security, threat, information, users, detection, coping, configuration, avoidance, response, firm, malicious, attack, intrusion, appraisal, countermeasures, benefit, costs, threats, ability, rate
Cavusoglu, Huseyin (1.00) |
Raghunathan, Srinivasan (1.00) |
Mookerjee, Vijay S. (0.58) |
Bensoussan, Alain (0.51) |
Mookerjee, Radha (0.51) |
Liang, Huigang (0.50) |
Xue, Yajiong (0.50) |
Mishra, Birendra (0.47) |
Cavusoglu, Hasan (0.44) |
Yue, Wei T. (0.35) |
Kumar, Ram L. (0.33) |
Park, SungJune (0.33) |
Subramaniam, Chandrasekar (0.33) |
August, Terrence (0.28) |
Mitra, Sabyasachi (0.28) |
Ransbotham, Sam (0.28) |
Çakanyildirim, Metin (0.26) |
Herath, Tejaswini C. (0.26) |
Chen, Pei-yu (0.25) |
Kataria, Gaurav (0.25) |
Krishnan, Ramayya (0.25) |
Chen, Yan (0.23) |
Zahedi, Fatemeh Mariam (0.23) |
Lowry, Paul Benjamin (0.22) |
Straub, Detmar W. (0.20) |
Welke, Richard J. (0.20) |
Galbreth, Michael R. (0.18) |
Shor, Mikhael (0.18) |
Tunca, Tunay I. (0.17) |
Adam, Nabil R. (0.16) |
Jones, Douglas H. (0.16) |
Herath, Hemantha S. B. (0.15) |
Garfinkel, Robert (0.14) |
Gopal, Ram D. (0.14) |
Thompson, Steven (0.14) |
Johnston, Allen C. (0.13) |
Warkentin, Merrill E. (0.13) |
Jarvenpaa, Sirkka L. (0.13) |
Majchrzak, Ann (0.13) |
Posey, Clay (0.13) |
Roberts, Tom L (0.13) |
Fussell, Susan R. (0.12) |
Kiesler, Sara (0.12) |
Ren, Yuqing (0.12) |
Kane, Gerald C. (0.11) |
Labianca, Giuseppe (0.11) |
Niculescu, Marius F. (0.11) |
Shin, Hyoduk (0.11) |
D'Arcy, John (0.11) |
Shoss, Mindy K. (0.11) |
Kim, Byung (0.11) |
Kim, Seung Hyun (0.11) |
Chen, Yeh-ning (0.11) |
Png, Ivan (0.11) |
DêArcy, John (0.10) |
Galletta, Dennis (0.10) |
Hovav, Anat (0.10) |
Articles (34)
Title
|
Topic Weight
|
Author
|
Year
|
Journal
|
When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination. |
0.511 |
Mookerjee, Vijay S.;
Mookerjee, Radha;
Bensoussan, Alain;
|
2011
|
ISR
|
AVOIDANCE OF INFORMATION TECHNOLOGY THREATS: A THEORETICAL PERSPECTIVE. |
0.500 |
Liang, Huigang;
Xue, Yajiong;
|
2009
|
MISQ
|
The Value of Intrusion Detection Systems in Information Technology Security Architecture. |
0.468 |
Cavusoglu, Huseyin;
Mishra, Birendra;
Raghunathan, Srinivasan;
|
2005
|
ISR
|
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems. |
0.436 |
Cavusoglu, Huseyin;
Raghunathan, Srinivasan;
Cavusoglu, Hasan;
|
2009
|
ISR
|
Understanding the Value of Countermeasure Portfolios in Information Systems Security. |
0.330 |
Kumar, Ram L.;
Park, SungJune;
Subramaniam, Chandrasekar;
|
2008
|
JMIS
|
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise. |
0.281 |
Ransbotham, Sam;
Mitra, Sabyasachi;
|
2009
|
ISR
|
Intrusion Prevention in Information Systems: Reactive and Proactive Responses. |
0.259 |
Yue, Wei T.;
Çakanyildirim, Metin;
|
2007
|
JMIS
|
CORRELATED FAILURES, DIVERSIFICATION, AND INFORMATION SECURITY RISK MANAGEMENT. |
0.252 |
Chen, Pei-yu;
Kataria, Gaurav;
Krishnan, Ramayya;
|
2011
|
MISQ
|
Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China |
0.232 |
Chen, Yan;
Zahedi, Fatemeh Mariam;
|
2016
|
MISQ
|
Coping With Systems Risk: Security Planning Models for Management Decision Making. |
0.200 |
Straub, Detmar W.;
Welke, Richard J.;
|
1998
|
MISQ
|
THE IMPACT OF MALICIOUS AGENTS ON THE ENTERPRISE SOFTWARE INDUSTRY. |
0.175 |
Galbreth, Michael R.;
Shor, Mikhael;
|
2010
|
MISQ
|
Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions. |
0.174 |
August, Terrence;
Tunca, Tunay I.;
|
2008
|
ISR
|
Releasing Individually Identifiable Microdata with Privacy Protection Against Stochastic Threat: An Application to Health Information. |
0.142 |
Garfinkel, Robert;
Gopal, Ram D.;
Thompson, Steven;
|
2007
|
ISR
|
FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY. |
0.129 |
Johnston, Allen C.;
Warkentin, Merrill E.;
|
2010
|
MISQ
|
Safe Contexts for Interorganizational Collaborations Among Homeland Security Professionals. |
0.129 |
Majchrzak, Ann;
Jarvenpaa, Sirkka L.;
|
2010
|
JMIS
|
The Impact of Organizational Commitment on Insiders Motivation to Protect Organizational Information Assets |
0.125 |
Posey, Clay;
Roberts, Tom L;
Lowry, Paul Benjamin;
|
2015
|
JMIS
|
Multiple Group Coordination in Complex and Dynamic Task Environments: Interruptions, Coping Mechanisms, and Technology Recommendations. |
0.120 |
Ren, Yuqing;
Kiesler, Sara;
Fussell, Susan R.;
|
2008
|
JMIS
|
IS Avoidance in Health-Care Groups: A Multilevel Investigation. |
0.111 |
Kane, Gerald C.;
Labianca, Giuseppe;
|
2011
|
ISR
|
Cloud Implications on Software Network Structure and Security Risks |
0.109 |
August, Terrence;
Niculescu, Marius F.;
Shin, Hyoduk;
|
2014
|
ISR
|
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective |
0.109 |
D'Arcy, John;
Herath, Tejaswini C.;
Shoss, Mindy K.;
|
2014
|
JMIS
|