21
Views
1
CrossRef citations to date
0
Altmetric
Articles

Assessing & Quantifying the Loss of Network Intrusion

, &
Pages 36-43 | Published online: 05 Jan 2016

References

  • American Bar Association. Report on Computer Crime. Pamphlet prepared by the Task force on Computer Crime, American Bar Association, Section on Criminal Justice, 1800 M Street, Washington, DC 20036, 1984.
  • Anthes, G. “Hack Attack: Cyberthieves Siphon Millions from U.S. Firms,” Computerworld, 30:16, 1986, p. 81.
  • Baskerville, R. “Information Systems Security Design Methods: Implications for Information Systems Development,” ACM Computing Surveys, 25:4, 1993, pp. 749–764.
  • CERT Coordination Center. CERT/CC Overview: Trends, on-line. Available: http://www.cert.org/present/cert-overview-trends/.
  • Cooper, D.R. and P.S. Schindler. Business Research Methods, 6th ed. Boston: Irwin/McGraw Hill, 1998, pp. 5–7, 20.
  • Dawes, R.M. Rational Choice in an Uncertain World. San Diego: Harcourt Brace Jovanovich, 1988.
  • Deloitte & Touché. “New E-commerce Study Reveals Key Management Issues,” E-commerce Security: A Global Status Report, ISACA, Rolling Meadows, IL, 2000.
  • Drake, D.L. and K.L. Morse. “Applying the Eight-stage Risk Assessment Methodology to Firewalls,” monograph, Science Applications International Corp., San Diego, CA, 1996.
  • Drake, D.L. and K.L. Morse. “The Security-specific Eight Stage Risk Assessment Methodology,” monograph, Science Applications International Corp., San Diego, CA, 1994.
  • Edwards, W. and D.V. Winterfeldt. Decision Analysis and Behavioral Research. Cambridge, MA: Cambridge University Press, 1986.
  • Forcht, K.A. and W.C. Ayers. “Developing a Computer Security Policy for Organizational Use and Implementation,” Journal of Computer Information Systems, 41:2, 2001, pp. 52–57.
  • Foroughi, A. and W.C. Perkins. “Ensuring Internet Security,” Journal of Computer Information Systems, 37:1, 1997, pp. 33–38.
  • Hoffer, J.A. and D.W. Straub. “The 9 to 5 Underground: Are You Policing Computer Crime?” Sloan Management Review, 30:4, Summer 1989, pp. 35–44.
  • Hogarth, R.M. Judgment and Choice, 2nd. Chichester: Wiley, 1987.
  • Kahai, P., M. Gibson, and K. Swinehart. “Computer Usage Characteristics and Small Service Firms: An Exploratory Study,” Journal of Computer Information Systems, 33:2, Winter 1992–1993, pp. 70–76.
  • Kahane, Y., S. Neumann, and C. Tapiero. “Computer Backup Pools, Disaster Recovery, and Default Risk,” Communications of the ACM, 31:1, 1988.
  • Kulczycki, G. “Information Security,” Management Accounting, LXXIX:6, 1997, pp. 18–24.
  • Loch, K.D., H.H. Carr, and M.E. Warkentin. “Threats to Information Systems: Today's Reality, Yesterday's Understanding,” MIS Quarterly, 16:2, 1992, pp. 173–186.
  • Lundgren, T. “User System Secrity,” Journal of Computer Information Systems, 34:3, 1994, pp. 51–54.
  • Panettieri, J.C. “Security,” Information Week, November 27, 1995, pp. 32–40.
  • Parker, D.B. Computer Security Management Upper Saddle River, NJ: Prentice Hall, 1981.
  • Parker, D.B. Crime by Computer. New York: Chas. Scribners Sons, 1976.
  • Parker, D.B. Fighting Computer Crime. New York: Chas. Scribners and Sons, 1983.
  • Power, R. 1999 CSI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 1999.
  • Power, R. 2000 CWI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 2000.
  • Power, R. 2001 CSI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 2001.
  • Power, R. 2002 CSI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute, 2002.
  • Rapalus, P. “Financial Losses Due to Internet Intrusions Trade Secret Theft and Other Cyber Crimes Soar,” On-line. Available: http://www.gocsi.com/prelea_000321.htm.
  • Sanford, C. “Computer Viruses: Symptoms, Remedies, and Preventive Measures,” Journal of Computer Information Systems, 22:3, 1993, p. 67.
  • Schwartz, E. Webonomics: Nine Essential Principles for Growing Your Business on the World Wide Web. New York: Broadway Books, 1997, pp. 190–218.
  • Schwartz, K. “Hackers are Ubiquitous, Malicious and Taken Far Too Lightly, Experts Say,” Government Computer News, 16:23, 1997, pp. 81–82.
  • Seymour, T.J. and E. Robinson. “International Viruses and the Computer Network,” Journal of Computer Information Systems, 35:1, 1995, pp. 23–27. /
  • Shipley, G. “How Secure is Your Network?” Network Computing,” 2000, p. 58.
  • Steinke, G. “A Task-based Approach to Implementing Computer Security,” Journal of Computer Information Systems, 38:1, 1998, pp. 47–54.
  • Straub, D. “Controlling Computer Abuse: An Empirical Study of Effective Security Countermeasures,” Proceedings of the International Conference on Information Systems, Pittsburgh, PA, December 6–8, 1987, pp. 277–289.
  • Straub, D. Deterring Computer Abuse: The Effectiveness of Deterrent Countermeasures in the Computer Security Environment, Indiana University Graduate School of Business, Dissertation, Bloomington, IN, 1986.
  • Straub, D. “Effective IS Security: An Empirical Study,” Information Systems Research, 1:3, 1990, pp. 255–276.
  • Straub, D.W. and R.J. Welke. “Coping with Systems Risk: Security Planning Models for Management Decision-making,” MIS Quarterly, 22:4, 1998, pp. 441–469.
  • Tippett, P. “Calculating Risk,” Information Security, 3, March 2001, pp. 36–38.
  • Vatis, M. Computer Security Threat on Rise. On-line. Available: http://www.desai.com/articles/security_threaton_rise.htm.
  • Whitman, M. “Enemy at the Gate: Threats to Information Security,” Communications of the ACM, 46:8, 2003, pp. 91–95.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.