N Feng, HJ Wang, M Li - Information sciences, 2014 - Elsevier
With the increasing organizational dependence on information systems, information systems security has become a very critical issue in enterprise risk management. In information …
Based on a comprehensive literature survey, the constructs of the cybersecurity information sharing ecosystem have been defined in detail. Using this ecosystem, the interrelationships …
C Holton - Decision support systems, 2009 - Elsevier
Occupational fraud is a $652 billion problem to which disgruntled employees are a major contributor. Much security research addresses reducing fraud opportunity and increasing …
D Liu, Y Ji, V Mookerjee - Decision Support Systems, 2011 - Elsevier
We study the relationship between decisions made by two similar firms pertaining to knowledge sharing and investment in information security. The analysis shows that the …
This article introduces a general approach for characterizing cyberinfrastructure resilience in the face of multiple malicious cyberattacks, such as when a sequence of denial‐of‐service …
The complexity of the problem, the increasing security breaches, and the regulatory and financial consequences of breached patient data highlight the fact that security of electronic …
N Kumar, K Mohan, R Holowczak - Decision Support Systems, 2008 - Elsevier
In the new era of a ubiquitously networked world, security measures are only as good as their weakest link. Home computers with access to the Internet are one of the weaker links …
Researchers have used the lens of social sciences to examine the characteristics of insider threats to understand motivation and subsequently develop appropriate organizational …
Y Wu, GK Tayi, G Feng, RYK Fung - Journal of the Association for …, 2021 - aisel.aisnet.org
To efficiently manage information security, firms typically outsource part of their security functions to a managed security service provider (MSSP) under a variety of contractual …