3,175
Views
8
CrossRef citations to date
0
Altmetric

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (8)

Noelle Warkentin, Richard Frank, Yuxuan (Cicilia) Zhang & Naomi Zakimi. (2022) Potential cyber-threats against Canada’s critical infrastructure: an investigation of online discussion forums. Criminal Justice Studies 35:3, pages 322-345.
Read now
DeJarvis Oliver & Adriane. B. Randolph. (2022) Hacker Definitions in Information Systems Research. Journal of Computer Information Systems 62:2, pages 397-409.
Read now
Kalpit Sharma & Arunabha Mukhopadhyay. (2022) Sarima-Based Cyber-Risk Assessment and Mitigation Model for A Smart City’s Traffic Management Systems (Scram). Journal of Organizational Computing and Electronic Commerce 32:1, pages 1-20.
Read now
Kalpit Sharma & Arunabha Mukhopadhyay. (2021) Kernel naïve Bayes classifier-based cyber-risk assessment and mitigation framework for online gaming platforms. Journal of Organizational Computing and Electronic Commerce 31:4, pages 343-363.
Read now
Mohammadreza Ebrahimi, Jay F. Nunamaker$suffix/text()$suffix/text() & Hsinchun Chen. (2020) Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach. Journal of Management Information Systems 37:3, pages 694-722.
Read now
Hongyi Zhu, Sagar Samtani, Hsinchun Chen & Jay F. Nunamaker$suffix/text()$suffix/text(). (2020) Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach. Journal of Management Information Systems 37:2, pages 457-483.
Read now
Ravi Sen, Ajay Verma & Gregory R. Heim. (2020) Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets. Journal of Management Information Systems 37:1, pages 191-216.
Read now
Hao Hua Sun Yin, Klaus Langenheldt, Mikkel Harlev, Raghava Rao Mukkamala & Ravi Vatrapu. (2019) Regulating Cryptocurrencies: A Supervised Machine Learning Approach to De-Anonymizing the Bitcoin Blockchain. Journal of Management Information Systems 36:1, pages 37-73.
Read now

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.