4.5 Article

Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Towards a conceptual definition for IT assets through interrogating their nature and epistemic uncertainty

A. Kayode Adesemowo

Summary: This paper explores the conceptual definition of IT assets, revealing a lack of universal understanding and definition for them. It suggests a conceptual definition to assist organizations in better identifying assets in risk assessment, understanding the intrinsic nature of IT assets, and comprehensively engaging with them.

COMPUTERS & SECURITY (2021)

Article Green & Sustainable Science & Technology

How do internal, market and institutional factors affect the development of eco-innovation in firms?

Nieves Arranz et al.

Summary: This research investigates the impact of drivers on the development of eco-innovation in firms using two methods, finding that previous experiences have the greatest influence on eco-innovation.

JOURNAL OF CLEANER PRODUCTION (2021)

Article Computer Science, Information Systems

Shall we follow? Impact of reputation concern on information security managers' investment decisions

Xiuyan Shao et al.

COMPUTERS & SECURITY (2020)

Article Business

History and the micro-foundations of dynamic capabilities

Roy Suddaby et al.

STRATEGIC MANAGEMENT JOURNAL (2020)

Article Business

The extended dynamic capabilities model: A meta-analysis

Claudia Cristina Bitencourt et al.

EUROPEAN MANAGEMENT JOURNAL (2020)

Article Computer Science, Information Systems

Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment

Mohammad S. Jalali et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2019)

Article Computer Science, Information Systems

Information security breaches and IT security investments: Impacts on competitors

Christina Y. Jeong et al.

INFORMATION & MANAGEMENT (2019)

Article Information Science & Library Science

Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective

Mari Karjalainen et al.

INFORMATION SYSTEMS RESEARCH (2019)

Article Information Science & Library Science

Organizational practices as antecedents of the information security management performance An empirical investigation

Daniel Perez-Gonzalez et al.

INFORMATION TECHNOLOGY & PEOPLE (2019)

Article Information Science & Library Science

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking

A. J. Burns et al.

INFORMATION SYSTEMS RESEARCH (2019)

Article Engineering, Industrial

A new game of information sharing and security investment between two allied firms

Xiaofei Qian et al.

INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH (2018)

Article Computer Science, Information Systems

Information security investments: An exploratory multiple case study on decision-making, evaluation and learning

Eva Weishaeupl et al.

COMPUTERS & SECURITY (2018)

Article Health Care Sciences & Services

Cybersecurity in Hospitals: A Systematic, Organizational Perspective

Mohammad S. Jalali et al.

JOURNAL OF MEDICAL INTERNET RESEARCH (2018)

Article Computer Science, Information Systems

An Options Approach to Cybersecurity Investment

Michail Chronopoulos et al.

IEEE ACCESS (2018)

Article Information Science & Library Science

Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making

Michel Benaroch

INFORMATION SYSTEMS RESEARCH (2018)

Article Management

Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability

Anna Nagurney et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2017)

Article Computer Science, Information Systems

Training to Mitigate Phishing Attacks Using Mindfulness Techniques

Matthew L. Jensen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory

Philip Menard et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Review Psychology, Applied

Review and Recommendations for Integrating Mediation and Moderation

Samantha J. Holland et al.

ORGANIZATIONAL RESEARCH METHODS (2017)

Article Computer Science, Artificial Intelligence

Decision support approaches for cyber security investment

Andrew Fielder et al.

DECISION SUPPORT SYSTEMS (2016)

Article Engineering, Industrial

An economic model to evaluate information security investment of risk-taking small and medium enterprises

Sanjaya Mayadunne et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2016)

Article Computer Science, Information Systems

Perverse Effects in Defense of Computer Systems: When More Is Less

Josephine Wolff

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2016)

Article Computer Science, Information Systems

Sharing Knowledge in Social Q&A Sites: The Unintended Consequences of Extrinsic Motivation

Li Zhao et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2016)

Article Business

Dynamic Capabilities and Organizational Performance: A Meta-Analytic Evaluation and Extension

Stav Fainshmidt et al.

JOURNAL OF MANAGEMENT STUDIES (2016)

Article Computer Science, Artificial Intelligence

Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors

Bin Srinidhi et al.

DECISION SUPPORT SYSTEMS (2015)

Article Computer Science, Information Systems

The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets

Clay Posey et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2015)

Article Information Science & Library Science

Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance

Ryan T. Wright et al.

INFORMATION SYSTEMS RESEARCH (2014)

Article Management

Investigating security investment impact on firm performance

Ranjit Bose et al.

INTERNATIONAL JOURNAL OF ACCOUNTING AND INFORMATION MANAGEMENT (2014)

Review Psychology

Sources of Method Bias in Social Science Research and Recommendations on How to Control It

Philip M. Podsakoff et al.

ANNUAL REVIEW OF PSYCHOLOGY, VOL 63 (2012)

Article Computer Science, Information Systems

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory

Anthony Vance et al.

INFORMATION & MANAGEMENT (2012)

Article Computer Science, Information Systems

The cyber threat landscape: Challenges and future research directions

Kim-Kwang Raymond Choo

COMPUTERS & SECURITY (2011)

Article Operations Research & Management Science

Efficiency in technological networks, an approach from Artificial Neural Networks (ANN)

N. Arranz et al.

INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT (2010)

Article Mathematics, Interdisciplinary Applications

Complex Joint R&D Projects: From Empirical Evidence to Managerial Implications

N. Arranz et al.

COMPLEXITY (2009)

Article Computer Science, Information Systems

Protection motivation and deterrence: a framework for security policy compliance in organisations

Tejaswini Herath et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Psychology, Applied

Using Artificial Neural Networks to Model Nonlinearity The Case of the Job Satisfaction-Job Performance Relationship

Mark John Somers et al.

ORGANIZATIONAL RESEARCH METHODS (2009)

Article Engineering, Industrial

An economic analysis of the optimal information security investment in the case of a risk-averse firm

C. Derrick Huang et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2008)

Review Business

Entrepreneurship and dynamic capabilities: A review, model and research agenda

Shaker A. Zahra et al.

JOURNAL OF MANAGEMENT STUDIES (2006)

Review Computer Science, Information Systems

Effect of information systems resources and capabilities on firm performance: A resource-based perspective

T Ravichandran et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2005)

Review Psychology, Applied

Common method biases in behavioral research: A critical review of the literature and recommended remedies

PM Podsakoff et al.

JOURNAL OF APPLIED PSYCHOLOGY (2003)

Article Psychology, Multidisciplinary

Measuring implementation intentions in the context of the theory of planned behavior

J Rise et al.

SCANDINAVIAN JOURNAL OF PSYCHOLOGY (2003)

Article Psychology, Social

Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior

I Ajzen

JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2002)