[1]
|
More than malware: unmasking the hidden risk of cybersecurity regulations
International Cybersecurity Law Review,
2024
DOI:10.1365/s43439-024-00111-7
|
|
|
[2]
|
The Role of Internal Auditors Characteristics in Cybersecurity Risk Assessment in Financial-Based Business Organisations: a Conceptual Review
Revista de Gestão Social e Ambiental,
2024
DOI:10.24857/rgsa.v18n6-008
|
|
|
[3]
|
Information sharing and security investment for substitutable firms: A game-theoretic analysis
Journal of the Operational Research Society,
2024
DOI:10.1080/01605682.2023.2210594
|
|
|
[4]
|
The Role of Internal Auditors Characteristics in Cybersecurity Risk Assessment in Financial-Based Business Organisations: a Conceptual Review
Revista de Gestão Social e Ambiental,
2024
DOI:10.24857/rgsa.v18n6-008
|
|
|
[5]
|
Information sharing and security investment for substitutable firms: A game-theoretic analysis
Journal of the Operational Research Society,
2024
DOI:10.1080/01605682.2023.2210594
|
|
|
[6]
|
Approach To Risk Management Based On The Assessment Of The Cost Of Quality Of Implementation Of Cybersecurity Measures Of The Organization
2024 35th Conference of Open Innovations Association (FRUCT),
2024
DOI:10.23919/FRUCT61870.2024.10516402
|
|
|
[7]
|
Corporate cybersecurity risk and data breaches: A systematic review of empirical research
Australian Journal of Management,
2024
DOI:10.1177/03128962241293658
|
|
|
[8]
|
Information sharing and security investment for substitutable firms: A game-theoretic analysis
Journal of the Operational Research Society,
2023
DOI:10.1080/01605682.2023.2210594
|
|
|
[9]
|
Cybersecurity For Defense Economists
Defence and Peace Economics,
2023
DOI:10.1080/10242694.2022.2138122
|
|
|
[10]
|
Cyberdefense
International Series in Operations Research & Management Science,
2023
DOI:10.1007/978-3-031-30191-9_1
|
|
|
[11]
|
Cyberdefense
International Series in Operations Research & Management Science,
2023
DOI:10.1007/978-3-031-30191-9_11
|
|
|
[12]
|
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups
IEEE Transactions on Software Engineering,
2022
DOI:10.1109/TSE.2020.3023735
|
|
|
[13]
|
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups
IEEE Transactions on Software Engineering,
2022
DOI:10.1109/TSE.2020.3023735
|
|
|
[14]
|
A study of detection of abnormal network traffic: A comparison of multiple algorithms
SECURITY AND PRIVACY,
2022
DOI:10.1002/spy2.190
|
|
|
[15]
|
Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security,
2022
DOI:10.1016/j.cose.2021.102533
|
|
|
[16]
|
Dangerous games: A literature review on cybersecurity investments
Journal of Economic Surveys,
2022
DOI:10.1111/joes.12456
|
|
|
[17]
|
Cybersecurity For Defense Economists
Defence and Peace Economics,
2022
DOI:10.1080/10242694.2022.2138122
|
|
|
[18]
|
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups
IEEE Transactions on Software Engineering,
2022
DOI:10.1109/TSE.2020.3023735
|
|
|
[19]
|
A study of detection of abnormal network traffic: A comparison of multiple algorithms
SECURITY AND PRIVACY,
2022
DOI:10.1002/spy2.190
|
|
|
[20]
|
Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security,
2022
DOI:10.1016/j.cose.2021.102533
|
|
|
[21]
|
Cybersecurity Aspects of Location-Based Services (LBS) in 5G Networks
2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI),
2021
DOI:10.1109/CINTI53070.2021.9668499
|
|
|
[22]
|
The Palgrave Handbook of Corporate Sustainability in the Digital Era
2021
DOI:10.1007/978-3-030-42412-1_7
|
|
|
[23]
|
The Palgrave Handbook of Corporate Sustainability in the Digital Era
2021
DOI:10.1007/978-3-030-42412-1_7
|
|
|
[24]
|
The Benefits and Costs of Cybersecurity Risk Reduction: A Dynamic Extension of the Gordon and Loeb Model
Risk Analysis,
2021
DOI:10.1111/risa.13713
|
|
