Abdul Molok, N.N. ; Ahmad, A. ; Chang, S. A case analysis of securing organisations against information leakage through online social networking. 2018 Int. J. Inf. Manag.. 43 351-356
- Acquisti, A. ; Grossklags, J. Losses, gains, and hyperbolic discounting: an experimental approach to information security attitudes and behavior. 2003 En : 2nd Annual Workshop on Economics and Information Security-WEIS. :
Paper not yet in RePEc: Add citation now
- Adams, M. ; Makramalla, M. Cybersecurity Skills Training: an Attacker-Centric Gamified Approach, Technology Innovation Management Review. 2015 :
Paper not yet in RePEc: Add citation now
- Akinsanya, O.O. ; Papadaki, M. ; Sun, L. Towards a maturity model for health-care cloud security. 2019 ICS. 28 321-345
Paper not yet in RePEc: Add citation now
- Al-Matouq, H. ; Mahmood, S. ; Alshayeb, M. ; Niazi, M. A maturity model for secure software design: a multivocal study. 2020 IEEE Access. 8 215758-215776
Paper not yet in RePEc: Add citation now
- Aleroud, A. ; Abu-Shanab, E. ; Al-Aiad, A. ; Alshboul, Y. An examination of susceptibility to spear phishing cyber-attacks in non-English speaking communities. 2020 J. Inf. Secur. Appl.. 55 -
Paper not yet in RePEc: Add citation now
Amit, R. ; Schoemaker, P.J.H. Strategic assets and organizational rent: strategic Assets. 1993 Strat. Mgmt. J.. 14 33-46
- Barreto, I. Dynamic capabilities: a review of past research and an agenda for the future. 2010 J. Manag.. 36 256-280
Paper not yet in RePEc: Add citation now
- Barton, K.A. ; Tejay, G. ; Lane, M. ; Terrell, S. Information system security commitment: a study of external influences on senior management. 2016 Comput. Secur.. 59 9-25
Paper not yet in RePEc: Add citation now
Benz, M. ; Chatterjee, D. Calculated risk? A cybersecurity evaluation tool for SMEs. 2020 Bus. Horiz.. 63 531-540
- Beuran, R. ; Vykopal, J. ; Belajová, D. ; Čeleda, P. ; Tan, Y. ; Shinoda, Y. Capability assessment methodology and comparative analysis of cybersecurity training platforms. 2023 Comput. Secur.. 128 -
Paper not yet in RePEc: Add citation now
- Bitzer, M. ; Häckel, B. ; Leuthe, D. ; Ott, J. ; Stahl, B. ; Strobel, J. Managing the inevitable – a maturity model to establish incident response management capabilities. 2023 Comput. Secur.. 125 -
Paper not yet in RePEc: Add citation now
- Bowen, B.M. ; Devarajan, R. ; Stolfo, S. Measuring the human factor of cyber security. 2011 En : 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE: Waltham, MA, USA
Paper not yet in RePEc: Add citation now
- Bulgurcu, Cavusoglu Benbasat, information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. 2010 MIS Q.. 34 523-
Paper not yet in RePEc: Add citation now
- Burisch, R. ; Wohlgemuth, V. Blind spots of dynamic capabilities: a systems theoretic perspective. 2016 J. Innovation & Knowledge. 1 109-116
Paper not yet in RePEc: Add citation now
- Cain, A.A. ; Edwards, M.E. ; Still, J.D. An exploratory study of cyber hygiene behaviors and knowledge. 2018 J. Inf. Secur. Appl.. 42 36-45
Paper not yet in RePEc: Add citation now
- Catal, C. ; Ozcan, A. ; Donmez, E. ; Kasif, A. Analysis of cyber security knowledge gaps based on cyber security body of knowledge. 2023 Educ. Inf. Technol.. 28 1809-1831
Paper not yet in RePEc: Add citation now
- Catota, F.E. ; Granger Morgan, M. ; Sicker, D.C. Cybersecurity education in a developing nation: the Ecuadorian environment. 2019 Journal of Cybersecurity. 5 1-19
Paper not yet in RePEc: Add citation now
