[КНИГА][B] Cybercrime in progress: Theory and prevention of technology-enabled offenses

T Holt, A Bossler - 2015 - taylorfrancis.com
The emergence of the World Wide Web, smartphones, and computers has transformed the
world and enabled individuals to engage in crimes in a multitude of new ways …

Neutralization: New insights into the problem of employee information systems security policy violations

M Siponen, A Vance - MIS quarterly, 2010 - JSTOR
Employees' failure to comply with information systems security policies is a major concern
for information technology security managers. In efforts to understand this problem, IS …

A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles

SK Khan, N Shiwakoti, P Stasinopoulos - Accident Analysis & Prevention, 2022 - Elsevier
Abstract Emerging Connected and Autonomous Vehicles (CAVs) technology have a
ubiquitous communication framework. It poses security challenges in the form of cyber …

User participation in information systems security risk management

JL Spears, H Barki - MIS quarterly, 2010 - JSTOR
This paper examines user participation in information systems security risk management
and its influence in the context of regulatory compliance via a multi-method study at the …

The insider threat to information systems and the effectiveness of ISO17799

M Theoharidou, S Kokolakis, M Karyda… - Computers & …, 2005 - Elsevier
Insider threat is widely recognised as an issue of utmost importance for IS security
management. In this paper, we investigate the approach followed by ISO17799, the …

Secure multidimensional range queries over outsourced data

B Hore, S Mehrotra, M Canim, M Kantarcioglu - The VLDB Journal, 2012 - Springer
In this paper, we study the problem of supporting multidimensional range queries on
encrypted data. The problem is motivated by secure data outsourcing applications where a …

Insider threats in a financial institution

J Wang, M Gupta, HR Rao - MIS quarterly, 2015 - JSTOR
This study investigates the risk of insider threats associated with different applications within
a financial institution. Extending routine activity theory (RAT) from criminology literature to …

The roles of IT strategies and security investments in reducing organizational security breaches

H Li, S Yoo, WJ Kettinger - Journal of Management Information …, 2021 - Taylor & Francis
This research examines the joint effects of information technology (IT) strategies and security
investments on organizational security breaches. We focus on two forms of IT strategies …