Informational privacy, consent and the “control” of personal data

EA Whitley - Information security technical report, 2009 - Elsevier
This paper reviews how the notion of control has been conceptualised in relation to
informational privacy and, from a perspective of consent and the revocation of consent …

Strategic aspects of cyber risk information sharing

S Laube, R Böhme - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Cyber risk management largely reduces to a race for information between defenders of ICT
systems and attackers. Defenders can gain advantage in this race by sharing cyber risk …

Market mechanisms in online peer-to-peer lending

Z Wei, M Lin - Management Science, 2017 - pubsonline.informs.org
Online peer-to-peer lending (P2P lending) has emerged as an appealing new channel of
financing in recent years. A fundamental but largely unanswered question in this nascent …

[HTML][HTML] A comprehensive model of information security factors for decision-makers

R Diesch, M Pfaff, H Krcmar - Computers & Security, 2020 - Elsevier
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …

Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …

A large scale exploratory analysis of software vulnerability life cycles

M Shahzad, MZ Shafiq, AX Liu - 2012 34th International …, 2012 - ieeexplore.ieee.org
Software systems inherently contain vulnerabilities that have been exploited in the past
resulting in significant revenue losses. The study of vulnerability life cycles can help in the …

Correlated failures, diversification, and information security risk management

P Chen, G Kataria, R Krishnan - MIS quarterly, 2011 - JSTOR
The increasing dependence on information networks for business operations has focused
managerial attention on managing risks posed by failure of these networks. In this paper, we …

Studying the urgent updates of popular games on the steam platform

D Lin, CP Bezemer, AE Hassan - Empirical Software Engineering, 2017 - Springer
The steadily increasing popularity of computer games has led to the rise of a multi-billion
dollar industry. This increasing popularity is partly enabled by online digital distribution …

[PDF][PDF] Competing for Temporary Advantage in a Hypercompetitive Mobile App Market.

TL James, Z Qiao, W Shen, GA Wang, W Fan - MIS quarterly, 2023 - researchgate.net
Hypercompetitive mobile app stores are characterized by rapid innovation and intense
competition. App firms must vie for temporary competitive advantage through competitive …

Centralized IT decision making and cybersecurity breaches: Evidence from US higher education institutions

CW Liu, P Huang, HC Lucas Jr - Journal of Management …, 2020 - Taylor & Francis
Despite the consensus that information security should become an important consideration
in information technology (IT) governance rather than the sole responsibility of the IT …