Information security investments: An exploratory multiple case study on decision-making, evaluation and learning E Weishäupl, E Yasasin, G Schryen Computers & Security 77, 807-823, 2018 | 108 | 2018 |
Classifying malware attacks in IaaS cloud environments N Rakotondravony, B Taubmann, W Mandarawi, E Weishäupl, P Xu, ... Journal of Cloud Computing 6, 1-12, 2017 | 58 | 2017 |
A multi-theoretical literature review on information security investments using the resource-based view and the organizational learning theory E Weishäupl, E Yasasin, G Schryen | 29 | 2015 |
IT Security Investments through the Lens of the Resource-based View: A new theoretical Model and Literature Review E Weishäupl, E Yasasin, G Schryen | 21 | 2015 |
CloudIDEA: A malware defense architecture for cloud data centers A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H de Meer, ... On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015 | 16 | 2015 |
Timing in information security: An event study on the impact of information security investment announcements E Szubartowicz, G Schryen Journal of Information System Security 16 (1), 2020 | 9 | 2020 |
A Literature Review on Smartphone Security in Organizations using a new theoretical Model-The Dynamic Security Success Model L Reinfelder, E Weishäupl | 5 | 2016 |
Towards a Multi-objective Optimization Model to Support Information Security Investment Decision-making E Weishäupl Proceedings of the 4th Workshop on Security in Highly Connected IT Systems …, 2017 | 4 | 2017 |
Planning and Evaluation of Information Security Investments E Szubartowicz | 1 | 2018 |
Qos-aware secure live migration of virtual machines W Mandarawi, A Fischer, H de Meer, E Weishäupl | 1 | 2015 |
IT-Sicherheit: ökonomisch planen und bewerten G Schryen, E Weishäupl Managementkompass, 17-18, 2015 | 1 | 2015 |
Towards an economic approach to identity and access management systems using decision theory E Weishäupl, M Kunz, E Yasasin, G Wagner, J Prester, G Schryen, ... | 1 | 2015 |