- Cavusoglu, H. ; Mishra, B. ; Raghunathan, S. The effect of internet security breach announcements on market value: capital market reactions for breached firms and internet security developers. 2004 Int. J. Electron. Commer.. 9 70-104
Paper not yet in RePEc: Add citation now
Chatterjee, S. ; Thekdi, S. An iterative learning and inference approach to managing dynamic cyber vulnerabilities of complex systems. 2020 Reliab. Eng. Syst. Saf.. 193 -
- Chellappa, R.K. ; Pavlou, P.A. Perceived information security, financial liability and consumer trust in electronic commerce transactions. 2002 Logistics Information Mngt.. 15 358-368
Paper not yet in RePEc: Add citation now
- CMMI Institute Introducing CMMI Security v2.0. 2019 :
Paper not yet in RePEc: Add citation now
- Côrte-Real, N. ; Ruivo, P. ; Oliveira, T. Leveraging internet of things and big data analytics initiatives in European and American firms: is data quality a way to extract business value?. 2020 Inf. Manag.. 57 -
Paper not yet in RePEc: Add citation now
- Crossler, R.E. ; Johnston, A.C. ; Lowry, P.B. ; Hu, Q. ; Warkentin, M. ; Baskerville, R. Future directions for behavioral information security research. 2013 Comput. Secur.. 32 90-101
Paper not yet in RePEc: Add citation now
D'Arcy, J. ; Adjerid, I. ; Angst, C.M. ; Glavas, A. Too good to be true: firm social performance and the risk of data breach. 2020 Inf. Syst. Res.. 31 1200-1223
- Daniel, C. ; Mullarkey, M. ; Agrawal, M. RQ labs: a cybersecurity workforce skills development framework. 2022 Inf. Syst. Front. -
Paper not yet in RePEc: Add citation now
Demek, K.C. ; Kaplan, S.E. Cybersecurity breaches and investors' interest in the firm as an investment. 2023 Int. J. Account. Inf. Syst.. 49 -
- Dhillon, G. ; Smith, K. ; Dissanayaka, I. Information systems security research agenda: exploring the gap between research and practice. 2021 J. Strat. Inf. Syst.. 30 -
Paper not yet in RePEc: Add citation now
- Dinkova, M. ; El-Dardiry, R. ; Overvest, B. Should firms invest more in cybersecurity?. 2023 Small Bus. Econ.. -
Paper not yet in RePEc: Add citation now
- Disparte, D. ; Furlow, C. The best cybersecurity investment you can make is better training. 2017 Harv. Bus. Rev.. 5 -
Paper not yet in RePEc: Add citation now
- Dong, T. ; Zhu, S. ; Oliveira, M. ; Robert, X.( ; Luo, Making better IS security investment decisions: discovering the cost of data breach announcements during the COVID-19 pandemic. 2023 IMDS. 123 630-652
Paper not yet in RePEc: Add citation now
Dukerich, J.M. ; Nichols, M.L. Causal information search in managerial decision making. 1991 Organ. Behav. Hum. Decis. Process.. 50 106-122
Eisenhardt, K.M. ; Martin, J.A. Dynamic capabilities: what are they?. 2000 Strat. Mgmt. J.. 21 1105-1121
- Ekelund, S. ; Iskoujina, Z. Cybersecurity economics – balancing operational security spending. 2019 ITP. 32 1318-1342
Paper not yet in RePEc: Add citation now
- Evans, J.S.B.T. Hypothetical Thinking: Dual Processes in Reasoning and Judgement. 2007 Psychology Press: Hove [England]
Paper not yet in RePEc: Add citation now
Fagade, T. ; Maraslis, K. ; Tryfonas, T. Towards effective cybersecurity resource allocation: the Monte Carlo predictive modelling approach. 2017 Int. J. Comput. Intell. Syst.. 13 152-
- Fernandez De Arroyabe, I. ; Arranz, C.F.A. ; Arroyabe, M.F. ; Fernandez De Arroyabe, J.C. Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: a UK survey for 2018 and 2019. 2023 Comput. Secur.. 124 -
Paper not yet in RePEc: Add citation now
