Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Review of systems defense and attack models
KHG LEVITIN - International Journal of Performability Engineering, 2012 - ijpe-online.com
This review paper classifies 129 published papers according to the system structure,
defense measures, and attack tactics and circumstances. System structure is further divided …
defense measures, and attack tactics and circumstances. System structure is further divided …
Cybersecurity research from a management perspective: A systematic literature review and future research agenda
FT Lohrke… - Journal of General …, 2023 - journals.sagepub.com
Firms continue to face increasing threats of financial and reputational damage from
cybersecurity events. Despite increasing scholarly attention, our 25-year review of studies …
cybersecurity events. Despite increasing scholarly attention, our 25-year review of studies …
The roles of IT strategies and security investments in reducing organizational security breaches
This research examines the joint effects of information technology (IT) strategies and security
investments on organizational security breaches. We focus on two forms of IT strategies …
investments on organizational security breaches. We focus on two forms of IT strategies …
Cybercrime deterrence and international legislation
In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on
deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of …
deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of …
Antecedents for enhanced level of cyber-security in organisations
Purpose The present study aims to identify and investigate the antecedents of enhanced
level of cyber-security at the organisational level from both the technical and the human …
level of cyber-security at the organisational level from both the technical and the human …
Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements
The interdependency of information security risks often induces firms to invest inefficiently in
information technology security management. Cyberinsurance has been proposed as a …
information technology security management. Cyberinsurance has been proposed as a …
Health-care security strategies for data protection and regulatory compliance
This study identifies how security performance and compliance influence each other and
how security resources contribute to two security outcomes: data protection and regulatory …
how security resources contribute to two security outcomes: data protection and regulatory …
Cybersecurity investments in a two-echelon supply chain with third-party risk propagation
Y Li, L Xu - International Journal of Production Research, 2021 - Taylor & Francis
Cybersecurity presents a monumental challenge for interconnected supply chains, as an
attack on one node can compromise an entire business. In this paper, we propose a game …
attack on one node can compromise an entire business. In this paper, we propose a game …
Examining hacker participation length in cybercriminal internet-relay-chat communities
To further cybersecurity, there is interest in studying online cybercriminal communities to
learn more about emerging cyber threats. Literature documents the existence of many online …
learn more about emerging cyber threats. Literature documents the existence of many online …
Information security outsourcing with system interdependency and mandatory security requirement
The rapid growth of computer networks has led to a proliferation of information security
standards. To meet these security standards, some organizations outsource security …
standards. To meet these security standards, some organizations outsource security …