Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Investing in Cybersecurity: Insights from the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.7 No.2
,March 23, 2016
DOI:
10.4236/jis.2016.72004
8,217
Downloads
16,862
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,302
Downloads
10,441
Views
Citations
Information Segmentation and Investing in Cybersecurity
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121006
657
Downloads
3,006
Views
Citations
Empirical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment
(Articles)
Shiori Shinoda
,
Kanta Matsuura
Journal of Information Security
Vol.7 No.2
,March 17, 2016
DOI:
10.4236/jis.2016.72003
2,325
Downloads
3,489
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Food Is Security: The Nexus of Health Security in Fragile and Failed States
(Articles)
John Quinn
,
Tomas Zeleny
,
Vladimir Bencko
Food and Nutrition Sciences
Vol.5 No.19
,October 14, 2014
DOI:
10.4236/fns.2014.519197
4,864
Downloads
6,333
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,404
Downloads
9,685
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,009
Downloads
3,142
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
216
Downloads
1,781
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,616
Downloads
8,108
Views
Citations
Document Management and Process Automation in a Paperless Healthcare Institution
(Articles)
Maria José Amaral Salomi
,
Rafael Fabio Maciel
Technology and Investment
Vol.8 No.3
,August 24, 2017
DOI:
10.4236/ti.2017.83015
1,608
Downloads
5,022
Views
Citations
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
(Articles)
Josiah Dykstra
,
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.13 No.3
,June 9, 2022
DOI:
10.4236/jis.2022.133006
182
Downloads
1,119
Views
Citations
Economics of Offshore IT Outsourcing: An International Trade Perspective
(Articles)
Bijoy Bordoloi
,
Anne Powell
Technology and Investment
Vol.4 No.4
,November 8, 2013
DOI:
10.4236/ti.2013.44032
6,642
Downloads
10,295
Views
Citations
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,285
Downloads
13,099
Views
Citations
Exploration of Core Technologies of Cyber Security
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.9
,September 26, 2021
DOI:
10.4236/oalib.1107795
106
Downloads
912
Views
Citations
Geo-Economics of the Republic of Azerbaijan and Its Economic Security
(Articles)
Shabnam Dadparvar
,
Saeed Azizi
Open Journal of Political Science
Vol.12 No.1
,January 10, 2022
DOI:
10.4236/ojps.2022.121002
174
Downloads
1,248
Views
Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
6,630
Downloads
10,607
Views
Citations
Knowledge Economics: Summary and Rationality
(Articles)
Bhekuzulu Khumalo
Modern Economy
Vol.8 No.12
,December 19, 2017
DOI:
10.4236/me.2017.812102
754
Downloads
2,250
Views
Citations
A New Construction Scheme for Information Security Lab
(Articles)
Li Zhu
,
Huaqing Mao
,
Zhiwen Hu
Creative Education
Vol.3 No.4
,August 13, 2012
DOI:
10.4236/ce.2012.34064
4,991
Downloads
7,328
Views
Citations
Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing
(Articles)
Yoshitomo Matsubara
,
Toshiharu Samura
,
Haruhiko Nishimura
Journal of Information Security
Vol.6 No.3
,July 14, 2015
DOI:
10.4236/jis.2015.63023
5,036
Downloads
7,537
Views
Citations
Camera and Voice Control Based Location Services and Information Security on Android
(Articles)
Jitendra G. Chouhan
,
Nikhil Kumar Singh
,
Prashant S. Modi
,
Keyurbhai A. Jani
,
Bhavin N. Joshi
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73015
3,636
Downloads
5,098
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top