-
1
-
-
84916918767
-
A survey of information security incident handling in the cloud
-
Ab Rahman, N. H., and Choo, K.-K. R. 2015a. "A Survey of Information Security Incident Handling in the Cloud", Computers & Security (49), pp. 45-69.
-
(2015)
Computers & Security
, Issue.49
, pp. 45-69
-
-
Ab Rahman, N.H.1
Choo, K.-K.R.2
-
2
-
-
85050883948
-
Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model
-
Ko and K.-K. R. Choo eds., Waltham, MA: Syngress, an Imprint of Elsevier In press
-
Ab Rahman, N. H., and Choo, K.-K. R. 2015b. "Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model", in Cloud Security EcosystemR. Ko and K.-K. R. Choo (eds.), Waltham, MA: Syngress, an Imprint of Elsevier [In press].
-
(2015)
Cloud Security EcosystemR
-
-
Ab Rahman, N.H.1
Choo, K.-K.R.2
-
3
-
-
84963565591
-
-
retrieved February 16, 2014
-
ACCA. 2014. "Cloud Readiness Index 2014 - Executive Summary", Asia Cloud Computing Association (available at http://asiacloudcomputing.org/research/cri2014; retrieved February 16, 2014).
-
(2014)
Cloud Readiness Index 2014 - Executive Summary
-
-
ACCA1
-
4
-
-
0017472917
-
Self-efficacy: Toward a unifying theory of behavioral change
-
Bandura, A. 1977. "Self-efficacy: Toward a Unifying Theory of Behavioral Change", Psychological Review (84:2), pp. 191-215.
-
(1977)
Psychological Review
, vol.84
, Issue.2
, pp. 191-215
-
-
Bandura, A.1
-
5
-
-
84866939464
-
Study of network security situation in honeynet
-
Shanghai
-
Bing, S., Hai-Feng, W., and Ling, C. 2012. "Study of Network Security Situation in Honeynet", in Proceedings of 2012 International Conference on Modelling, Identification and Control, Shanghai, pp. 519-523.
-
(2012)
Proceedings of 2012 International Conference on Modelling, Identification and Control
, pp. 519-523
-
-
Bing, S.1
Hai-Feng, W.2
Ling, C.3
-
6
-
-
84880563297
-
A quantitative model for information-security risk management
-
Bojanc, R. 2013. "A Quantitative Model for Information-Security Risk Management", Engineering Management Journal (25:2), pp. 25-37.
-
(2013)
Engineering Management Journal
, vol.25
, Issue.2
, pp. 25-37
-
-
Bojanc, R.1
-
8
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
Choo, K.-K. R. 2011. "The Cyber Threat Landscape: Challenges and Future Research Directions", Computer & Security (30:8), pp. 719-731.
-
(2011)
Computer & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
9
-
-
84961584112
-
Legal issues in the cloud
-
Choo, K.-K. R. 2014. "Legal issues in the cloud", IEEE Cloud Computing Magazine (1:1), pp. 94-96.
-
(2014)
IEEE Cloud Computing Magazine
, vol.1
, Issue.1
, pp. 94-96
-
-
Choo, K.-K.R.1
-
11
-
-
84864702532
-
Analyzing home PC security adoption behavior
-
Claar, C. L., and Johnson, J. 2012. "Analyzing Home PC Security Adoption Behavior", Journal of Computer Information Systems (52:4), pp. 20-29.
-
(2012)
Journal of Computer Information Systems
, vol.52
, Issue.4
, pp. 20-29
-
-
Claar, C.L.1
Johnson, J.2
-
12
-
-
84911809780
-
Security guidance for critical areas of focus in cloud computing
-
retrieved August 1, 2014
-
Cloud Security Alliance. 2011. "Security Guidance for Critical Areas of Focus in Cloud Computing", CSA (available at https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf; retrieved August 1, 2014).
-
(2011)
CSA
-
-
Cloud Security Alliance1
-
13
-
-
84963619798
-
The notorious nine cloud computing top threats in 2013
-
retrieved July 12, 2013
-
Cloud Security Alliance. 2013. "The Notorious Nine Cloud Computing Top Threats in 2013", CSA (available at http://www.cloudsecurityalliance.org/topthreats/; retrieved July 12, 2013).
-
(2013)
CSA
-
-
Cloud Security Alliance1
-
14
-
-
0029004440
-
Toward a theory of situation awareness in dynamic systems
-
Endsley, M. R. 1995. "Toward a Theory of Situation Awareness in Dynamic Systems", Human Factors (37:1), pp. 32-64.
-
(1995)
Human Factors
, vol.37
, Issue.1
, pp. 32-64
-
-
Endsley, M.R.1
-
19
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., and Rao, H. R. 2009. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations", European Journal of Information Systems (18:2), pp. 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
20
-
-
84875587046
-
Cloud computing and its implications for cybercrime investigations in Australia
-
Hooper, C., Martini, B., and Choo, K.-K. R. 2013. "Cloud computing and its implications for cybercrime investigations in Australia", Computer Law & Security Review (29:2), pp. 152-163.
