Studying users' computer security behavior: A health belief perspective

BY Ng, A Kankanhalli, YC Xu - Decision Support Systems, 2009 - Elsevier
The damage due to computer security incidents is motivating organizations to adopt
protective mechanisms. While technological controls are necessary, computer security also …

A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis

N Feng, HJ Wang, M Li - Information sciences, 2014 - Elsevier
With the increasing organizational dependence on information systems, information systems
security has become a very critical issue in enterprise risk management. In information …

[HTML][HTML] Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem

Z Rashid, U Noor, J Altmann - Future Generation Computer Systems, 2021 - Elsevier
Based on a comprehensive literature survey, the constructs of the cybersecurity information
sharing ecosystem have been defined in detail. Using this ecosystem, the interrelationships …

Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem

C Holton - Decision support systems, 2009 - Elsevier
Occupational fraud is a $652 billion problem to which disgruntled employees are a major
contributor. Much security research addresses reducing fraud opportunity and increasing …

Knowledge sharing and investment decisions in information security

D Liu, Y Ji, V Mookerjee - Decision Support Systems, 2011 - Elsevier
We study the relationship between decisions made by two similar firms pertaining to
knowledge sharing and investment in information security. The analysis shows that the …

Quantifying cyberinfrastructure resilience against multi‐event attacks

CW Zobel, L Khansa - Decision Sciences, 2012 - Wiley Online Library
This article introduces a general approach for characterizing cyberinfrastructure resilience in
the face of multiple malicious cyberattacks, such as when a sequence of denial‐of‐service …

Optimal information security investment in a Healthcare Information Exchange: An economic analysis

CD Huang, RS Behara, J Goo - Decision Support Systems, 2014 - Elsevier
The complexity of the problem, the increasing security breaches, and the regulatory and
financial consequences of breached patient data highlight the fact that security of electronic …

Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls

N Kumar, K Mohan, R Holowczak - Decision Support Systems, 2008 - Elsevier
In the new era of a ubiquitously networked world, security measures are only as good as
their weakest link. Home computers with access to the Internet are one of the weaker links …

[PDF][PDF] A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts

J Wang, Z Shan, M Gupta, HR Rao - MIS quarterly, 2019 - misq.umn.edu
Researchers have used the lens of social sciences to examine the characteristics of insider
threats to understand motivation and subsequently develop appropriate organizational …

Managing information security outsourcing in a dynamic cooperation environment

Y Wu, GK Tayi, G Feng, RYK Fung - Journal of the Association for …, 2021 - aisel.aisnet.org
To efficiently manage information security, firms typically outsource part of their security
functions to a managed security service provider (MSSP) under a variety of contractual …