Author of the publication

When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination.

, , , and . Inf. Syst. Res., 22 (3): 606-623 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maintaining Diagnostic Knowledge-Based Systems: A Control-Theoretic Approach., , , and . Management Science, 55 (2): 294-310 (2009)A Privacy Preserving Framework for Big Data in E-Government., , and . PACIS, page 72. (2016)Do Hacker Forums Contribute to Security Attacks?, , and . WEB, volume 108 of Lecture Notes in Business Information Processing, page 143-152. Springer, (2011)Live-chat agent assignments to heterogeneous e-customers under imperfect classification., , , and . ACM Trans. Manag. Inf. Syst., 2 (4): 24:1-24:15 (2011)Transformative value of the Internet of Things and pricing decisions., and . Electron. Commer. Res. Appl., (2019)Integration of On-Premises and Cloud-Based Software: The Product Bundling Perspective., and . J. Assoc. Inf. Syst., 21 (6): 6 (2020)Agent-based Simulation Approach to Information Warfare in the SEAS Environment., , , and . HICSS, IEEE Computer Society, (2000)Network externalities, layered protection and IT security risk management., , , and . Decis. Support Syst., 44 (1): 1-16 (2007)The management of intrusion detection: Configuration, inspection, and investment., , and . Eur. J. Oper. Res., 195 (1): 186-204 (2009)The Reward Based Online Shopping Community., and . Electron. Mark., 10 (4): 224-228 (2000)