G7 ülkelerinin bilgi performanslarının analizi: COCOSO yöntemi ile bir uygulama

FF Altintaş - Journal of Life Economics, 2021 - ceeol.com
Öz Bu araştırmada, G7 ülkelerinin en son ve güncel olan 2020 yılı Küresel Bilgi Endeksi
(GKI) bileşenlerine ait değerler üzerinden ülkelerin bilgi performansları COCOSO yöntemi …

Secure global software development: a practitioners' perspective

M Humayun, M Niazi, M Assiri, M Haoues - Applied Sciences, 2023 - mdpi.com
Global software development (GSD) is rapidly becoming standard practice in the software
industry due to its many potential benefits. However, one of the biggest challenges in GSD …

Information security strategies for information-sharing firms considering a strategic hacker

Y Wu, M Xu, D Cheng, T Dai - Decision Analysis, 2022 - pubsonline.informs.org
Information resources have been shared to promote the business operations of firms.
However, the connection of business information sharing interfaces between firms has …

[HTML][HTML] Developing a data breach protection capability framework in retailing

MR Uddin, S Akter, WJT Lee - International Journal of Production …, 2024 - Elsevier
Protecting data in retail operations is vital in the age of data-driven digital transformation.
Businesses face a constant challenge from data breaches due to the unpredictable and …

Optimal Launch Timing of Bug Bounty Programs for Software Products under Different Licensing Models

N Feng, T Zhou, H Feng, M Li - Journal of the Association for …, 2024 - aisel.aisnet.org
An increasing number of software firms are utilizing bug bounty programs (BBPs) to detect
bugs and enhance their product quality by leveraging the contributions of external ethical …

Managing cloud security in the presence of strategic hacker and joint responsibility

Y Wu, Z Kang, T Dai, D Cheng - Journal of the Operational …, 2024 - Taylor & Francis
The widespread use of cloud computing has brought cloud security to the forefront. The
cloud provider and the firm assume varying degrees of joint responsibility for cloud security …

Information security decisions of firms considering security risk interdependency

Y Wu, L Wang, D Cheng, T Dai - Expert Systems with Applications, 2021 - Elsevier
Abstract Information security management becomes more challenging nowadays due to the
diverse security risk interdependency between firms. Prior researches rarely consider the …

A closer look at organizational cybersecurity research trending topics and limitations

AC Johnston - … Cybersecurity Journal: Practice, Process and People, 2022 - emerald.com
A closer look at organizational cybersecurity research trending topics and limitations |
Emerald Insight Books and journals Case studies Expert Briefings Open Access Publish …

Factors Influencing the Organizational Decision to Outsource IT Security: A Review and Research Agenda

A Arshad, A Ahmad, S Maynard - arXiv preprint arXiv:2208.12875, 2022 - arxiv.org
IT security outsourcing is the process of contracting a third-party security service provider to
perform, the full or partial IT security functions of an organization. Little is known about the …

Information security outsourcing strategies in the supply chain considering security externality

Y Wu, N Wang, T Dai, D Cheng - Journal of the Operational …, 2024 - Taylor & Francis
Abstract Information assets that complement each other capture the information security
characteristics of supply chain firms. Supply chain firms usually outsource security services …