Review of systems defense and attack models

KHG LEVITIN - International Journal of Performability Engineering, 2012 - ijpe-online.com
This review paper classifies 129 published papers according to the system structure,
defense measures, and attack tactics and circumstances. System structure is further divided …

Cybersecurity research from a management perspective: A systematic literature review and future research agenda

FT Lohrke… - Journal of General …, 2023 - journals.sagepub.com
Firms continue to face increasing threats of financial and reputational damage from
cybersecurity events. Despite increasing scholarly attention, our 25-year review of studies …

The roles of IT strategies and security investments in reducing organizational security breaches

H Li, S Yoo, WJ Kettinger - Journal of Management Information …, 2021 - Taylor & Francis
This research examines the joint effects of information technology (IT) strategies and security
investments on organizational security breaches. We focus on two forms of IT strategies …

Cybercrime deterrence and international legislation

KL Hui, SH Kim, QH Wang - Mis Quarterly, 2017 - JSTOR
In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on
deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of …

Antecedents for enhanced level of cyber-security in organisations

S Kumar, B Biswas, MS Bhatia, M Dora - Journal of Enterprise …, 2021 - emerald.com
Purpose The present study aims to identify and investigate the antecedents of enhanced
level of cyber-security at the organisational level from both the technical and the human …

Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements

X Zhao, L Xue, AB Whinston - Journal of Management Information …, 2013 - Taylor & Francis
The interdependency of information security risks often induces firms to invest inefficiently in
information technology security management. Cyberinsurance has been proposed as a …

Health-care security strategies for data protection and regulatory compliance

J Kwon, ME Johnson - Journal of Management Information …, 2013 - Taylor & Francis
This study identifies how security performance and compliance influence each other and
how security resources contribute to two security outcomes: data protection and regulatory …

Cybersecurity investments in a two-echelon supply chain with third-party risk propagation

Y Li, L Xu - International Journal of Production Research, 2021 - Taylor & Francis
Cybersecurity presents a monumental challenge for interconnected supply chains, as an
attack on one node can compromise an entire business. In this paper, we propose a game …

Examining hacker participation length in cybercriminal internet-relay-chat communities

V Benjamin, B Zhang, JF Nunamaker Jr… - Journal of Management …, 2016 - Taylor & Francis
To further cybersecurity, there is interest in studying online cybercriminal communities to
learn more about emerging cyber threats. Literature documents the existence of many online …

Information security outsourcing with system interdependency and mandatory security requirement

KL Hui, W Hui, WT Yue - Journal of Management Information …, 2012 - Taylor & Francis
The rapid growth of computer networks has led to a proliferation of information security
standards. To meet these security standards, some organizations outsource security …