-
1
-
-
77949571258
-
Enhancing performance through public sector networks: Mobilizing human capital in communities of practice
-
Agranoff R. Enhancing performance through public sector networks: Mobilizing human capital in communities of practice. Public Performance & Management Review 2008, March 01, 31(3):320-347.
-
(2008)
Public Performance & Management Review
, vol.31
, Issue.3
, pp. 320-347
-
-
Agranoff, R.1
-
2
-
-
70350633126
-
On the cultural locus of management theory industry: Perspectives from autocommunication
-
Ahonen A., Kallio T. On the cultural locus of management theory industry: Perspectives from autocommunication. Management and Organizational History 2009, January 01, 4(4):427-443.
-
(2009)
Management and Organizational History
, vol.4
, Issue.4
, pp. 427-443
-
-
Ahonen, A.1
Kallio, T.2
-
3
-
-
0028604447
-
A psychological study of the inverse relationship between perceived risk and perceived benefit
-
Alhakami A.S., Slovic P. A psychological study of the inverse relationship between perceived risk and perceived benefit. Risk Analysis 1994, January 01, 14(6):1085-1096.
-
(1994)
Risk Analysis
, vol.14
, Issue.6
, pp. 1085-1096
-
-
Alhakami, A.S.1
Slovic, P.2
-
6
-
-
85007030343
-
-
Attorney-General's Department Trusted Information Sharing Network 2003, Government of Australia, (Retrieved from http://www.tisn.gov.au/Pages/default.aspx).
-
(2003)
Government of Australia
-
-
-
7
-
-
84928770822
-
Skating on stilts: Why we aren't stopping tomorrow's terrorism
-
Hoover Institution at Leland Stanford Junior University, Stanford, CA
-
Baker S. Skating on stilts: Why we aren't stopping tomorrow's terrorism. Hoover Institution Press Publication no. 591 2010, Hoover Institution at Leland Stanford Junior University, Stanford, CA.
-
(2010)
Hoover Institution Press Publication no. 591
-
-
Baker, S.1
-
8
-
-
70349671112
-
A characterization of trust, and its consequences
-
Barbalet J. A characterization of trust, and its consequences. Theory and Society 2009, January 01, 38(4):367-382.
-
(2009)
Theory and Society
, vol.38
, Issue.4
, pp. 367-382
-
-
Barbalet, J.1
-
9
-
-
0346685762
-
The invincible character of management consulting rhetoric: How one blends incommensurates while keeping them apart
-
Berglund J., Werr A. The invincible character of management consulting rhetoric: How one blends incommensurates while keeping them apart. Organization 2000, January 01, 7(4):633-655.
-
(2000)
Organization
, vol.7
, Issue.4
, pp. 633-655
-
-
Berglund, J.1
Werr, A.2
-
10
-
-
77953568642
-
Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies
-
Bertot J.C., Jaeger P.T., Grimes J.M. Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government Information Quarterly 2010, July 01, 27(3):264-271.
-
(2010)
Government Information Quarterly
, vol.27
, Issue.3
, pp. 264-271
-
-
Bertot, J.C.1
Jaeger, P.T.2
Grimes, J.M.3
-
11
-
-
23844538579
-
The availability heuristic: A critical examination
-
Oxford University Press, Oxford, P. Sedlmeier, T. Betsch (Eds.)
-
Betsch T., Pohl D. The availability heuristic: A critical examination. Etc.-Frequency processing and cognition 2002, 109-119. Oxford University Press, Oxford. P. Sedlmeier, T. Betsch (Eds.).
-
(2002)
Etc.-Frequency processing and cognition
, pp. 109-119
-
-
Betsch, T.1
Pohl, D.2
-
13
-
-
84928769646
-
It's time to take cybersecurity seriously
-
Retrieved from
-
Busseri T. It's time to take cybersecurity seriously. Wired Magazine 2012, March 12, (Retrieved from http://www.wired.com/2012/03/opinion-busseri-cybersecurity/).
