相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Cyber-risk Management Framework for Online Gaming Firms: an Artificial Neural Network Approach
Kalpit Sharma et al.
INFORMATION SYSTEMS FRONTIERS (2023)
Cross-sectional research: A critical perspective, use cases, and recommendations for IS research
Christian Maier et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2023)
WHERE IS IT IN INFORMATION SECURITY? THE INTERRELATIONSHIP AMONG IT INVESTMENT, SECURITY AWARENESS, AND DATA BREACHES
Wilson Weixun Li et al.
MIS QUARTERLY (2023)
How commitment and platform adoption drive the e-commerce performance of SMEs: A mixed-method inquiry into e-commerce affordances
Jacopo Ballerini et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2023)
A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks
Baidyanath Biswas et al.
DECISION SUPPORT SYSTEMS (2023)
CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL
Swati Jain et al.
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2023)
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions
Harun Oz et al.
ACM COMPUTING SURVEYS (2022)
How to Respond to a Ransomware Attack? One Radiation Oncology Department's Response to a Cyber-Attack on Their Record and Verify System
Amy S. Harrison et al.
PRACTICAL RADIATION ONCOLOGY (2022)
Antecedents and consequences of data breaches: A systematic review
Frederic Schlackl et al.
INFORMATION & MANAGEMENT (2022)
An exploratory study of organizational cyber resilience, its precursors and outcomes
Elinor Tsen et al.
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2022)
Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering
Manas Tripathi et al.
INFORMATION & MANAGEMENT (2022)
Security breaches and organization response strategy: Exploring consumers' threat and coping appraisals
Carol Xiaojuan Ou et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2022)
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai-Wan Wong et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2022)
COMBINING CROWD AND MACHINE INTELLIGENCE TO DETECT FALSE NEWS ON SOCIAL MEDIA
Xuan Wei et al.
MIS QUARTERLY (2022)
Sarima-Based Cyber-Risk Assessment and Mitigation Model for A Smart City's Traffic Management Systems (Scram)
Kalpit Sharma et al.
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2022)
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions
Timothy McIntosh et al.
ACM COMPUTING SURVEYS (2022)
The impact of CIO characteristics on data breaches
Thomas Smith et al.
INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS (2021)
Ransomware Recovery and Imaging Operations: Lessons Learned and Planning Considerations
Po-Hao Chen et al.
JOURNAL OF DIGITAL IMAGING (2021)
Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy
Yogesh K. Dwivedi et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2021)
Risk management, firm reputation, and the impact of successful cyberattacks on target firms
Shinichi Kamiya et al.
JOURNAL OF FINANCIAL ECONOMICS (2021)
A DATA ANALYTICS FRAMEWORK FOR SMART ASTHMA MANAGEMENT BASED ON REMOTE HEALTH INFORMATION SYSTEMS WITH BLUETOOTHENABLED PERSONAL INHALERS
Junbo Son et al.
MIS QUARTERLY (2020)
TRAJECTORIES OF REPEATED READMISSIONS OF CHRONIC DISEASE PATIENTS: RISK STRATIFICATION, PROFILING, AND PREDICTION
Ofir Ben-Assuli et al.
MIS QUARTERLY (2020)
A Multi-Tier Streaming Analytics Model of 0-Day Ransomware Detection Using Machine Learning
Hiba Zuhair et al.
APPLIED SCIENCES-BASEL (2020)
A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums
Baidyanath Biswas et al.
DECISION SUPPORT SYSTEMS (2020)
An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability
Lena Yuryna Connolly et al.
JOURNAL OF CYBERSECURITY (2020)
The Growing Influence of Ransomware
Matthew A. Mos et al.
2020 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT) (2020)
Centralized IT Decision Making and Cybersecurity Breaches: Evidence from US Higher Education Institutions
Che-Wei Liu et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2020)
Understanding Security Vulnerability Awareness, Firm Incentives, and ICT Development in Pan-Asia
Yunhui Zhuang et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2020)
IS CYBERSECURITY A TEAM SPORT? A MULTILEVEL EXAMINATION OF WORKGROUP INFORMATION SECURITY EFFECTIVENESS
Chul Woo Yoo et al.
