Shall we follow? Impact of reputation concern on information security managers’ investment decisions (English)
- New search for: Shao, Xiuyan
- Further information on Shao, Xiuyan:
- https://orcid.org/0000-0001-6550-9025
- New search for: Siponen, Mikko
- Further information on Siponen, Mikko:
- https://orcid.org/0000-0001-7041-1313
- New search for: Liu, Fufan
- New search for: Shao, Xiuyan
- New search for: Siponen, Mikko
- New search for: Liu, Fufan
In:
Computers and Security
;
97
;
2020
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Shall we follow? Impact of reputation concern on information security managers’ investment decisions
-
Contributors:
-
Published in:
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2020-07-13
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 97
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization modelsCompastié, Maxime / Badonnel, Rémi / Festor, Olivier / He, Ruan et al. | 2020
-
SoK: Machine vs. machine – A systematic classification of automated machine learning-based CAPTCHA solversDionysiou, Antreas / Athanasopoulos, Elias et al. | 2020
-
Privacy Preserving Face Recognition Utilizing Differential PrivacyChamikara, M.A.P. / Bertok, P. / Khalil, I. / Liu, D. / Camtepe, S. et al. | 2020
-
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contractsPatil, Akash Suresh / Hamza, Rafik / Hassan, Alzubair / Jiang, Nan / Yan, Hongyang / Li, Jin et al. | 2020
-
Shall we follow? Impact of reputation concern on information security managers’ investment decisionsShao, Xiuyan / Siponen, Mikko / Liu, Fufan et al. | 2020
-
Iris template protection using double bloom filter based feature transformationS, Ajish / AnilKumar, K S et al. | 2020
-
A systematic review of cyber-resilience assessment frameworksSepúlveda Estay, Daniel A. / Sahay, Rishikesh / Barfod, Michael B. / Jensen, Christian D. et al. | 2020
-
False data injection attacks and the insider threat in smart systemsGönen, Serkan / Sayan, H. Hüseyin / Yılmaz, Ercan Nurcan / Üstünsoy, Furkan / Karacayılmaz, Gökçe et al. | 2020
-
Time pressure in human cybersecurity behavior: Theoretical framework and countermeasuresChowdhury, Noman H. / Adam, Marc T.P. / Teubner, Timm et al. | 2020
-
Efficient determination of equivalence for encrypted dataDoctor, Jason N. / Vaidya, Jaideep / Jiang, Xiaoqian / Wang, Shuang / Schilling, Lisa M. / Ong, Toan / Matheny, Michael E. / Ohno-Machado, Lucila / Meeker, Daniella et al. | 2020
-
Towards a novel biometric system for forensic document examinationDhieb, Thameur / Njah, Sourour / Boubaker, Houcine / Ouarda, Wael / Ben Ayed, Mounir / Alimi, Adel M. et al. | 2020
-
A nonproprietary language for the command and control of cyber defenses – OpenC2Mavroeidis, Vasileios / Brule, Joe et al. | 2020
-
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioningKarbab, ElMouatez Billah / Debbabi, Mourad / Derhab, Abdelouahid / Mouheb, Djedjiga et al. | 2020
-
Latent groups of cybersecurity preparedness in Europe: Sociodemographic factors and country-level contextsLee, Claire Seungeun / Kim, Ji Hye et al. | 2020
-
Exploring HTTPS security inconsistencies: A cross-regional perspectiveAlashwali, Eman Salem / Szalachowski, Pawel / Martin, Andrew et al. | 2020
-
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processesZhou, Yuyang / Cheng, Guang / Jiang, Shanqing / Zhao, Yuyu / Chen, Zihan et al. | 2020
-
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learningAshrafuzzaman, Mohammad / Das, Saikat / Chakhchoukh, Yacine / Shiva, Sajjan / Sheldon, Frederick T. et al. | 2020
-
RansomSpector: An introspection-based approach to detect crypto ransomwareTang, Fei / Ma, Boyang / Li, Jinku / Zhang, Fengwei / Su, Jipeng / Ma, Jianfeng et al. | 2020
-
Multiclass malware classification via first- and second-order texture statisticsVerma, Vinita / Muttoo, Sunil K. / Singh, V. B. et al. | 2020
-
A secured TPM integration scheme towards smart embedded system based collaboration networkLu, Di / Han, Ruidong / Wang, Yue / Wang, Yongzhi / Dong, Xuewen / Ma, Xindi / Li, Teng / Ma, Jianfeng et al. | 2020
-
A two authorities electronic vote schemeLarriba, Antonio M. / Sempere, José M. / López, Damián et al. | 2020
-
An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizationsvan der Kleij, Rick / Wijn, Remco / Hof, Tineke et al. | 2020
-
A novel approach for detecting vulnerable IoT devices connected behind a home NATMeidan, Yair / Sachidananda, Vinay / Peng, Hongyi / Sagron, Racheli / Elovici, Yuval / Shabtai, Asaf et al. | 2020
-
SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanismJin, Dongzi / Lu, Yiqin / Qin, Jiancheng / Cheng, Zhe / Mao, Zhongshu et al. | 2020
-
