol.1
, Issue.1
, pp. 27-40
-
-
Shin, I.S.1
-
44
-
-
84865259414
-
A Study on the effect of information security policy and organization on the performance of information security
-
(in Korean)
-
Sun, H. G. (2005). A Study on the effect of information security policy and organization on the performance of information security. In Proceedings of the Korea management information system international conference, (pp. 1087-1095) (in Korean).
-
(2005)
Proceedings of the Korea Management Information System International Conference
, pp. 1087-1095
-
-
Sun, H.G.1
-
45
-
-
12144285368
-
Vulnerability and information security investment: An empirical analysis of E-local government in Japan
-
10.1016/j.jaccpubpol.2004.12.003
-
H. Tanaka K. Matuura O. Sudoh 2005 Vulnerability and information security investment: An empirical analysis of E-local government in Japan Journal of Accounting and Public Policy 24 37 59 10.1016/j.jaccpubpol.2004.12.003
-
(2005)
Journal of Accounting and Public Policy
, vol.24
, pp. 37-59
-
-
Tanaka, H.1
Matuura, K.2
Sudoh, O.3
-
46
-
-
17844396492
-
The economic approach of information security
-
10.1016/j.cose.2005.02.001
-
T. Tsiakis G. Stephanides 2005 The economic approach of information security Computers and Security 24 2 105 108 10.1016/j.cose.2005.02.001
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 105-108
-
-
Tsiakis, T.1
Stephanides, G.2
-
47
-
-
33747470426
-
-
Gartner Stamford
-
Witty R. J.; Girard J.; Graff J. W.; Hallawell A.; Hildreth B.; MacDonald N.; Malik W. J.; Pescatore J.; Reynolds M.; Russell K.; Wheatman V.; Dubiel J. P.; Weintraub A. (2001) The price of information security. Gartner, Stamford
-
(2001)
The Price of Information Security
-
-
Witty, R.J.1
Girard, J.2
Graff, J.W.3
Hallawell, A.4
Hildreth, B.5
MacDonald, N.6
Malik, W.J.7
Pescatore, J.8
Reynolds, M.9
Russell, K.10
Wheatman, V.11
Dubiel, J.P.12
Weintraub, A.13
-
48
-
-
23844552166
-
Extending the TAM for a t-commerce
-
10.1016/j.im.2004.11.001
-
J. E. Yu M. K. Ha Choi J. J. Rho 2005 Extending the TAM for a t-commerce Information and Management 42 965 976 10.1016/j.im.2004.11.001
-
(2005)
Information and Management
, vol.42
, pp. 965-976
-
-
Yu, J.E.1
Ha Choi, M.K.2
Rho, J.J.3
|