Fisher, C.W. ; Chengalur-Smith, I. ; Ballou, D.P. The impact of experience and time on the use of data quality information in decision making. 2003 Inf. Syst. Res.. 14 170-188
- Fleischman, G.M. ; Valentine, S.R. ; Curtis, M.B. ; Mohapatra, P.S. The influence of ethical beliefs and attitudes, norms, and prior outcomes on cybersecurity investment decisions. 2023 Bus. Soc.. 62 488-529
Paper not yet in RePEc: Add citation now
- Ghobakhloo, M. ; Fathi, M. Corporate survival in Industry 4.0 era: the enabling role of lean-digitized manufacturing. 2019 JMTM. 31 1-30
Paper not yet in RePEc: Add citation now
- Goode, S. ; Lacey, D. Exploiting organisational vulnerabilities as dark knowledge: conceptual development from organisational fraud cases. 2021 JKM. -
Paper not yet in RePEc: Add citation now
- Gupta, R. ; Biswas, B. ; Biswas, I. ; Sana, S.S. Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach. 2021 ICS. 29 73-104
Paper not yet in RePEc: Add citation now
- Helfat, C.E. ; Finkelstein, S. ; Mitchell, W. ; Peteraf, M. ; Singh, H. ; Teece, D. ; Winter, S.G. Dynamic Capabilities: Understanding Strategic Change in Organizations. 2009 John Wiley & Sons.: Oxford, UK
Paper not yet in RePEc: Add citation now
Hsu, C. ; Lee, J.-N. ; Straub, D.W. Institutional influences on information systems security innovations. 2012 Inf. Syst. Res.. 23 918-939
- Humayun, M. ; Jhanjhi, N. ; Fahhad Almufareh, M. ; Ibrahim Khalil, M. Security threat and vulnerability assessment and measurement in secure software development. 2022 Comput. Mater. Continua (CMC). 71 5039-5059
Paper not yet in RePEc: Add citation now
- Hwang, M.I. ; Helser, S. Cybersecurity educational games: a theoretical framework. 2022 ICS. 30 225-242
Paper not yet in RePEc: Add citation now
- IBM Security Cost of a Data Breach Report 2023. 2023 IBM Security: Armonk, NY
Paper not yet in RePEc: Add citation now
- Jalali, M.S. How individuals weigh their previous estimates to make a new estimate in the presence or absence of social influence. 2014 En : Kennedy, W.G. ; Agarwal, N. ; Yang, S.J. Social Computing, Behavioral-Cultural Modeling and Prediction. Springer International Publishing: Cham
Paper not yet in RePEc: Add citation now
- Jalali, M.S. ; Ashouri, A. ; Herrera-Restrepo, O. ; Zhang, H. Information diffusion through social networks: the case of an online petition. 2016 Expert Syst. Appl.. 44 187-197
Paper not yet in RePEc: Add citation now
- Jalali, M.S. ; Kaiser, J.P. Cybersecurity in hospitals: a systematic, organizational perspective. 2018 J. Med. Internet Res.. 20 -
Paper not yet in RePEc: Add citation now
- Jalali, M.S. ; Siegel, M. ; Madnick, S. Decision-making and biases in cybersecurity capability development: evidence from a simulation game experiment. 2019 J. Strat. Inf. Syst.. 28 66-82
Paper not yet in RePEc: Add citation now
- Kabanda, S. ; Tanner, M. ; Kent, C. Exploring SME cybersecurity practices in developing countries. 2018 J. Organ. Comput. Electron. Commer.. 28 269-282
Paper not yet in RePEc: Add citation now
- Kalderemidis, I. ; Farao, A. ; Bountakas, P. ; Panda, S. ; Xenakis, C. GTM: game Theoretic Methodology for optimal cybersecurity defending strategies and investments. 2022 En : Proceedings of the 17th International Conference on Availability, Reliability and Security. ACM: Vienna Austria
Paper not yet in RePEc: Add citation now
Kapoor, A. ; Gupta, A. ; Gupta, R. ; Tanwar, S. ; Sharma, G. ; Davidson, I.E. Ransomware detection, avoidance, and mitigation scheme: a review and future directions. 2021 Sustainability. 14 8-