-
(2012)
Wired Magazine
-
-
Busseri, T.1
-
15
-
-
77950782070
-
Cyber-terror-Looming threat or phantom menace? The framing of the US cyber-threat debate
-
Cavelty M.D. Cyber-terror-Looming threat or phantom menace? The framing of the US cyber-threat debate. Journal of Information Technology & Politics 2007, March 01, 4:1.
-
(2007)
Journal of Information Technology & Politics
, vol.4
, pp. 1
-
-
Cavelty, M.D.1
-
16
-
-
84928758639
-
Centre for the Protection of National Infrastructure
-
Government of the United Kingdom. Retrieved.
-
Centre for the Protection of National Infrastructure. (2006). CPNI. Government of the United Kingdom. Retrieved. http://www.cpni.gov.uk/.
-
(2006)
-
-
-
17
-
-
0011975239
-
The management guru as organizational witchdoctor
-
Clark T., Salaman G. The management guru as organizational witchdoctor. Organization 1996, January 01, 3(1):85-107.
-
(1996)
Organization
, vol.3
, Issue.1
, pp. 85-107
-
-
Clark, T.1
Salaman, G.2
-
18
-
-
85007036975
-
Cyber attacks can spark real wars
-
Clarke R. Cyber attacks can spark real wars. The Wall Street Journal 2012, Retrieved from: http://www.wsj.com/articles/SB10001424052970204883304577219543897943980.
-
(2012)
The Wall Street Journal
-
-
Clarke, R.1
-
22
-
-
85007045092
-
Intellectual capital and e-collaboration: The hidden cost of the status quo
-
Conabree D. Intellectual capital and e-collaboration: The hidden cost of the status quo. FMI Journal 2011, 23(1):11-12.
-
(2011)
FMI Journal
, vol.23
, Issue.1
, pp. 11-12
-
-
Conabree, D.1
-
23
-
-
85007129959
-
Cyber guards or soldiers: Which do we need most?
-
Coughlin C. Cyber guards or soldiers: Which do we need most?. The Daily Telegraph 2010, October14, (Retrieved from: http://www.telegraph.co.uk/comment/columnists/concoughlin/8063120/Cyber-guards-or-soldiers-which-do-we-need-most.html).
-
(2010)
The Daily Telegraph
-
-
Coughlin, C.1
-
24
-
-
20844436170
-
Fighting terrorism, making war: Critical insights in the management of information and intelligence
-
Dearstyne B.W. Fighting terrorism, making war: Critical insights in the management of information and intelligence. Government Information Quarterly 2005, January 01, 22(2):170-186.
-
(2005)
Government Information Quarterly
, vol.22
, Issue.2
, pp. 170-186
-
-
Dearstyne, B.W.1
-
26
-
-
84928765921
-
Edelman Insights
-
Edelman Edelman trust barometer 2013: Annual global study Canadian findings
-
Edelman Edelman trust barometer 2013: Annual global study: Canadian findings 2013, Edelman Insights, (Retrieved from: http://www.slideshare.net/EdelmanInsights/canada-results-2013-edelman-trust-barometer).
-
(2013)
-
-
-
27
-
-
33746144047
-
Supply chain risk mitigation: Modeling the enablers
-
Faisal M.N., Banwet D.K., Shankar R. Supply chain risk mitigation: Modeling the enablers. Business Process Management Journal 2006, July 01, 12(4):535-552.
-
(2006)
Business Process Management Journal
, vol.12
, Issue.4
, pp. 535-552
-
-
Faisal, M.N.1
Banwet, D.K.2
Shankar, R.3
-
28
-
-
0001529506
-
Gender, race, and perceived risk: The 'white male' effect
-
Finucane M., Slovic P., Mertz C.K., Flynn J., Satterfield T. Gender, race, and perceived risk: The 'white male' effect. Health, Risk & Society 2000, July 01, 2(2):159-172.