MIS QUARTERLY (2020)
Stakeholder perceptions of information security policy: Analyzing personal constructs
Spyridon Samonas et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)
Theory building with big data-driven research - Moving away from the What towards the Why
Arpan Kumar Kar et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2020)
A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs
Saini Das et al.
INFORMATION SYSTEMS FRONTIERS (2019)
Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance
Arunabha Mukhopadhyay et al.
INFORMATION SYSTEMS FRONTIERS (2019)
The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
Lena Y. Connolly et al.
COMPUTERS & SECURITY (2019)
Classification of ransomware families with machine learning based on N-gram of opcodes
Hanqi Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Digital transformation strategy making in pre-digital organizations: The case of a financial services provider
Simon Chanias et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2019)
A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware
Ahmad O. Almashhadani et al.
IEEE ACCESS (2019)
How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?
Seung Hyun Kim et al.
INFORMATION SYSTEMS RESEARCH (2019)
Big data analytics and firm performance: Findings from a mixed-method approach
Patrick Mikalef et al.
JOURNAL OF BUSINESS RESEARCH (2019)
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
Tooska Dargahi et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2019)
ADOPTION OF SUSTAINABLE TECHNOLOGIES: A MIXED-METHODS STUDY OF GERMAN HOUSEHOLDS
Philipp Wunderlich et al.
MIS QUARTERLY (2019)
Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior
Ling Li et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2019)
Cyber-analytics: Modeling factors associated with healthcare data breaches
Alexander McLeod et al.
DECISION SUPPORT SYSTEMS (2018)
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory
Aviad Cohen et al.
EXPERT SYSTEMS WITH APPLICATIONS (2018)
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
Mauro Conti et al.
COMPUTERS & SECURITY (2018)
Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection
Bander Ali Saleh Al-rimy et al.
INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING (2018)
Evolution of ransomware
Philip O'Kane et al.
IET NETWORKS (2018)
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
Jingguo Wang et al.
MIS QUARTERLY (2017)
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches
Corey M. Angst et al.
MIS QUARTERLY (2017)
HEALTHCARE PREDICTIVE ANALYTICS FOR RISK PROFILING IN CHRONIC CARE: A BAYESIAN MULTITASK LEARNING APPROACH
Yu-Kai Lin et al.
MIS QUARTERLY (2017)
A TREE-BASED APPROACH FOR ADDRESSING SELF-SELECTION IN IMPACT STUDIES WITH BIG DATA
Inbal Yahav et al.
MIS QUARTERLY (2016)
On the definition of cyber-physical resilience in power systems
Reza Arghandeh et al.
RENEWABLE & SUSTAINABLE ENERGY REVIEWS (2016)
WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS
Scott R. Boss et al.
MIS QUARTERLY (2015)
Information Security: Risk, Governance and Implementation Setback
M. R. Fazlida et al.
7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015 (2015)
Cyber-risk decision models: To insure IT or not?
Arunabha Mukhopadhyay et al.
DECISION SUPPORT SYSTEMS (2013)
DIGITAL BUSINESS STRATEGY: TOWARD A NEXT GENERATION OF INSIGHTS
Anandhi Bharadwaj et al.
MIS QUARTERLY (2013)
Revenue Diversification in Nonprofit Organizations: Does it Lead to Financial Stability?
Deborah A. Carroll et al.
JOURNAL OF PUBLIC ADMINISTRATION RESEARCH AND THEORY (2009)
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
Sandip C. Patel et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2008)
Interdependent security
H Kunreuther et al.
JOURNAL OF RISK AND UNCERTAINTY (2003)
A framework for using insurance for cyber-risk management
LA Gordon et al.
COMMUNICATIONS OF THE ACM (2003)