- Karagiannis, S. ; Magkos, E. Adapting CTF challenges into virtual cybersecurity learning environments. 2021 ICS. 29 105-132
Paper not yet in RePEc: Add citation now
- Khalid Khan, S. ; Shiwakoti, N. ; Stasinopoulos, P. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles. 2022 Accid. Anal. Prev.. 165 -
Paper not yet in RePEc: Add citation now
- Kour, R. ; Karim, R. Cybersecurity workforce in railway: its maturity and awareness. 2020 J. Qual. Mainten. Eng.. 27 453-464
Paper not yet in RePEc: Add citation now
- Kwon, J. ; Johnson, M.E. Proactive versus reactive security investments in the healthcare sector. 2014 MIS Q.. 38 -
Paper not yet in RePEc: Add citation now
- Laaksonen, O. ; Peltoniemi, M. The essence of dynamic capabilities and their measurement: essence of dynamic capabilities. 2018 Int. J. Manag. Rev.. 20 184-205
Paper not yet in RePEc: Add citation now
- Madnick, S. ; Jalali, M.S. ; Siegel, M. ; Lee, Y. ; Strong, D. ; Wang, R. ; Ang, W.H. ; Deng, V. ; Mistree, D. Measuring stakeholders' perceptions of cybersecurity for renewable energy systems. 2017 En : Woon, W.L. ; Aung, Z. ; Kramer, O. ; Madnick, S. Data Analytics for Renewable Energy Integration. Springer International Publishing: Cham
Paper not yet in RePEc: Add citation now
- Master, A. ; Hamilton, G. ; Dietz, J.E. Optimizing cybersecurity budgets with AttackSimulation. 2022 En : 2022 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE: Boston, MA, USA
Paper not yet in RePEc: Add citation now
- McClain, J. ; Silva, A. ; Emmanuel, G. ; Anderson, B. ; Nauer, K. ; Abbott, R. ; Forsythe, C. Human performance factors in cyber security forensic analysis. 2015 Procedia Manuf.. 3 5301-5307
Paper not yet in RePEc: Add citation now
- McFarland, L. ; Milstein, B. ; Hirsch, G. ; Homer, J. ; Andersen, D. ; Irving, R. ; Reineke, E. ; Niles, R.D. ; Cawvey, E. ; Desai, A. ; MacDonald, R. NASPAA student simulation competition: reforming the U.S. Health care system within a simulated environment. 2016 J. Publ. Aff. Educ.. 22 363-380
Paper not yet in RePEc: Add citation now
- Meland, P.H. ; Bernsmed, K. ; Frøystad, C. ; Li, J. ; Sindre, G. An experimental evaluation of bow-tie analysis for security. 2019 ICS. 27 536-561
Paper not yet in RePEc: Add citation now
- Mingers, J. ; Standing, C. A framework for validating information systems research based on a pluralist account of truth and correctness. 2020 JAIS. 117-151
Paper not yet in RePEc: Add citation now
- Morellato, L.P.C. ; Alberti, L.F. ; Hudson, I.L. Applications of circular statistics in plant phenology: a case studies approach. 2010 En : Phenological Research. Springer Netherlands: Dordrecht
Paper not yet in RePEc: Add citation now
Naseer, A. ; Naseer, H. ; Ahmad, A. ; Maynard, S.B. ; Masood Siddiqui, A. Real-time analytics, incident response process agility and enterprise cybersecurity performance: a contingent resource-based analysis. 2021 Int. J. Inf. Manag.. 59 -
- Naseer, H. ; Maynard, S.B. ; Desouza, K.C. Demystifying analytical information processing capability: the case of cybersecurity incident response. 2021 Decis. Support Syst.. 143 -
Paper not yet in RePEc: Add citation now
- OliveiraJr, E. ; Zorzo, A.F. ; Neu, C.V. Towards a conceptual model for promoting digital forensics experiments. 2020 Forensic Sci. Int.: Digit. Invest.. 35 -
Paper not yet in RePEc: Add citation now