-
(2000)
Health, Risk & Society
, vol.2
, Issue.2
, pp. 159-172
-
-
Finucane, M.1
Slovic, P.2
Mertz, C.K.3
Flynn, J.4
Satterfield, T.5
-
29
-
-
0001516010
-
Recent attribution research in consumer behavior: A review and new directions
-
Folkes V.S. Recent attribution research in consumer behavior: A review and new directions. Journal of Consumer Research 1988, March 01, 14(4):548-565.
-
(1988)
Journal of Consumer Research
, vol.14
, Issue.4
, pp. 548-565
-
-
Folkes, V.S.1
-
32
-
-
78650445843
-
Cross-cultural differences in risk perceptions of disasters
-
Gierlach E., Belsher B.E., Beutler L.E. Cross-cultural differences in risk perceptions of disasters. Risk Analysis 2010, January 01, 30(10):1539-1549.
-
(2010)
Risk Analysis
, vol.30
, Issue.10
, pp. 1539-1549
-
-
Gierlach, E.1
Belsher, B.E.2
Beutler, L.E.3
-
33
-
-
85007144968
-
Hire the hackers!
-
Glenny M. Hire the hackers!. TED Talks 2011, July, (Retrieved from http://www.ted.com/talks/misha_glenny_hire_the_hackers.html).
-
(2011)
TED Talks
-
-
Glenny, M.1
-
34
-
-
85007045081
-
Canada's weakling Web defenses
-
Glenny M. Canada's weakling Web defenses. The Globe and Mail 2011, May 18, (Retrieved from http://www.theglobeandmail.com/globe-debate/canadas-weakling-web-defences/article580145/).
-
(2011)
The Globe and Mail
-
-
Glenny, M.1
-
35
-
-
77956175270
-
National Security Directive declassification
-
Gordon V. National Security Directive declassification. Government Information Quarterly 2010, October 01, 27(4):322-328.
-
(2010)
Government Information Quarterly
, vol.27
, Issue.4
, pp. 322-328
-
-
Gordon, V.1
-
36
-
-
71649085630
-
Digital disaster, cyber security, and the Copenhagen school
-
Hansen L., Nissenbaum H. Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly 2009, December 01, 53(4):1155-1175.
-
(2009)
International Studies Quarterly
, vol.53
, Issue.4
, pp. 1155-1175
-
-
Hansen, L.1
Nissenbaum, H.2
-
37
-
-
34547499412
-
-
Polity Press, Cambridge
-
Hardin R. Trust 2006, Polity Press, Cambridge.
-
(2006)
Trust
-
-
Hardin, R.1
-
38
-
-
85044814578
-
The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen
-
Harknett R.J., Stever J.A. The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security and Emergency Management 2009, November 30, 6:1.
-
(2009)
Journal of Homeland Security and Emergency Management
, vol.6
, pp. 1
-
-
Harknett, R.J.1
Stever, J.A.2
-
44
-
-
0003927258
-
-
Earthscan, London
-
Jaeger C., Renn O., Rosa E.A., Webler T. Risk, uncertainty, and rational action 2001, Earthscan, London.
-
(2001)
Risk, uncertainty, and rational action
-
-
Jaeger, C.1
Renn, O.2
Rosa, E.A.3
Webler, T.4
-
45
-
-
84859251157
-
Understanding management gurus and historical narratives: The benefits of a historic turn in management and organization studies
-
Keulen S., Kroeze R. Understanding management gurus and historical narratives: The benefits of a historic turn in management and organization studies. Management and Organizational History 2012, May 01, 7(2):171-189.
-
(2012)
Management and Organizational History
, vol.7
, Issue.2
, pp. 171-189
-
-
Keulen, S.1
Kroeze, R.2
-
46
-
-
0005584387
-
Rhetoric and myth in management fashion
-
Kieser A. Rhetoric and myth in management fashion. Organization 1997, February 01, 4(1):49-74.