-
(2013)
Computer Law & Security Review
, vol.29
, Issue.2
, pp. 152-163
-
-
Hooper, C.1
Martini, B.2
Choo, K.-K.R.3
-
21
-
-
84962209960
-
Exploratory factor analysis of user's compliance behaviour towards health information system's security
-
Humaidi, N., and Balakrishnan, V. 2013. "Exploratory Factor Analysis of User's Compliance Behaviour towards Health Information System's Security", Journal of Health & Medical Informatics (4:2), pp. 2-9.
-
(2013)
Journal of Health & Medical Informatics
, vol.4
, Issue.2
, pp. 2-9
-
-
Humaidi, N.1
Balakrishnan, V.2
-
22
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
-
Ifinedo, P. 2012. "Understanding Information Systems Security Policy Compliance: An integration of the Theory of Planned Behavior and The Protection Motivation Theory", Computers & Security (31:1), pp. 83-95.
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 83-95
-
-
Ifinedo, P.1
-
23
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, B. A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study", Management Information System (MIS) Quarterly (34:3), pp. 549-566.
-
(2010)
Management Information System (MIS) Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, B.A.C.1
Warkentin, M.2
-
25
-
-
3042746098
-
-
CMU/SEI, Pittsburgh
-
Killcrece, G., Kossakowski, K.-P., Ruefle, R., and Zajicek, M. 2003. "Organizational Models for Computer Security Incident Response Teams (CSIRTs)", CMU/SEI, Pittsburgh.
-
(2003)
Organizational Models for Computer Security Incident Response Teams (CSIRTs)
-
-
Killcrece, G.1
Kossakowski, K.-P.2
Ruefle, R.3
Zajicek, M.4
-
26
-
-
84881309609
-
Security risk assessment of cloud carrier
-
Delft, May
-
Lenkala, S. R., Shetty, S., and Xiong, K. 2013. "Security Risk Assessment of Cloud Carrier", in Proceedings of 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid 2013), Delft, May, pp. 442-449.
-
(2013)
Proceedings of 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid 2013)
, pp. 442-449
-
-
Lenkala, S.R.1
Shetty, S.2
Xiong, K.3
-
27
-
-
77955121478
-
Understanding security behaviors in personal computer usage: A threat avoidance perspective
-
Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective", Journal of the Association for Information System (11:7), pp. 394-413.
-
(2010)
Journal of the Association for Information System
, vol.11
, Issue.7
, pp. 394-413
-
-
Liang, H.1
Xue, Y.2
-
28
-
-
84905845494
-
Perceived IT security risks in cloud adoption: The role of perceptual incongruence between users and providers
-
Tel Aviv
-
Loske, A., Widjaja, T., Benlian, A., and Buxmann, P. 2014. "Perceived IT Security Risks in Cloud Adoption: The Role of Perceptual Incongruence between Users and Providers", in Proceedings of 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, pp. 1-16.
-
(2014)
Proceedings of 22nd European Conference on Information Systems (ECIS 2014)
, pp. 1-16
-
-
Loske, A.1
Widjaja, T.2
Benlian, A.3
Buxmann, P.4
-
29
-
-
0000242433
-
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
-
Maddux, J. E., and Rogers, R. W. 1983. "Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change", Journal of Experimental Social Psychology (19:5), pp. 469-479.
-
(1983)
Journal of Experimental Social Psychology
, vol.19
, Issue.5
, pp. 469-479
-
-
Maddux, J.E.1
Rogers, R.W.2
-
30
-
-
84940378505
-
Applying protection motivation theory to information security training for college student
-
Meso, P., Ding, Y., and Xu, S. 2013. "Applying Protection Motivation Theory to Information Security Training for College Student", Journal of Information Privacy and Security (9:1), pp. 47-67.
-
(2013)
Journal of Information Privacy and Security
, vol.9
, Issue.1
, pp. 47-67
-
-
Meso, P.1
Ding, Y.2
Xu, S.3
-
31
-
-
33746748784
-
On incident handling and response: A state-ofthe-art approach
-
Mitropoulos, S., Patsos, D., and Douligeris, C. 2006. "On Incident Handling and Response: A State-ofthe-Art Approach", Computers & Security (25:5), pp. 351-370.
-
(2006)
Computers & Security
, vol.25
, Issue.5
, pp. 351-370
-
-
Mitropoulos, S.1
Patsos, D.2
Douligeris, C.3
-
34
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
Ng, B.-Y., Kankanhalli, A., and Xu, Y. 2009. "Studying Users' Computer Security Behavior: A Health Belief Perspective", Decision Support Systems (46:4), pp. 815-825.
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.3
-
36
-
-
84902429611
-
-
Waltham, MA: Syngress, an Imprint of Elsevier
-
Quick, D., Martini, B., and Choo, K.-K. R. 2014. Cloud Storage Forensics, Waltham, MA: Syngress, an Imprint of Elsevier.