Paese, P.W. ; Sniezek, J.A. Influences on the appropriateness of confidence in judgment: practice, effort, information, and decision-making. 1991 Organ. Behav. Hum. Decis. Process.. 48 100-130
- Pentland, S.J. ; Twyman, N.W. ; Burgoon, J.K. ; Nunamaker, J.F. ; Diller, C.B.R. A video-based screening system for automated risk assessment using nuanced facial features. 2017 J. Manag. Inf. Syst.. 34 970-993
Paper not yet in RePEc: Add citation now
- Piccoli, Ives Review: IT-dependent strategic initiatives and sustained competitive advantage: a review and synthesis of the literature. 2005 MIS Q.. 29 747-
Paper not yet in RePEc: Add citation now
- Pigola, A. Enhancing Capabilities Development in Cybersecurity: Evidence from an Experiment. 2023 Harvard Dataverse:
Paper not yet in RePEc: Add citation now
Rahmandad, H. Impact of growth opportunities and competition on firm-level capability development trade-offs. 2012 Organ. Sci.. 23 138-154
- Rahmandad, H. ; Weiss, D.M. Dynamics of concurrent software development: H. Rahmandada and D. M. Weiss: dynamics of concurrent software development. 2009 Syst. Dynam. Rev.. 25 224-249
Paper not yet in RePEc: Add citation now
Robinson, S. Conceptual modelling for simulation Part I: definition and requirements. 2008 J. Oper. Res. Soc.. 59 278-290
- Sangari, S. ; Dallal, E. ; Whitman, M. Modeling reporting delays in cyber incidents: an industry-level comparison. 2023 Int. J. Inf. Secur.. 22 63-76
Paper not yet in RePEc: Add citation now
- Sewak, M. ; Sahay, S.K. ; Rathore, H. Deep reinforcement learning in the advanced cybersecurity threat detection and protection. 2022 Inf. Syst. Front. -
Paper not yet in RePEc: Add citation now
- Shaikh, F.A. ; Siponen, M. Organizational learning from cybersecurity performance: effects on cybersecurity investment decisions. 2023 Inf. Syst. Front. -
Paper not yet in RePEc: Add citation now
- Sharma, K. ; Zhan, X. ; Nah, F.F.-H. ; Siau, K. ; Cheng, M.X. Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity. 2021 OCJ. 1 69-91
Paper not yet in RePEc: Add citation now
- Shreeve, B. ; Gralha, C. ; Rashid, A. ; Araújo, J. ; Goulão, M. Making sense of the unknown: how managers make cyber security decisions. 2023 ACM Trans. Software Eng. Methodol.. 32 1-33
Paper not yet in RePEc: Add citation now
- Smith, K.G. ; Grimm, C.M. ; Gannon, M.J. ; Chen, M.-J. Organizational information processing, competitive responses, and performance in the U.S. Domestic airline industry. 1991 Acad. Manag. J.. 34 60-85
Paper not yet in RePEc: Add citation now
- Steininger, D.M. ; Mikalef, P. ; Pateli, A. ; Ortiz-de-Guinea, A. Dynamic capabilities in information systems research: a critical review, synthesis of current knowledge, and recommendations for future research. 2022 JAIS. 22 447-490
Paper not yet in RePEc: Add citation now
- Steinmetz, K.F. Craft(y)ness: an ethnographic study of hacking. 2015 CRIMIN. 55 125-145
Paper not yet in RePEc: Add citation now
- Sterman, J.D. System dynamics modeling: tools for learning in a complex world. 2001 Calif. Manag. Rev.. 43 8-25
Paper not yet in RePEc: Add citation now
- Sterman, J.D. ; Franck, T. ; Fiddaman, T. ; Jones, A. ; McCauley, S. ; Rice, P. ; Sawin, E. ; Siegel, L. ; Rooney-Varga, J.N. World climate: a role-play simulation of climate negotiations. 2015 Simulat. Gaming. 46 348-382
Paper not yet in RePEc: Add citation now
- Sull, D.N. ; Eisenhardt, K.M. Simple Rules: How to Thrive in a Complex World. 2015 John Murray: London
Paper not yet in RePEc: Add citation now