-
(1997)
Organization
, vol.4
, Issue.1
, pp. 49-74
-
-
Kieser, A.1
-
47
-
-
79952081157
-
Accountability in governance networks: An assessment of public, private, and nonprofit emergency management practices following Hurricane Katrina
-
Koliba C.J., Mills R.M., Zia A. Accountability in governance networks: An assessment of public, private, and nonprofit emergency management practices following Hurricane Katrina. Public Administration Review 2011, March 01, 71(2):210-220.
-
(2011)
Public Administration Review
, vol.71
, Issue.2
, pp. 210-220
-
-
Koliba, C.J.1
Mills, R.M.2
Zia, A.3
-
49
-
-
85044808163
-
Committed to protection? Partnerships in critical infrastructure protection
-
Koski C. Committed to protection? Partnerships in critical infrastructure protection. Journal of Homeland Security and Emergency Management 2011, January 01, 8:1.
-
(2011)
Journal of Homeland Security and Emergency Management
, vol.8
, pp. 1
-
-
Koski, C.1
-
50
-
-
23144435923
-
Trust and distrust in organizations: emerging perspectives, enduring questions
-
Kramer R.M. Trust and distrust in organizations: emerging perspectives, enduring questions. Annual Review of Psychology 1999, January 01, 50:569-598.
-
(1999)
Annual Review of Psychology
, vol.50
, pp. 569-598
-
-
Kramer, R.M.1
-
51
-
-
78649783634
-
Communicating risks: Examining hazard and outrage in multiple contexts
-
Lachlan K., Spence P.R. Communicating risks: Examining hazard and outrage in multiple contexts. Risk Analysis 2010, January 01, 30(12):1872-1886.
-
(2010)
Risk Analysis
, vol.30
, Issue.12
, pp. 1872-1886
-
-
Lachlan, K.1
Spence, P.R.2
-
53
-
-
0035373510
-
Developing fully functional E-government: A four stage model
-
Layne K., Lee J. Developing fully functional E-government: A four stage model. Government Information Quarterly 2001, April 01, 18(2):122-136.
-
(2001)
Government Information Quarterly
, vol.18
, Issue.2
, pp. 122-136
-
-
Layne, K.1
Lee, J.2
-
54
-
-
18544361959
-
Cyber terror: Missing in action
-
Lewis J. Cyber terror: Missing in action. Knowledge, Technology, and, Policy 2003, June 01, 16(2):34-41.
-
(2003)
Knowledge, Technology, and, Policy
, vol.16
, Issue.2
, pp. 34-41
-
-
Lewis, J.1
-
55
-
-
85007047413
-
The threat is real and must be stopped
-
Lieberman J. The threat is real and must be stopped. The New York Times 2012, October 17, (Retrieved from: http://www.nytimes.com/roomfordebate/2012/10/17/should-industry-face-more-cybersecurity-mandates/the-cyber-threat-is-real-and-must-be-stopped-by-business-and-government).
-
(2012)
The New York Times
-
-
Lieberman, J.1
-
56
-
-
84860869335
-
How to make decisions in an uncertain world: Heuristics, biases, and risk perception
-
Maldonato M., Dell'Orco S. How to make decisions in an uncertain world: Heuristics, biases, and risk perception. World Futures 2011, November 01, 67(8):569-577.
-
(2011)
World Futures
, vol.67
, Issue.8
, pp. 569-577
-
-
Maldonato, M.1
Dell'Orco, S.2
-
57
-
-
85007045137
-
Cybersecurity requires a multi-layered approach
-
Mather L. Cybersecurity requires a multi-layered approach. Info Security Magazine 2011, April 21., (Retrieved from: http://www.infosecurity-magazine.com/opinions/comment-cybersecurity-requires-a-multi-layered/).
-
(2011)
Info Security Magazine
-
-
Mather, L.1
-
58
-
-
47649096320
-
Unclassified information sharing and coordination in security, stabilization, transition and reconstruction efforts
-
Mittu R., Guleyupoglu S., Johnson A., Barlow W., Dowdy M., McCarthy S. Unclassified information sharing and coordination in security, stabilization, transition and reconstruction efforts. International Journal of Electronic Government Research 2008, January 01, 4(1):36-48.