-
(2014)
Cloud Storage Forensics
-
-
Quick, D.1
Martini, B.2
Choo, K.-K.R.3
-
37
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change", The Journal of Psychology: Interdisciplinary and Applied (91:1), pp. 93-114.
-
(1975)
The Journal of Psychology: Interdisciplinary and Applied
, vol.91
, Issue.1
, pp. 93-114
-
-
Rogers, R.W.1
-
38
-
-
84864546078
-
Organisational learning and incident response?: Promoting effective learning through the incident response process
-
Perth
-
Shedden, P., Ahmad, A., and Ruighaver, A. B. 2010. "Organisational Learning and Incident Response?: Promoting Effective Learning Through The Incident Response Process", in Australian Information Security Management Conference, Perth, pp. 131-142.
-
(2010)
Australian Information Security Management Conference
, pp. 131-142
-
-
Shedden, P.1
Ahmad, A.2
Ruighaver, A.B.3
-
39
-
-
84891789669
-
Employees' adherence to information security policies: An exploratory field study
-
Siponen, M., Adam Mahmood, M., and Pahnila, S. 2014. "Employees' Adherence to Information Security Policies: An Exploratory Field Study", Information and Management (51:2), pp. 217-224.
-
(2014)
Information and Management
, vol.51
, Issue.2
, pp. 217-224
-
-
Siponen, M.1
Adam Mahmood, M.2
Pahnila, S.3
-
40
-
-
84867677727
-
Designing a cyber attack information system for national situational awareness
-
Springer Berlin Heidelberg
-
Skopik, F., Ma, Z., Smith, P., and Bleier, T. 2012. "Designing a Cyber Attack Information System for National Situational Awareness", in Future Security (Vol. 318), Springer Berlin Heidelberg, pp. 277-288.
-
(2012)
Future Security
, vol.318
, pp. 277-288
-
-
Skopik, F.1
Ma, Z.2
Smith, P.3
Bleier, T.4
-
41
-
-
4043066977
-
Situational Awareness Rating Technique (SART): The development of a tool for aircrew systems design
-
Taylor, R. M. 1990. "Situational Awareness Rating Technique (SART): The Development of a Tool for Aircrew Systems Design", Situational Awareness in Aerospace Operations (37:1), pp. 65-84.
-
(1990)
Situational Awareness in Aerospace Operations
, vol.37
, Issue.1
, pp. 65-84
-
-
Taylor, R.M.1
-
42
-
-
84861093724
-
Motivating IS security compliance: Insights from habit and protection motivation theory
-
Vance, A., Siponen, M., and Pahnila, S. 2012. "Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory", Information & Management (49:3), pp. 190-198.
-
(2012)
Information & Management
, vol.49
, Issue.3
, pp. 190-198
-
-
Vance, A.1
Siponen, M.2
Pahnila, S.3
-
43
-
-
82255162587
-
An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security
-
Wang, J., Xiao, N., and Rao, H. R. 2012. "An Exploration of Risk Information Search via a Search Engine: Queries and Clicks in Healthcare and Information Security", Decision Support Systems (52:2), pp. 395-405.
-
(2012)
Decision Support Systems
, vol.52
, Issue.2
, pp. 395-405
-
-
Wang, J.1
Xiao, N.2
Rao, H.R.3
-
44
-
-
0343472271
-
-
2nd ed., Pittsburgh: Carnegie Mellon/SEI
-
West-brown, M. J., Stikvoort, D., Kossakowski, K.-P., Killcrere, G., Ruefle, R., and Zajicek, M. 2003. Handbook for Computer Security Incident Response Teams (CSIRTs) (2nd ed.), Pittsburgh: Carnegie Mellon/SEI.
-
(2003)
Handbook for Computer Security Incident Response Teams (CSIRTs)
-
-
West-Brown, M.J.1
Stikvoort, D.2
Kossakowski, K.-P.3
Killcrere, G.4
Ruefle, R.5
Zajicek, M.6
-
45
-
-
69849109516
-
Using honeynets for internet situational awareness
-
Maryland
-
Yegneswaran, V., Barford, P., and Paxson, V. 2005. "Using Honeynets for Internet Situational Awareness", in Proceeding of ACM Hotnet IV, Maryland, pp. 1-6.
-
(2005)
Proceeding of ACM Hotnet IV
, pp. 1-6
-
-
Yegneswaran, V.1
Barford, P.2
Paxson, V.3
-
46
-
-
84963524780
-
Implemention of cyber security situation awareness
-
W. Han, Z. Huang, C. Hu, H. Zhang, and L. Guo eds., Springer International Publishing
-
Zeng, J., Feng, X., Wang, D., and Fang, L. 2014. "Implemention of Cyber Security Situation Awareness", in Web Technologies and Applications W. Han, Z. Huang, C. Hu, H. Zhang, and L. Guo (eds.) (Vol. 2), Springer International Publishing, pp. 225-234.
-
(2014)
Web Technologies and Applications
, vol.2
, pp. 225-234
-
-
Zeng, J.1
Feng, X.2
Wang, D.3
Fang, L.4
|