- Tanwar, S. ; Vora, J. ; Tyagi, S. ; Kumar, N. ; Obaidat, M.S. A systematic review on security issues in vehicular ad hoc network. 2018 Security and Privacy. 1 e39-
Paper not yet in RePEc: Add citation now
Teece, D.J. Explicating dynamic capabilities: the nature and microfoundations of (sustainable) enterprise performance. 2007 Strat. Mgmt. J.. 28 1319-1350
Teece, D.J. ; Pisano, G. ; Shuen, A. Dynamic capabilities and strategic management. 1997 Strat. Mgmt. J.. 18 509-533
- Torres, R. ; Sidorova, A. ; Jones, M.C. Enabling firm performance through business intelligence and analytics: a dynamic capabilities perspective. 2018 Inf. Manag.. 55 822-839
Paper not yet in RePEc: Add citation now
- Van Der Kleij, R. ; Schraagen, J.M. ; Cadet, B. ; Young, H. Developing decision support for cybersecurity threat and incident managers. 2022 Comput. Secur.. 113 -
Paper not yet in RePEc: Add citation now
- Wade, Hulland Review: the resource-based view and information systems research: review, extension, and suggestions for future research. 2004 MIS Q.. 28 107-
Paper not yet in RePEc: Add citation now
- Wang, J. ; Gupta, M. ; Rao, H.R. Insider threats in a financial institution. 2015 MIS Q.. 39 91-112
Paper not yet in RePEc: Add citation now
- Wessels, M. ; Van Den Brink, P. ; Verburgh, T. ; Cadet, B. ; Van Ruijven, T. Understanding incentives for cybersecurity investments: development and application of a typology. 2021 Digital Business. 1 -
Paper not yet in RePEc: Add citation now
- Willison, R. ; Warkentin, M. Beyond deterrence: an expanded view of employee computer abuse. 2013 MIS Q.. 1-20
Paper not yet in RePEc: Add citation now
Workman, M. Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. 2008 J. Am. Soc. Inf. Sci.. 59 662-674
Xu, F. ; Robert, X.( ; Luo, ; Zhang, H. ; Liu, S. Do strategy and timing in IT security investments matter? An empirical investigation of the alignment effect. 2019 Inf. Syst. Front. 21 1069-1083
- Xu, L. ; Li, Y. ; Lin, Y. ; Tang, C. ; Yao, Q. Supply chain cybersecurity investments with interdependent risks under different information exchange modes. 2023 Int. J. Prod. Res.. 1-26
Paper not yet in RePEc: Add citation now
- Yamagishi, T. ; Yamagishi, M. Trust and commitment in the United States and Japan. 1994 Motiv. Emot.. 18 129-166
Paper not yet in RePEc: Add citation now
- Yang, A. ; Kwon, Y.J. ; Lee, S.-Y.T. The impact of information sharing legislation on cybersecurity industry. 2020 IMDS. 120 1777-1794
Paper not yet in RePEc: Add citation now
Yang, M.M. ; Jiang, H. ; Gary, M.S. Challenging learning goals improve performance in dynamically complex microworld simulations. 2016 Syst. Dynam. Rev.. 32 204-232
- Zacharis, A. ; Patsakis, C. AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition. 2023 Int. J. Inf. Secur.. 22 1333-1354
Paper not yet in RePEc: Add citation now
Zahra, S.A. ; Sapienza, H.J. ; Davidsson, P. Entrepreneurship and dynamic capabilities: a review, model and research agenda. 2006 J. Manag. Stud.. 43 917-955
- Zhang, L. ; Zhu, J. ; Liu, Q. A meta-analysis of mobile commerce adoption and the moderating effect of culture. 2012 Comput. Hum. Behav.. 28 1902-1911
Paper not yet in RePEc: Add citation now
Zollo, M. ; Winter, S.G. Deliberate learning and the evolution of dynamic capabilities. 2002 Organ. Sci.. 13 339-351
- Zwilling, M. ; Klien, G. ; Lesjak, D. ; Wiechetek, Ł. ; Cetin, F. ; Basim, H.N. Cyber security awareness, knowledge and behavior: a comparative study. 2022 J. Comput. Inf. Syst.. 62 82-97
Paper not yet in RePEc: Add citation now