42
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Analyzing Information Systems Security Research to Find Key Topics, Trends, and Opportunities

&
Pages 37-67 | Published online: 07 Jul 2014

References

  • Blake, R., & Shankaranarayanan, G. (2012). Discovering Data and Information Quality Research Insights Gained through Latent Semantic Analysis. International Journal of Business Intelligence Research (IJBIR), 3(1), 1–16.
  • Bodin, L. D., Gordon, L. A., & Loeb, M. P. (2005). Evaluating information security investments using the analytic hierarchy process. Communications of the ACM, 48(2), 78–83.
  • Deerwester, S., Dumais, S. T., Landauer, T. K., Furnas, G. W., & Harshman, R. (1990). Indexing by latent semantic analysis. Journal of the Society for Information Science, 41, 391–407.
  • Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: towards socio - organizational perspectives. Information Systems Journal, 11(2), 127–153.
  • Dutta, A., & McCrohan, K. (2002). Management's role in information security in a cyber economy. California Management Review, 45(1), 67–87.
  • Evangelopoulos, N., Zhang, X., & Prybutok, V. R. (2010). Latent semantic analysis: five methodological recommendations. European Journal of Information Systems, 21(1), 70–86.
  • Griffiths, T. L., & Steyvers, M. (2004). Finding scientific topics. Proceedings of the National Academy of Sciences of the USA, 101(Suppl 1), 5228–5235.
  • IBM. (2010). Introducing the IBM security framework Retrieved September 1, 2012, from http://www.redbooks.ibm.com/abstracts/redp4528.html?Open.
  • ISACA. (2008). Top business/technology issues survey results Retrieved August 1, 2012, from http://www.isaca.org/Knowledge-Center/Pages/Top-Business-Technology-Issues-Survey-Results.aspx.
  • Kaiser, H. F. (1960). The application of electronic computers to factor analysis. Educational and psychological measurement, 20(1), 141–151.
  • Laham, D. (1997). Latent semantic analysis Aaproaches to categorization. Components, 80309-80309.
  • Landauer, T. K., Foltz, P. W., & Laham, D. (1998). Introduction to Latent Semantic Analysis. Discourse Processes, 25, 259–284.
  • Larkey, L. S., & Croft, W. B. (2003). Background concepts from information retrieval and text categorization. In Shermis & Burstein (Eds.), Automated essay scoring: A cross-disciplinary perspective..
  • Larsen, K. R., Monarchi, D. E., Hovorka, D. S., & Bailey, C. N. (2008). Analyzing unstructured text data: Using latent categorization to identify intellectual communities in information systems. Decision Support Systems, 45(4), 884–896.
  • Mahmood, A. M., Siponen, M., Straub, D. W., Rao, R., & Raghu, T. S. (2010). Moving toward black hat research in information systems security: An editorial introduction to the special issue. Management Information Systems Quarterly, 34(3), 431–433.
  • Manning, C. D., Raghavan, P., & Schütze, H. (2008). Introduction to information retrieval. Cambridge, UK: Cambridge University Press.
  • Mitnick, K. D. (2003). Are You the Weak Link? Harvard Business Review, 81(4), 18–20.
  • Porter, M. F. (1980). An algorithm for suffix stripping. Program, 14, 130–137.
  • Sidorova, A., Evangelopoulos, N., Valacich, J. S., & Ramakrishnan, T. (2008). Uncovering the intellectual core of the information systems discipline. Management Information Systems Quarterly, 32(3), 467–482.
  • Siponen, M., & Willison, R. (2007). A critical assessment of IS security research between 1990-2004. Paper presented at the 15th European Conference of Information Systems, St. Gallen, Switzerland.
  • Straub, D. W., Goodman, S. E., & Baskerville, R. (2008). Information security: policy, processes, and practices (Vol. 11): ME Sharpe Inc.
  • Straub, D. W., & Straub, W. (1990). Effective IS security. Information Systems Research, 1(3), 255–276.
  • Zafar, H., & Clark, J. G. (2009). Current state of information security research In IS. Communications of the Association for Information Systems, 24(1), 557–596.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.