An overview of social engineering malware: Trends, tactics, and implications

S Abraham, IS Chengalur-Smith - Technology in Society, 2010 - Elsevier
Social engineering continues to be an increasing attack vector for the propagation of
malicious programs. For this article, we collected data on malware incidents and highlighted …

A review of IT governance: A taxonomy to inform accounting information systems

CL Wilkin, RH Chenhall - Journal of Information Systems, 2010 - publications.aaahq.org
This paper reviews Information Systems (IS) literature that is relevant to Information
Technology Governance (ITG) and examines how it informs Accounting Information Systems …

[HTML][HTML] Decision support approaches for cyber security investment

A Fielder, E Panaousis, P Malacaria, C Hankin… - Decision support …, 2016 - Elsevier
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …

Investigating the security divide between SME and large companies: How SME characteristics influence organizational IT security investments

M Heidt, JP Gerlach, P Buxmann - Information Systems Frontiers, 2019 - Springer
Lagging IT security investments in small and medium-sized enterprises (SME) point towards
a security divide between SME and large enterprises, yet our structured literature review …

Proactive versus reactive security investments in the healthcare sector

J Kwon, ME Johnson - Mis Quarterly, 2014 - JSTOR
This study identifies the effects of security investments that arise from previous failures or
external regulatory pressure. Building on organizational learning theory, the study focuses …

Cyber-risk decision models: To insure IT or not?

A Mukhopadhyay, S Chatterjee, D Saha… - Decision Support …, 2013 - Elsevier
Security breaches adversely impact profit margins, market capitalization and brand image of
an organization. Global organizations resort to the use of technological devices to reduce …

Insider threats in a financial institution

J Wang, M Gupta, HR Rao - MIS quarterly, 2015 - JSTOR
This study investigates the risk of insider threats associated with different applications within
a financial institution. Extending routine activity theory (RAT) from criminology literature to …

Factors associated with security/cybersecurity audit by internal audit function: An international study

MS Islam, N Farah, TF Stafford - Managerial Auditing Journal, 2018 - emerald.com
Purpose The purpose of the study is to explore the factors associated with the extent of
security/cybersecurity audit by the internal audit function (IAF) of the firm. Specifically, the …

The association between the disclosure and the realization of information security risk factors

T Wang, KN Kannan, JR Ulmer - Information systems …, 2013 - pubsonline.informs.org
Firms often disclose information security risk factors in public filings such as 10-K reports.
The internal information associated with disclosures may be positive or negative. In this …

Cybersecurity awareness training programs: a cost–benefit analysis framework

Z Zhang, W He, W Li, MH Abdous - Industrial Management & Data …, 2021 - emerald.com
Purpose Employees must receive proper cybersecurity training so that they can recognize
the threats to their organizations and take the appropriate actions to reduce cyber risks …