Author of the publication

Cybersecurity Risk Management Using Analytics: A Dynamic Capabilities Approach.

, , , and . ICIS, Association for Information Systems, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Utility of Research Articles for Teaching Information Security Management., , and . CoRR, (2016)Security Governance: Its Impact on Security Culture., , , and . AISM, page 47-58. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Guarding Against the Erosion of Competitive Advantage: A Knowledge Leakage Mitigation Model., , , and . ICIS, Association for Information Systems, (2015)Information Security Management in High Quality IS Journals: A Review and Research Agenda., and . CoRR, (2022)Towards Understanding Deterrence: Information Security Managers' Perspective., , , and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 21-37. Springer, (2011)Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: behavioural aspects and key controls., , , and . ACIS, page 8. (2019)Evaluating the Utility of Research Articles for Teaching Information Security Management., , and . ACIS, page 47. (2015)A Theory on Information Security., , and . ACIS, page 87. (2016)A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups., , and . ACIS, page 58. (2017)The Chief Information Security Officer and the Five Dimensions of a Strategist., , and . PACIS, page 77. (2017)