-
(2008)
International Journal of Electronic Government Research
, vol.4
, Issue.1
, pp. 36-48
-
-
Mittu, R.1
Guleyupoglu, S.2
Johnson, A.3
Barlow, W.4
Dowdy, M.5
McCarthy, S.6
-
59
-
-
0003705137
-
-
Harvard University Press, Cambridge, MA
-
Moore M. Creating public value 1995, Harvard University Press, Cambridge, MA.
-
(1995)
Creating public value
-
-
Moore, M.1
-
60
-
-
84861093550
-
SCADA security in the light of cyber-warfare
-
Nicholson A., Webber S., Dyer S., Patel T., Janicke H. SCADA security in the light of cyber-warfare. Computers & Security 2012, June 01, 31(4):418-436.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 418-436
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
61
-
-
0038269850
-
The Balanced Scorecard: What is the score? A rhetorical analysis of the Balanced Scorecard
-
Nørreklit H. The Balanced Scorecard: What is the score? A rhetorical analysis of the Balanced Scorecard. Accounting, Organizations and Society 2003, August 01, 28(6):591-619.
-
(2003)
Accounting, Organizations and Society
, vol.28
, Issue.6
, pp. 591-619
-
-
Nørreklit, H.1
-
64
-
-
84873732807
-
How do people judge risks: Availability heuristic, affect heuristic, or both?
-
Pachur T., Hertwig R., Steinmann F. How do people judge risks: Availability heuristic, affect heuristic, or both?. Journal of Experimental Psychology: Applied 2012, September 01, 18(3):314-330.
-
(2012)
Journal of Experimental Psychology: Applied
, vol.18
, Issue.3
, pp. 314-330
-
-
Pachur, T.1
Hertwig, R.2
Steinmann, F.3
-
65
-
-
77953614890
-
Identifying the security risks associated with governmental use of cloud computing
-
Paquette S., Jaeger P.T., Wilson S.C. Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly 2010, July 01, 27(3):245-253.
-
(2010)
Government Information Quarterly
, vol.27
, Issue.3
, pp. 245-253
-
-
Paquette, S.1
Jaeger, P.T.2
Wilson, S.C.3
-
66
-
-
48849104169
-
Responding to crises and disasters: The role of risk attitudes and risk perceptions
-
Pennings J.M.E., Grossman D.B. Responding to crises and disasters: The role of risk attitudes and risk perceptions. Disasters 2008, September 01, 32(3):434-448.
-
(2008)
Disasters
, vol.32
, Issue.3
, pp. 434-448
-
-
Pennings, J.M.E.1
Grossman, D.B.2
-
67
-
-
0001579697
-
Risk aversion in the small and in the large
-
Pratt J.W. Risk aversion in the small and in the large. Econometrica 1964, January 01, 32:122-136.
-
(1964)
Econometrica
, vol.32
, pp. 122-136
-
-
Pratt, J.W.1
-
68
-
-
84928767419
-
Her Majesty the Queen in Right of Canada
-
Ottawa, (Retrieved from
-
Public Safety Canada National Strategy for Critical Infrastructure 2009, Her Majesty the Queen in Right of Canada, Ottawa, (Retrieved from http://www.publicsafety.gc.ca/prg/ns/ci/_fl/ntnl-eng.pdf).
-
(2009)
National Strategy for Critical Infrastructure
-
-
-
69
-
-
85007136794
-
Seven questions for Michael Chertoff
-
Quigley K. Seven questions for Michael Chertoff. The CIP Exchange 2009, Spring, 2009:1-2.
-
(2009)
The CIP Exchange
, vol.2009
, pp. 1-2
-
-
Quigley, K.1
-
70
-
-
84875593339
-
'Man plans, God laughs': Canada's national strategy for protecting critical infrastructure
-
Quigley K. 'Man plans, God laughs': Canada's national strategy for protecting critical infrastructure. Canadian Public Administration 2013, March 01, 56(1):142-164.