|
[25]
|
Introducing the concept of cybersecurity footprint
Information & Computer Security,
2021
DOI:10.1108/ICS-04-2020-0054
|
|
|
[26]
|
Understanding incentives for cybersecurity investments: Development and application of a typology
Digital Business,
2021
DOI:10.1016/j.digbus.2021.100014
|
|
|
[27]
|
Systematically Understanding Cybersecurity Economics: A Survey
Sustainability,
2021
DOI:10.3390/su132413677
|
|
|
[28]
|
The Palgrave Handbook of Corporate Sustainability in the Digital Era
2021
DOI:10.1007/978-3-030-42412-1_7
|
|
|
[29]
|
Information Security Protection of Power System Computer Network
2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC),
2021
DOI:10.1109/IPEC51340.2021.9421317
|
|
|
[30]
|
Analysis of Models for Selection of Investment Strategies
2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T),
2020
DOI:10.1109/PICST51311.2020.9468024
|
|
|
[31]
|
Information security in healthcare supply chains: an analysis of critical information protection practices
Gestão & Produção,
2020
DOI:10.1590/0104-530x5376-20
|
|
|
[32]
|
Knowledge absorption for cyber-security
Computers in Human Behavior,
2020
DOI:10.1016/j.chb.2020.106255
|
|
|
[33]
|
ANALYSIS OF MATHEMATICAL MODELS OF INVESTMENT STRATEGIES IN THE UNIVERSITY
ON CYBER SECURITY SYSTEMS
THE BULLETIN,
2020
DOI:10.32014/2020.2518-1467.16
|
|
|
[34]
|
Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
Computers & Security,
2020
DOI:10.1016/j.cose.2020.101907
|
|
|
[35]
|
Cybersecurity in accounting research
Managerial Auditing Journal,
2019
DOI:10.1108/MAJ-09-2018-2004
|
|
|
[36]
|
Cybersecurity in Accounting Research
SSRN Electronic Journal ,
2019
DOI:10.2139/ssrn.3923245
|
|
|
[37]
|
Pricing Cyber Security Insurance: A Copula Model Using an Objective, Verifiable, Loss Measure
SSRN Electronic Journal ,
2018
DOI:10.2139/ssrn.3236512
|
|
|
[38]
|
Trade secrets and cyber security breaches
Journal of Accounting and Public Policy,
2018
DOI:10.1016/j.jaccpubpol.2018.10.006
|
|
|
[39]
|
MODEL OF INVESTMENT STRATEGIES IN CYBER SECURITY SYSTEMS OF TRANSPORT SITUATIONAL CENTERS
Cybersecurity: Education, Science, Technique,
2018
DOI:10.28925/2663-4023.2018.2.6879
|
|
|
[40]
|
Trade Secrets and Cybersecurity Breaches
SSRN Electronic Journal ,
2017
DOI:10.2139/ssrn.3018553
|
|
|
[41]
|
Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
European Journal of Operational Research,
2017
DOI:10.1016/j.ejor.2016.12.034
|
|
|
[42]
|
Estimation of externalities in interdependent security: A case study of large systems
2017 IEEE 56th Annual Conference on Decision and Control (CDC),
2017
DOI:10.1109/CDC.2017.8264242
|
|
|
[43]
|
Calibration of the Gordon-Loeb Models for the Probability of Security Breaches
2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim),
2017
DOI:10.1109/UKSim.2017.18
|
|
|
[44]
|
Security countermeasures in the cyber-world
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF),
2016
DOI:10.1109/ICCCF.2016.7740440
|
|
|
[45]
|
Investing in Cybersecurity: Insights from the Gordon-Loeb Model
Journal of Information Security,
2016
DOI:10.4236/jis.2016.72004
|
|
|
[46]
|
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
Journal of Information Security,
2016
DOI:10.4236/jis.2016.72002
|
|
|
[47]
|
Cybersecurity: Integrating Information into the Microeconomics of the Consumer and the Firm
Journal of Information Security,
2016
DOI:10.4236/jis.2016.75023
|
|
|
[48]
|
Information Security in the Cloud: Should We be Using a Different Approach?
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom),
2015
DOI:10.1109/CloudCom.2015.92
|
|
|
[49]
|
Computation, Cryptography, and Network Security
2015
DOI:10.1007/978-3-319-18275-9_16
|
|
|
[50]
|
Computation, Cryptography, and Network Security
2015
DOI:10.1007/978-3-319-18275-9_16
|
|
|