security, threat, information, users, detection, coping, configuration, avoidance, response, firm, malicious, attack, intrusion, appraisal, countermeasures, benefit, costs, threats, ability, rate

Articles (34)

Title Topic Weight Author Year Journal
When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination. 0.511 Mookerjee, Vijay S.; Mookerjee, Radha; Bensoussan, Alain; 2011 ISR
AVOIDANCE OF INFORMATION TECHNOLOGY THREATS: A THEORETICAL PERSPECTIVE. 0.500 Liang, Huigang; Xue, Yajiong; 2009 MISQ
The Value of Intrusion Detection Systems in Information Technology Security Architecture. 0.468 Cavusoglu, Huseyin; Mishra, Birendra; Raghunathan, Srinivasan; 2005 ISR
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems. 0.436 Cavusoglu, Huseyin; Raghunathan, Srinivasan; Cavusoglu, Hasan; 2009 ISR
Understanding the Value of Countermeasure Portfolios in Information Systems Security. 0.330 Kumar, Ram L.; Park, SungJune; Subramaniam, Chandrasekar; 2008 JMIS
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise. 0.281 Ransbotham, Sam; Mitra, Sabyasachi; 2009 ISR
Intrusion Prevention in Information Systems: Reactive and Proactive Responses. 0.259 Yue, Wei T.; Çakanyildirim, Metin; 2007 JMIS
CORRELATED FAILURES, DIVERSIFICATION, AND INFORMATION SECURITY RISK MANAGEMENT. 0.252 Chen, Pei-yu; Kataria, Gaurav; Krishnan, Ramayya; 2011 MISQ
Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China 0.232 Chen, Yan; Zahedi, Fatemeh Mariam; 2016 MISQ
Coping With Systems Risk: Security Planning Models for Management Decision Making. 0.200 Straub, Detmar W.; Welke, Richard J.; 1998 MISQ
THE IMPACT OF MALICIOUS AGENTS ON THE ENTERPRISE SOFTWARE INDUSTRY. 0.175 Galbreth, Michael R.; Shor, Mikhael; 2010 MISQ
Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions. 0.174 August, Terrence; Tunca, Tunay I.; 2008 ISR
Releasing Individually Identifiable Microdata with Privacy Protection Against Stochastic Threat: An Application to Health Information. 0.142 Garfinkel, Robert; Gopal, Ram D.; Thompson, Steven; 2007 ISR
FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY. 0.129 Johnston, Allen C.; Warkentin, Merrill E.; 2010 MISQ
Safe Contexts for Interorganizational Collaborations Among Homeland Security Professionals. 0.129 Majchrzak, Ann; Jarvenpaa, Sirkka L.; 2010 JMIS
The Impact of Organizational Commitment on Insiders Motivation to Protect Organizational Information Assets 0.125 Posey, Clay; Roberts, Tom L; Lowry, Paul Benjamin; 2015 JMIS
Multiple Group Coordination in Complex and Dynamic Task Environments: Interruptions, Coping Mechanisms, and Technology Recommendations. 0.120 Ren, Yuqing; Kiesler, Sara; Fussell, Susan R.; 2008 JMIS
IS Avoidance in Health-Care Groups: A Multilevel Investigation. 0.111 Kane, Gerald C.; Labianca, Giuseppe; 2011 ISR
Cloud Implications on Software Network Structure and Security Risks 0.109 August, Terrence; Niculescu, Marius F.; Shin, Hyoduk; 2014 ISR
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective 0.109 D'Arcy, John; Herath, Tejaswini C.; Shoss, Mindy K.; 2014 JMIS