-
(2013)
Canadian Public Administration
, vol.56
, Issue.1
, pp. 142-164
-
-
Quigley, K.1
-
72
-
-
84928771559
-
Contextual issues that influence the risk regulation regime of the transportation sector
-
School of Public Administration, Dalhousie University, Halifax, NS
-
Quigley K., Mills B. Contextual issues that influence the risk regulation regime of the transportation sector. Kanishka Project Contribution Program - Understanding and Responding to Terrorist Threats to Critical Infrastructure 2014, February 1, School of Public Administration, Dalhousie University, Halifax, NS, (Retrieved from http://cip.management.dal.ca/?page_id=280).
-
(2014)
Kanishka Project Contribution Program - Understanding and Responding to Terrorist Threats to Critical Infrastructure
-
-
Quigley, K.1
Mills, B.2
-
73
-
-
10644238912
-
Homeland security and information sharing: Federal policy considerations
-
Relyea H.C. Homeland security and information sharing: Federal policy considerations. Government Information Quarterly 2004, January 01, 21(4):420-438.
-
(2004)
Government Information Quarterly
, vol.21
, Issue.4
, pp. 420-438
-
-
Relyea, H.C.1
-
74
-
-
77955549318
-
White paper on risk governance: Toward an integrative framework
-
Springer, Dordrecht, O. Renn, K. Walker (Eds.)
-
Renn O. White paper on risk governance: Toward an integrative framework. Global risk governance: Concept and practice using the IRGC framework 2008, Springer, Dordrecht. O. Renn, K. Walker (Eds.).
-
(2008)
Global risk governance: Concept and practice using the IRGC framework
-
-
Renn, O.1
-
76
-
-
57649209186
-
Not so different after all: A cross-discipline view of trust
-
Rousseau D.M., Sitkin S.B., Burt R.S., Camerer C. Not so different after all: A cross-discipline view of trust. The Academy of Management Review 1998, July 01, 23(3):393-404.
-
(1998)
The Academy of Management Review
, vol.23
, Issue.3
, pp. 393-404
-
-
Rousseau, D.M.1
Sitkin, S.B.2
Burt, R.S.3
Camerer, C.4
-
77
-
-
79957907533
-
From fashion to virus: An alternative theory of organizations' handling of management ideas
-
Røvik K. From fashion to virus: An alternative theory of organizations' handling of management ideas. Organization Studies 2011, January 01, 32(5):631-653.
-
(2011)
Organization Studies
, vol.32
, Issue.5
, pp. 631-653
-
-
Røvik, K.1
-
78
-
-
84893471988
-
Social Media's Democratic Paradox: Lessons from Canada
-
Roy J. Social Media's Democratic Paradox: Lessons from Canada. European Journal of ePractice 2012, 16:5-15.
-
(2012)
European Journal of ePractice
, vol.16
, pp. 5-15
-
-
Roy, J.1
-
79
-
-
85007040719
-
All your devices can be hacked
-
Rubin A. All your devices can be hacked. TED Talks 2011, October, (Retrieved on-line from: http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked.html).
-
(2011)
TED Talks
-
-
Rubin, A.1
-
81
-
-
84992999034
-
Transformational government: What is the shape of things to come?
-
Sharif A.M. Transformational government: What is the shape of things to come?. Transforming Government: People, Process and Policy 2008, 2(1):71-75.
-
(2008)
Transforming Government: People, Process and Policy
, vol.2
, Issue.1
, pp. 71-75
-
-
Sharif, A.M.1
-
83
-
-
0342322905
-
Factors in risk perception
-
Sjöberg L. Factors in risk perception. Risk Analysis 2000, January 01, 20(1):1-12.
-
(2000)
Risk Analysis
, vol.20
, Issue.1
, pp. 1-12
-
-
Sjöberg, L.1
-
84
-
-
0023324565
-
Perception of risk
-
Slovic P. Perception of risk. Science 1987, January 01, 236(4799):280-285.
