1,730
Views
29
CrossRef citations to date
0
Altmetric
Articles

Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness

Pages 2-12 | Published online: 10 Jan 2009

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

Tim Chenoweth, Tom Gattiker & Karen Corral. (2019) Adaptive and Maladaptive Coping with an It Threat. Information Systems Management 36:1, pages 24-39.
Read now
Paul Benjamin Lowry, Tamara Dinev & Robert Willison. (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26:6, pages 546-563.
Read now
Bartlomiej Hanus & Yu “Andy” Wu. (2016) Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management 33:1, pages 2-16.
Read now
Xin Luo, Anil Gurung & J. P. Shim. (2010) Understanding the Determinants of User Acceptance of Enterprise Instant Messaging: An Empirical Study. Journal of Organizational Computing and Electronic Commerce 20:2, pages 155-181.
Read now

Articles from other publishers (23)

Jie Jian, Siqi Chen, Xin Luo, Tien Lee & Xiaoming Yu. (2022) Organized Cyber-Racketeering: Exploring the Role of Internet Technology in Organized Cybercrime Syndicates Using a Grounded Theory Approach. IEEE Transactions on Engineering Management 69:6, pages 3726-3738.
Crossref
Berlilana, Tim Noparumpa, Athapol Ruangkanjanases, Taqwa Hariguna & Sarmini. (2021) Organization Benefit as an Outcome of Organizational Security Adoption: The Role of Cyber Security Readiness and Technology Readiness. Sustainability 13:24, pages 13761.
Crossref
Shaikha Hasan, Mazen Ali, Sherah Kurnia & Ramayah Thurasamy. (2021) Evaluating the cyber security readiness of organizations and its influence on performance. Journal of Information Security and Applications 58, pages 102726.
Crossref
Jakia Sultana & Ahmed Jimoh. 2021. Handbook of Research on Applied AI for International Business and Marketing Applications. Handbook of Research on Applied AI for International Business and Marketing Applications 191 206 .
Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed, Tan Tse Guan & Khairul Azhar Mat Daud. Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach. Social engineering (SoE) attacks towards network security in higher learning institute: The partial least squares path modeling approach.
Mark Starik & Patricia Kanashiro. 2020. Sustainability. Sustainability 17 42 .
Maryam Zahid, Irum Inayat, Maya Daneva & Zahid Mehmood. (2019) A security risk mitigation framework for cyber physical systems. Journal of Software: Evolution and Process 32:2.
Crossref
Yahel Giat & Michael Dreyfuss. 2020. Optimizing Data and New Methods for Efficient Knowledge Discovery and Information Resources Management. Optimizing Data and New Methods for Efficient Knowledge Discovery and Information Resources Management 74 97 .
Saini Das, Arunabha Mukhopadhyay, Debashis Saha & Samir Sadhukhan. (2017) A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs. Information Systems Frontiers 21:5, pages 959-977.
Crossref
SeEun Choi, Jorge Tiago Martins & Igor Bernik. (2018) Information security: Listening to the perspective of organisational insiders. Journal of Information Science 44:6, pages 752-767.
Crossref
Ron Torten, Carmen Reaiche & Stephen Boyle. (2018) The impact of security Awareness on information technology professionals’ behavior. Computers & Security 79, pages 68-79.
Crossref
Michael Dreyfuss & Yahel Giat. (2018) A Risk Management Model for an Academic Institution's Information System. Information Resources Management Journal 31:1, pages 83-96.
Crossref
Nijaz Bajgoric. 2018. Always-On Enterprise Information Systems for Modern Organizations. Always-On Enterprise Information Systems for Modern Organizations 1 22 .
Sunil K. Muttoo, Rajan Gupta & Saibal K. Pal. 2016. Emerging Research in Computing, Information, Communication and Applications. Emerging Research in Computing, Information, Communication and Applications 569 587 .
Muhammad Zubair & Nadeem Ahmad Mufti. (2015) Identification and Assessment of Supply Chain Risks Associated with Dairy Products Sector. Journal of Basic & Applied Sciences 11, pages 167-175.
Crossref
Nijaz Bajgoric. 2014. Computing Handbook, Third Edition. Computing Handbook, Third Edition 51-1 51-23 .
Hannes Holm. (2014) Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?. Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?.
She-I Chang, Jung-Jei Su & Hsing-Jung Li. (2013) Risk Assessment Mechanism for Personal Information Operations -- Case Study by Hospital. Risk Assessment Mechanism for Personal Information Operations -- Case Study by Hospital.
Peggy E. Chaudhry, Sohail S. Chaudhry, Kevin D. Clark & Darryl S. Jones. 2013. Enterprise Information Systems of the Future. Enterprise Information Systems of the Future 206 214 .
Ahmad Bakhtiyari Shahri & Zuraini Ismail. (2012) A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS. Journal of Information Security 03:02, pages 169-176.
Crossref
Peggy E. Chaudhry, Sohail S. Chaudhry, Ronald Reese & Darryl S. Jones. 2012. Re-conceptualizing Enterprise Information Systems. Re-conceptualizing Enterprise Information Systems 118 128 .
Princely Ifinedo. 2011. Security and Privacy Assurance in Advancing Technologies. Security and Privacy Assurance in Advancing Technologies 134 153 .
Christopher G. Reddick. (2009) Management support and information security: an empirical study of Texas state agencies in the USA. Electronic Government, an International Journal 6:4, pages 361.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.