-
1
-
-
33846183559
-
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
-
Arora, A., Nandkumar, A., Telang, R., Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers 8:5 (2006), 350–362.
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.5
, pp. 350-362
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
2
-
-
79951993663
-
Common cause: The case for working with our cultural values
-
WWF, Oxfam, Friends of the Earth, CPRE, Climate Outreach Information Network
-
Crompton, T., Common cause: The case for working with our cultural values. 2010, WWF, Oxfam, Friends of the Earth, CPRE, Climate Outreach Information Network.
-
(2010)
-
-
Crompton, T.1
-
3
-
-
84917104083
-
Framing. Over de macht van taal in de politiek
-
Atlas Contact Amsterdam
-
De Bruijn, H., Framing. Over de macht van taal in de politiek. 2014, Atlas Contact, Amsterdam.
-
(2014)
-
-
De Bruijn, H.1
-
4
-
-
85015607778
-
The art of framing: How politicians convince us that they are right
-
Etopia BV
-
De Bruijn, H., The art of framing: How politicians convince us that they are right. 2017, Etopia BV.
-
(2017)
-
-
De Bruijn, H.1
-
5
-
-
85005978066
-
How Positive Framing May Fuel Opposition to Low-Carbon Technologies: The Boomerang Model
-
De Vries, G., How Positive Framing May Fuel Opposition to Low-Carbon Technologies: The Boomerang Model. Journal of Language and Social Psychology 36:1 (2017), 28–44.
-
(2017)
Journal of Language and Social Psychology
, vol.36
, Issue.1
, pp. 28-44
-
-
De Vries, G.1
-
6
-
-
84893436125
-
Spare the details, share the relevance: The dilution effect in communications about carbon dioxide capture and storage
-
De Vries, G., Terwel, B.W., Ellemers, N., Spare the details, share the relevance: The dilution effect in communications about carbon dioxide capture and storage. Journal of Environmental Psychology 38 (2014), 116–123, 10.1016/j.jenvp.2014.01.003.
-
(2014)
Journal of Environmental Psychology
, vol.38
, pp. 116-123
-
-
De Vries, G.1
Terwel, B.W.2
Ellemers, N.3
-
7
-
-
84988231230
-
U.S. homeland security and risk assessment
-
Doty, P., U.S. homeland security and risk assessment. Government Information Quarterly 32:3 (2015), 342–352, 10.1016/j.giq.2015.04.008.
-
(2015)
Government Information Quarterly
, vol.32
, Issue.3
, pp. 342-352
-
-
Doty, P.1
-
8
-
-
84901690626
-
Cyber security challenges in smart cities: Safety, security and privacy
-
Elmaghraby, A.S., Losavio, M.M., Cyber security challenges in smart cities: Safety, security and privacy. Journal of Advanced Research 5:4 (2014), 491–497.
-
(2014)
Journal of Advanced Research
, vol.5
, Issue.4
, pp. 491-497
-
-
Elmaghraby, A.S.1
Losavio, M.M.2
-
9
-
-
51249102146
-
National Security Letters, the USA PATRIOT Act, and the Constitution: The tensions between national security and civil rights
-
Gorham-Oscilowski, U., Jaeger, P.T., National Security Letters, the USA PATRIOT Act, and the Constitution: The tensions between national security and civil rights. Government Information Quarterly 25:4 (2008), 625–644, 10.1016/j.giq.2008.02.001.
-
(2008)
Government Information Quarterly
, vol.25
, Issue.4
, pp. 625-644
-
-
Gorham-Oscilowski, U.1
Jaeger, P.T.2
-
10
-
-
84886928358
-
Distributed capability-based access control for the internet of things
-
Hernández-Ramos, J.L., Jara, A.J., Marın, L., Skarmeta, A.F., Distributed capability-based access control for the internet of things. Journal of Internet Services and Information Security (JISIS) 3:3/4 (2013), 1–16.
-
(2013)
Journal of Internet Services and Information Security (JISIS)
, vol.3
, Issue.3/4
, pp. 1-16
-
-
Hernández-Ramos, J.L.1
Jara, A.J.2
Marın, L.3
Skarmeta, A.F.4
-
11
-
-
84938287800
-
Digital government evolution: From transformation to contextualization
-
Janowski, T., Digital government evolution: From transformation to contextualization. Government Information Quarterly 32:3 (2015), 221–236, 10.1016/j.giq.2015.07.001.
-
(2015)
Government Information Quarterly
, vol.32
, Issue.3
, pp. 221-236
-
-
Janowski, T.1
-
12
-
-
0000125532
-
Prospect Theory: An analysis of decisions under risk
-
Kahneman, D., Tversky, A., Prospect Theory: An analysis of decisions under risk. Econometrica 4 (1979), 362–377.
-
(1979)
Econometrica
, vol.4
, pp. 362-377
-
-
Kahneman, D.1
Tversky, A.2
-
13
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
Langner, R., Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy 9:3 (2011), 49–51.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
14
-
-
84958213653
-
Beyond the Castle Model of cyber-risk and cyber-security
-
Leuprecht, C., Skillicorn, D.B., Tait, V.E., Beyond the Castle Model of cyber-risk and cyber-security. Government Information Quarterly 33:2 (2016), 250–257, 10.1016/j.giq.2016.01.012.