-
(1987)
Science
, vol.236
, Issue.4799
, pp. 280-285
-
-
Slovic, P.1
-
86
-
-
0020148039
-
Why study risk perception?
-
Slovic P., Fischhoff B., Lichtenstein S. Why study risk perception?. Risk Analysis 1982, June 01, 2(2):83-93.
-
(1982)
Risk Analysis
, vol.2
, Issue.2
, pp. 83-93
-
-
Slovic, P.1
Fischhoff, B.2
Lichtenstein, S.3
-
87
-
-
23244461857
-
Affect, risk, and decision making
-
Slovic P., Peters E., Finucane M.L., Macgregor D.G. Affect, risk, and decision making. Health Psychology 2005, January 01, 24(4):35-40.
-
(2005)
Health Psychology
, vol.24
, Issue.4
, pp. 35-40
-
-
Slovic, P.1
Peters, E.2
Finucane, M.L.3
Macgregor, D.G.4
-
89
-
-
0014684374
-
Social benefit versus technological risk
-
Starr C. Social benefit versus technological risk. Science 1969, January 01, 165(3899):1232-1238.
-
(1969)
Science
, vol.165
, Issue.3899
, pp. 1232-1238
-
-
Starr, C.1
-
90
-
-
34247095107
-
Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?
-
Stohl M. Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?. Crime, Law and Social Change 2007, April 10, 46:223-238.
-
(2007)
Crime, Law and Social Change
, vol.46
, pp. 223-238
-
-
Stohl, M.1
-
91
-
-
33645096235
-
The information gulag: Rethinking openness in times of national danger
-
Strickland L.S. The information gulag: Rethinking openness in times of national danger. Government Information Quarterly 2005, January 01, 22(4):546-572.
-
(2005)
Government Information Quarterly
, vol.22
, Issue.4
, pp. 546-572
-
-
Strickland, L.S.1
-
92
-
-
0037786760
-
Terrorism and probability neglect
-
Sunstein C.R. Terrorism and probability neglect. Journal of Risk and Uncertainty 2003, January 01, 26(2-3):121-136.
-
(2003)
Journal of Risk and Uncertainty
, vol.26
, Issue.2-3
, pp. 121-136
-
-
Sunstein, C.R.1
-
94
-
-
33947492042
-
-
Harvard University Press, Cambridge, MA
-
Sunstein C. Worst case scenarios 2009, Harvard University Press, Cambridge, MA.
-
(2009)
Worst case scenarios
-
-
Sunstein, C.1
-
95
-
-
34247529903
-
Availability: A heuristic for judging frequency and probability
-
Tversky A., Kahneman D. Availability: A heuristic for judging frequency and probability. Cognitive Psychology 1973, 5(1):207-233.
-
(1973)
Cognitive Psychology
, vol.5
, Issue.1
, pp. 207-233
-
-
Tversky, A.1
Kahneman, D.2
-
96
-
-
84875612109
-
-
GPO, Washington, DC
-
United States Department of Homeland Security One Team, One Mission, Securing Our Homeland: U.S. Department of Homeland Security Strategic Plan, Fiscal Years 2009-2013 2008, GPO, Washington, DC.
-
(2008)
One Team, One Mission, Securing Our Homeland: U.S. Department of Homeland Security Strategic Plan, Fiscal Years 2009-2013
-
-
-
98
-
-
84885188079
-
From information security to cyber security
-
Von Solms R., Van Niekerk J. From information security to cyber security. Computers and Security 2013, May 13, 38:97-102.
-
(2013)
Computers and Security
, vol.38
, pp. 97-102
-
-
Von Solms, R.1
Van Niekerk, J.2
-
100
-
-
0000505675
-
On the failure to eliminate hypotheses in a conceptual task
-
Wason P.C. On the failure to eliminate hypotheses in a conceptual task. Quarterly Journal of Experimental Psychology 1960, July 01, 12(3):129-140.
-
(1960)
Quarterly Journal of Experimental Psychology
, vol.12
, Issue.3
, pp. 129-140
-
-
Wason, P.C.1
|