Author of the publication

Optimal Design of Information Technology Security Architecture.

, , and . ICIS, page 74. Association for Information Systems, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsourcing Information Security: Contracting Issues and Security Implications., , and . WEIS, (2010)Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation., , and . IEEE Trans. Engineering Management, 54 (1): 12-28 (2007)Competitive Bundling in Information Markets: A Seller-Side Analysis., and . MIS Q., 40 (1): 111-131 (2016)Membership-Based Free Shipping Programs: A New Vehicle to Gain Competitive Advantage for Online Retailers?, , and . ICIS, Association for Information Systems, (2018)Mobile Consumer Scanning Technology: A Replacement for Interorganizational Information Systems for Demand Information Learning in Supply Chains?, , , , and . Inf. Syst. Res., 32 (4): 1431-1449 (2021)A Space Mission to Map the Entire Observable Universe using the CMB as a Backlight, , , , , , , , , and 15 other author(s). (2019)cite arxiv:1909.01592Comment: Science White Paper submitted in response to the ESA Voyage 2050 call, 20 pages + title page + references.Cyber Insurance and IT Security Investment: Impact of Interdependence Risk., , and . WEIS, (2005)Security Standardization in the Presence of Unverifiable Control., , and . WEIS, (2011)Economics of User Segmentation, Profiling, and Detection in Security., , and . WEIS, (2007)Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches., and . ICIS, page 692-705. Association for Information Systems, (2003)