-
(2016)
Government Information Quarterly
, vol.33
, Issue.2
, pp. 250-257
-
-
Leuprecht, C.1
Skillicorn, D.B.2
Tait, V.E.3
-
15
-
-
0000013312
-
All frames are not created equal: A typology and critical analysis of framing effects
-
Levin, I.P., Schneider, S.L., Gaeth, G.J., All frames are not created equal: A typology and critical analysis of framing effects. Organizational Behavior and Human Decision Processes 76:2 (1998), 149–188.
-
(1998)
Organizational Behavior and Human Decision Processes
, vol.76
, Issue.2
, pp. 149-188
-
-
Levin, I.P.1
Schneider, S.L.2
Gaeth, G.J.3
-
16
-
-
85015692356
-
The Perfect Weapon: How Russian Cyberpower invaded the U.S
-
The New York Times
-
Lipton, E., Sanger, D.E., Shane, S., The Perfect Weapon: How Russian Cyberpower invaded the U.S. 2016, 13 December, The New York Times.
-
(2016)
-
-
Lipton, E.1
Sanger, D.E.2
Shane, S.3
-
17
-
-
0000609656
-
The Influence of Message Framing and Issue Involvement
-
Maheswaran, D., Meyers-Levy, J., The Influence of Message Framing and Issue Involvement. Journal of Marketing Research 27:3 (1990), 361–367, 10.2307/3172593.
-
(1990)
Journal of Marketing Research
, vol.27
, Issue.3
, pp. 361-367
-
-
Maheswaran, D.1
Meyers-Levy, J.2
-
18
-
-
60049096140
-
‘Fear Won't Do It’. Promoting Positive Engagement With Climate Change Through Visual and Iconic Representations’
-
O'Neill, S., Nicholson-Cole, S., ‘Fear Won't Do It’. Promoting Positive Engagement With Climate Change Through Visual and Iconic Representations’. Science Communication 30:3 (2009), 355–379.
-
(2009)
Science Communication
, vol.30
, Issue.3
, pp. 355-379
-
-
O'Neill, S.1
Nicholson-Cole, S.2
-
19
-
-
84928771409
-
‘Cyber Gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection
-
Quigley, K., Burns, C., Stallard, K., ‘Cyber Gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection. Government Information Quarterly 32 (2015), 108–117, 10.1016/j.giq.2015.02.001.
-
(2015)
Government Information Quarterly
, vol.32
, pp. 108-117
-
-
Quigley, K.1
Burns, C.2
Stallard, K.3
-
20
-
-
84928769751
-
Public opinion on National Security Agency surveillance programs: A multi-method approach
-
Reddick, C.G., Chatfield, A.T., Jaramillo, P.A., Public opinion on National Security Agency surveillance programs: A multi-method approach. Government Information Quarterly 32:2 (2015), 129–141, 10.1016/j.giq.2015.01.003.
-
(2015)
Government Information Quarterly
, vol.32
, Issue.2
, pp. 129-141
-
-
Reddick, C.G.1
Chatfield, A.T.2
Jaramillo, P.A.3
-
21
-
-
0030641104
-
Shaping perceptions to motivate healthy behavior: The role of message framing
-
Rothman, A.J., Salovey, P., Shaping perceptions to motivate healthy behavior: The role of message framing. Psychological Bulletin 121:1 (1997), 3–19, 10.1037/0033-2909.121.1.3.
-
(1997)
Psychological Bulletin
, vol.121
, Issue.1
, pp. 3-19
-
-
Rothman, A.J.1
Salovey, P.2
-
23
-
-
67349092535
-
Vulnerability Assessment of Cybersecurity for SCADA Systems
-
Ten, C.W., Liu, C.C., Manimaran, G., Vulnerability Assessment of Cybersecurity for SCADA Systems. IEEE Transactions on Power Systems 23:4 (2008), 1836–1846, 10.1109/TPWRS.2008.2002298.
-
(2008)
IEEE Transactions on Power Systems
, vol.23
, Issue.4
, pp. 1836-1846
-
-
Ten, C.W.1
Liu, C.C.2
Manimaran, G.3
-
24
-
-
84907297711
-
Mundane Governance: Ontology and Accountability
-
Oxford University Press
-
Woolgar, S., Neyland, D., Mundane Governance: Ontology and Accountability. 2013, Oxford University Press.
-
(2013)
-
-
Woolgar, S.1
Neyland, D.2
-
25
-
-
70549093057
-
Opportunities and threats: A security assessment of state e-government websites
-
Zhao, J.J., Zhao, S.Y., Zhao, S.Y., Opportunities and threats: A security assessment of state e-government websites. Government Information Quarterly 27:1 (2010), 49–56, 10.1016/j.giq.2009.07.004.
-
(2010)
Government Information Quarterly
, vol.27
, Issue.1
, pp. 49-56
-
-
Zhao, J.J.1
Zhao, S.Y.2
Zhao, S.Y.3
|