A differential game method against attacks in heterogeneous honeynetRen, Jianguo / Zhang, Chunming et al. | 2020
-
UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devicesDas, Ayan Kumar / Kalam, Sidra / Sahar, Nausheen / Sinha, Ditipriya et al. | 2020
-
An anomaly detection framework for cyber-security dataEvangelou, Marina / Adams, Niall M. et al. | 2020
-
A rewriting system for the assessment of XACML policies relationshipMejri, Mohamed / Yahyaoui, Hamdi / Mourad, Azzam / Chehab, Mohamad et al. | 2020
-
Security-Driven hybrid collaborative recommendation method for cloud-based iot servicesMeng, Shunmei / Gao, Zijian / Li, Qianmu / Wang, Hao / Dai, Hong-Ning / Qi, Lianyong et al. | 2020
-
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner viewsYang, Runkai / Chang, Xiaolin / Mišić, Jelena / Mišić, Vojislav B. et al. | 2020
-
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A surveyShi, Shuyun / He, Debiao / Li, Li / Kumar, Neeraj / Khan, Muhammad Khurram / Choo, Kim-Kwang Raymond et al. | 2020
-
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)Kumar, Rakesh / Goyal, Rinkaj et al. | 2020
-
Mitigation measures of collusive interest flooding attacks in named data networkingWu, Zhijun / Feng, Wenzhi / Yue, Meng / Xu, Xinran / Liu, Liang et al. | 2020
-
Understanding the security of app-in-the-middle IoTLiu, Hui / Li, Juanru / Gu, Dawu et al. | 2020
-
Editorial Board| 2019
-
Passive- and not active-risk tendencies predict cyber security behaviorArend, Isabel / Shabtai, Asaf / Idan, Tali / Keinan, Ruty / Bereby-Meyer, Yoella et al. | 2020
-
Dynamic countermeasures selection for multi-path attacksLi, Fenghua / Li, Yongjun / Leng, Siyuan / Guo, Yunchuan / Geng, Kui / Wang, Zhen / Fang, Liang et al. | 2020
-
Coarse-to-fine two-stage semantic video carving approach in digital forensicsFang, Junbin / Xi, Guikai / Li, Rong / Chen, Qian / Lin, Puxi / Li, Sijin / Jiang, Zoe Lin / Yiu, Siu-Ming et al. | 2020
-
Authorship identification on limited samplingsBoran, Tudor / Martinaj, Muhamet / Hossain, Md Shafaeat et al. | 2020
-
Alerting about possible risks vs. blocking risky choices: A quantitative model and its empirical evaluationMeyer, Joachim / Dembinsky, Omer / Raviv, Tal et al. | 2020
-
Effects of planning and action control on smartphone security behaviorMi, Tianyue / Gou, Mengke / Zhou, Guangyu / Gan, Yiqun / Schwarzer, Ralf et al. | 2020
-
How do they find us? A study of geolocation tracking techniques of malicious web sitesMansoori, Masood / Welch, Ian et al. | 2020
-
Covert timing channel detection method based on time interval and payload length analysisHan, Jiaxuan / Huang, Cheng / Shi, Fan / Liu, Jiayong et al. | 2020
-
A distributed sensing data anomaly detection schemeYin, Chunyong / Li, Bo / Yin, Zhichao et al. | 2020
-
Attack plan recognition using hidden Markov and probabilistic inferenceLi, Tun / Liu, Yutian / Liu, Yanbing / Xiao, Yunpeng / Nguyen, Nang An et al. | 2020
-
New biostatistics features for detecting web bot activity on web applicationsRahman, Rizwan Ur / Tomar, Deepak Singh et al. | 2020
-
Lightweight privacy-Preserving data classificationTran, Ngoc Hong / Le-Khac, Nhien-An / Kechadi, M-Tahar et al. | 2020
-
A semi-automated forensic investigation model for online social networksArshad, Humaira / Omlara, Esther / Abiodun, Isaac Oludare / Aminu, Abdulhai et al. | 2020
-
Protecting sensitive place visits in privacy-preserving trajectory publishingWang, Nana / Kankanhalli, Mohan S et al. | 2020
-
An efficient and privacy-preserving truth discovery scheme in crowdsensing applicationsZhang, Chuan / Xu, Chang / Zhu, Liehuang / Li, Yanwei / Zhang, Can / Wu, Huishu et al. | 2020
-
Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listingSun, Qizhang / Willemsen, Martijn C. / Knijnenburg, Bart P. et al. | 2020
-
DO-RA: Data-oriented runtime attestation for IoT devicesKuang, Boyu / Fu, Anmin / Zhou, Lu / Susilo, Willy / Zhang, Yuqing et al. | 2020
-
Aggregation-based location privacy: An information theoretic approachZhang, Wenjing / Jiang, Bo / Li, Ming / Tandon, Ravi / Liu, Qiao / Li, Hui et al. | 2020
-
Building cyber security awareness in a developing country: Lessons from MyanmarChang, Lennon Y.C. / Coppel, Nicholas et al. | 2020
-
Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networksKrishnan, R. Santhana / Julie, E. Golden / Robinson, Y. Harold / Kumar, Raghvendra / Thong, Pham Huy / Son, Le Hoang et al. | 2020
-
Functionality-based mobile application recommendation system with security and privacy awarenessRocha, Thiago / Souto, Eduardo / El-Khatib, Khalil et al. | 2020
-
Gaslight revisited: Efficient and powerful fuzzing of digital forensics toolsParuchuri, Shravya / Case, Andrew / Richard, Golden G. III et al. | 2020