[1]
|
A Tullock-contest-based approach for cyber security investments
Annals of Operations Research,
2023
DOI:10.1007/s10479-022-04958-z
|
|
|
[2]
|
Embracing Business Sustainability Through Innovation and Creativity in the Service Sector
Advances in Business Strategy and Competitive Advantage,
2023
DOI:10.4018/978-1-6684-6732-9.ch013
|
|
|
[3]
|
The importance of cyber security education in digitalization and Banking
2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N),
2022
DOI:10.1109/ICAC3N56670.2022.10074188
|
|
|
[4]
|
Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security,
2022
DOI:10.1016/j.cose.2021.102533
|
|
|
[5]
|
Information security economics: cyber security threats
Proceedings of the International Conference on Business Excellence,
2022
DOI:10.2478/picbe-2022-0056
|
|
|
[6]
|
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications
Advances in Information Security, Privacy, and Ethics,
2022
DOI:10.4018/978-1-6684-5284-4.ch022
|
|
|
[7]
|
A framework for the planning and management of cybersecurity projects in small and medium-sized enterprises
Revista de Gestão e Projetos,
2022
DOI:10.5585/gep.v13i3.23083
|
|
|
[8]
|
An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks
Information Systems Frontiers,
2022
DOI:10.1007/s10796-022-10246-9
|
|
|
[9]
|
Optimizing Cybersecurity Investments over Time
Algorithms,
2022
DOI:10.3390/a15060211
|
|
|
[10]
|
A Tullock-contest-based approach for cyber security investments
Annals of Operations Research,
2022
DOI:10.1007/s10479-022-04958-z
|
|
|
[11]
|
Prioritizing IT Management Issues and Business Performance
Journal of Information Systems,
2022
DOI:10.2308/ISYS-2020-016
|
|
|
[12]
|
Information security economics: cyber security threats
Proceedings of the International Conference on Business Excellence,
2022
DOI:10.2478/picbe-2022-0056
|
|
|
[13]
|
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications
Advances in Information Security, Privacy, and Ethics,
2022
DOI:10.4018/978-1-6684-5284-4.ch022
|
|
|
[14]
|
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups
IEEE Transactions on Software Engineering,
2022
DOI:10.1109/TSE.2020.3023735
|
|
|
[15]
|
Tourism Marketing in Southeast and East Asia
2022
DOI:10.1079/9781800622166.0010
|
|
|
[16]
|
Tourism Marketing in Southeast and East Asia
2022
DOI:10.1079/9781800622166.0010
|
|
|
[17]
|
Intelligent Interactive Multimedia Systems for e-Healthcare Applications
2022
DOI:10.1007/978-981-16-6542-4_13
|
|
|
[18]
|
Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security,
2022
DOI:10.1016/j.cose.2021.102533
|
|
|
[19]
|
The Benefits and Costs of Cybersecurity Risk Reduction: A Dynamic Extension of the Gordon and Loeb Model
Risk Analysis,
2021
DOI:10.1111/risa.13713
|
|
|
[20]
|
Integrating Andragogy Theory into a Multidisciplinary Curriculum to Achieve a Connected Program for a Doctorate in Cybersecurity
2021 IEEE Frontiers in Education Conference (FIE),
2021
DOI:10.1109/FIE49875.2021.9637127
|
|
|
[21]
|
Cyber Supply Chain Security: A Cost Benefit Analysis Using Net Present Value
2021 International Conference on Cyber Security and Internet of Things (ICSIoT),
2021
DOI:10.1109/ICSIoT55070.2021.00018
|
|
|
[22]
|
Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm
Risks,
2021
DOI:10.3390/risks9010024
|
|
|
[23]
|
Blockchain technology in the future of business cyber security and accounting
Journal of Management Analytics,
2020
DOI:10.1080/23270012.2020.1731721
|
|
|
[24]
|
Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model
Journal of Cybersecurity,
2020
DOI:10.1093/cybsec/tyaa005
|
|
|
[25]
|
Optimum spending on cybersecurity measures
Transforming Government: People, Process and Policy,
2020
DOI:10.1108/TG-11-2019-0112
|
|
|
[26]
|
Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
Computers & Security,
2020
DOI:10.1016/j.cose.2020.101907
|
|
|
[27]
|
Knowledge absorption for cyber-security
Computers in Human Behavior,
2020
DOI:10.1016/j.chb.2020.106255
|
|
|
[28]
|
Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses
Electronics,
2020
DOI:10.3390/electronics9091460
|
|
|
[29]
|
Cybersecurity in Accounting Research
SSRN Electronic Journal ,
2019
DOI:10.2139/ssrn.3923245
|
|
|
[30]
|
A Social Economic Analysis of the Impact of GDPR on Security and Privacy Practices
2019 12th CMI Conference on Cybersecurity and Privacy (CMI),
2019
DOI:10.1109/CMI48017.2019.8962288
|
|
|
[31]
|
Advances in Computer Science for Engineering and Education
Advances in Intelligent Systems and Computing,
2019
DOI:10.1007/978-3-319-91008-6_66
|
|
|
[32]
|
Intelligent Systems in Cybernetics and Automation Control Theory
Advances in Intelligent Systems and Computing,
2019
DOI:10.1007/978-3-030-00184-1_13
|
|
|
[33]
|
Cybersecurity in accounting research
Managerial Auditing Journal,
2019
DOI:10.1108/MAJ-09-2018-2004
|
|
|
[34]
|
Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization
Mathematics,
2019
DOI:10.3390/math7070587
|
|
|
[35]
|
Robustness of Optimal Investment Decisions in Mixed Insurance/Investment Cyber Risk Management
Risk Analysis,
2019
DOI:10.1111/risa.13416
|
|
|
[36]
|
A multicriterial analysis of the efficiency of conservative information security systems
Eastern-European Journal of Enterprise Technologies,
2019
DOI:10.15587/1729-4061.2019.166349
|
|
|
[37]
|
Development of the model of the antagonistic agents behavior under a cyber conflict
Eastern-European Journal of Enterprise Technologies,
2019
DOI:10.15587/1729-4061.2019.175978
|
|
|
[38]
|
A Structural Model Approach for Assessing Information Security Value in Organizations
International Journal of Strategic Decision Sciences,
2018
DOI:10.4018/IJSDS.2018100104
|
|
|
[39]
|
Profit-Driven Corporate Social Responsibility as a Bayesian Real Option in Green Computing
Journal of Business Ethics,
2017
DOI:10.1007/s10551-017-3705-1
|
|
|
[40]
|
Calibration of the Gordon-Loeb Models for the Probability of Security Breaches
2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim),
2017
DOI:10.1109/UKSim.2017.18
|
|
|