Franz T. Lohrke & Cynthia Frownfelter-Lohrke. (2023) Cybersecurity research from a management perspective: A systematic literature review and future research agenda. Journal of General Management.
Crossref
Kookyoung Han, Jin Hyuk Choi, Yunsik Choi, Gene Moo Lee & Andrew B. Whinston. (2023) Security defense against long-term and stealthy cyberattacks. Decision Support Systems 166, pages 113912.
Crossref
Diane J. Janvrin & Tawei Wang. (2022) Linking Cybersecurity and Accounting: An Event, Impact, Response Framework. Accounting Horizons 36:4, pages 67-112.
Crossref
Jie Jian, Siqi Chen, Xin Luo, Tien Lee & Xiaoming Yu. (2022) Organized Cyber-Racketeering: Exploring the Role of Internet Technology in Organized Cybercrime Syndicates Using a Grounded Theory Approach. IEEE Transactions on Engineering Management 69:6, pages 3726-3738.
Crossref
Kay-Yut Chen, Jingguo Wang & Yan Lang. (2022) Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals. Management Science 68:7, pages 5269-5286.
Crossref
Xiaotong Li. (2021) An evolutionary game‐theoretic analysis of enterprise information security investment based on information sharing platform. Managerial and Decision Economics 43:3, pages 595-606.
Crossref
Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia & Manoj Dora. (2020) Antecedents for enhanced level of cyber-security in organisations. Journal of Enterprise Information Management 34:6, pages 1597-1629.
Crossref
Nan Feng, Shiyue Zhang, Minqiang Li & Dahui Li. (2021) Contracting managed security service: Double moral hazard and risk interdependency. Electronic Commerce Research and Applications 50, pages 101097.
Crossref
Yong Wu, Junlin Duan, Tao Dai & Dong Cheng. (2020) Managing Security Outsourcing in the Presence of Strategic Hackers. Decision Analysis 17:3, pages 235-259.
Crossref
Gabriel Kuper, Fabio Massacci, Woohyun Shim & Julian Williams. (2020) Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports. Risk Analysis 40:5, pages 1001-1019.
Crossref
Zhiheng Xu & Jun Zhuang. (2019)
A Study on a Sequential One‐Defender‐
N
‐Attacker Game
. Risk Analysis 39:6, pages 1414-1432.
Crossref
Gerald Onwujekwe, Manoj Thomas & Kweku-Muata Osei-Bryson. (2019) Using Robust Data Governance to Mitigate the Impact of Cybercrime. Using Robust Data Governance to Mitigate the Impact of Cybercrime.
Lars Öbrand, Nils‐Petter Augustsson, Lars Mathiassen & Jonny Holmström. (2018)
The interstitiality of
IT
risk: An inquiry into information systems development practices
. Information Systems Journal 29:1, pages 97-118.
Crossref
Lars Öbrand, Jonny Holmström & Mike Newman. (2018) Navigating Rumsfeld's quadrants: A performative perspective on IT risk management. Technology in Society 53, pages 1-8.
Crossref
Kjell Hausken. (2018) Proactivity and Retroactivity of Firms and Information Sharing of Hackers. International Game Theory Review 20:01, pages 1750027.
Crossref
Yong Wu, Richard Y.K. Fung, Gengzhong Feng & Nengmin Wang. (2017) Decisions making in information security outsourcing: Impact of complementary and substitutable firms. Computers & Industrial Engineering 110, pages 1-12.
Crossref
Kjell Hausken. (2017) Information Sharing Among Cyber Hackers in Successive Attacks. International Game Theory Review 19:02, pages 1750010.
Crossref
Kjell Hausken. (2017) Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Games 8:2, pages 23.
Crossref
Xing Gao & Weijun Zhong. (2015) Economic incentives in security information sharing: the effects of market structures. Information Technology and Management 17:4, pages 361-377.
Crossref
Fabio Massacci, Raminder Ruprai, Matthew Collinson & Julian Williams. (2016) Economic Impacts of Rules- versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers. IEEE Security & Privacy 14:3, pages 52-60.
Crossref
. 2016. Solving Modern Crime in Financial Markets. Solving Modern Crime in Financial Markets
481
490
.
Marius-Christian Frunza. 2016. Solving Modern Crime in Financial Markets. Solving Modern Crime in Financial Markets
169
181
.
Xing Gao & Weijun Zhong. (2015) Information security investment for competitive firms with hacker behavior and security requirements. Annals of Operations Research 235:1, pages 277-300.
Crossref
Xing Gao, Weijun Zhong & Shue Mei. (2013) Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers 17:2, pages 423-438.
Crossref
Xing Gao, Weijun Zhong & Shue Mei. (2013) Information Security Investment When Hackers Disseminate Knowledge. Decision Analysis 10:4, pages 352-368.
Crossref
Tobias Ackermann, Thomas Widjaja & Peter Buxmann. (2013) Towards the Optimal Security Level: Quantification of Risks in Service-Based Information Systems. Towards the Optimal Security Level: Quantification of Risks in Service-Based Information Systems.
Juhee Kwon & M. Eric Johnson. (2013) Healthcare Security Strategies for Regulatory Compliance and Data Security. Healthcare Security Strategies for Regulatory Compliance and Data Security.
Si Li, Ryan Rickert & Amy Sliva. 2013. Social Computing, Behavioral-Cultural Modeling and Prediction. Social Computing, Behavioral-Cultural Modeling and Prediction
523
532
.
Jan Devos, Hendrik Van Landeghem & Dirk Deschoolmeester. 2012. Information Systems Theory. Information Systems Theory
213
229
.
Qiang Xiong, Wei-jun Zhong & Shu-e Mei. (2011) A signal game model on security defense of information system. A signal game model on security defense of information system.
Mamoru Yoshida & Kiyoshi Kobayashi. (2010) Disclosure strategies for critical infrastructure against terror attacks. Disclosure strategies for critical infrastructure against terror attacks.
HKUST Business School Submitter. (2020) Sleeping with the Enemy: An Economic and Security Analysis of Bug Bounty Programs. SSRN Electronic Journal.
Crossref
Gabriel M. Kuper, Fabio Massacci, Woohyun Shim & Julian M. Williams. (2018) Who Should Pay for Interdependent Risk? Policy Implications for Cyber-Physical Security Interdependence in Aviation. SSRN Electronic Journal.
Crossref
Xia Zhao, Ling Xue & Andrew B. Whinston. (2010) Managing Interdependent Information Security Risks: A Study of Cyberinsurance, Managed Security Service and Risk Pooling. SSRN Electronic Journal.
Crossref