Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions

S Kumar, RR Mallipeddi - Production and Operations …, 2022 - journals.sagepub.com
The new age economy is primarily driven by Industry 4.0 and Industry 5.0, which facilitate
smartification of organizations by hel** them integrate and automate decision making …

Nudges for privacy and security: Understanding and assisting users' choices online

A Acquisti, I Adjerid, R Balebako… - ACM Computing …, 2017 - dl.acm.org
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …

[HTML][HTML] Decision support approaches for cyber security investment

A Fielder, E Panaousis, P Malacaria, C Hankin… - Decision support …, 2016 - Elsevier
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …

The economics of information security investment

LA Gordon, MP Loeb - ACM Transactions on Information and System …, 2002 - dl.acm.org
This article presents an economic model that determines the optimal amount to invest to
protect a given set of information. The model takes into account the vulnerability of the …

Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

The economic cost of publicly announced information security breaches: empirical evidence from the stock market

K Campbell, LA Gordon, MP Loeb… - Journal of Computer …, 2003 - content.iospress.com
This study examines the economic effect of information security breaches reported in
newspapers on publicly traded US corporations. We find limited evidence of an overall …

The economics of information security

R Anderson, T Moore - science, 2006 - science.org
The economics of information security has recently become a thriving and fast-moving
discipline. As distributed systems are assembled from machines belonging to principals with …

So long, and no thanks for the externalities: the rational rejection of security advice by users

C Herley - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
It is often suggested that users are hopelessly lazy and unmotivated on security questions.
They chose weak passwords, ignore security warnings, and are oblivious to certificates …

Interdependent security

H Kunreuther, G Heal - Journal of risk and uncertainty, 2003 - Springer
Do firms have adequate incentives to invest in protection against a risk whose magnitude
depends on the actions of others? This paper characterizes the Nash equilibria for this type …

AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis

MF Ak, M Gul - Complex & Intelligent Systems, 2019 - Springer
Risk analysis (RA) contains several methodologies that object to ensure the protection and
safety of occupational stakeholders. Multi attribute decision-making (MADM) is one of the …