-
1Academic Journal
Authors: Tanriverdi, Hüseyin (AUTHOR) huseyin.tanriverdi@mccombs.utexas.edu, Juhee Kwon (AUTHOR) juhee.kwon@cityu.edu.hk, Ghiyoung Im (AUTHOR) ghiyoung.im@louisville.edu
Source: MIS Quarterly. Mar2025, Vol. 49 Issue 1, p243-273. 31p. 17 Charts.
Subject Terms: *Data analytics, *Enterprise software, *Information technology, Internet security, Multihospital systems, Hospital security measures
-
2Academic Journal
Authors: Schneier, Bruce (AUTHOR) schneier@schneier.com, Vance, Anthony (AUTHOR) anthony@vance.name
Source: MIS Quarterly. Mar2025, Vol. 49 Issue 1, p205-210. 6p.
Subject Terms: *Mergers & acquisitions, Internet security, Multihospital systems
-
3Periodical
Authors: Feng, Xuewei1 (AUTHOR) fengxw06@126.com, Li, Qi1 (AUTHOR) qli01@tsinghua.edu.cn, Sun, Kun2 (AUTHOR) ksun3@gmu.edu, Xu, Ke1 (AUTHOR) xuke@tsinghua.edu.cn, Wu, Jianping1 (AUTHOR) jianping@cernet.edu.cn
Source: Communications of the ACM. Mar2025, Vol. 68 Issue 3, p48-59. 12p.
Subject Terms: *TCP/IP, *Computer security vulnerabilities, *Computer network protocols, Internet security, Error messages (Computer science)
-
4Academic Journal
Authors: Durcikova, Alexandra1 alex@ou.edu, Miranda, Shaila M.2 SMiranda@walton.uark.edu, Jensen, Matthew L. rtw2n@virginia.edu, Wright, Ryan T.3 mjensen@ou.edu
Source: MIS Quarterly. Dec2024, Vol. 48 Issue 4, p1503-1536. 34p. 18 Color Photographs.
Subject Terms: *Associations, institutions, etc., *Information systems departments, Internet security, Self-efficacy
-
5Periodical
Authors: Zimmermann, Verena1 (AUTHOR) verena.zimmermann@gess.ethz.ch, Schöni, Lorin1 (AUTHOR) lorin.schoeni@gess.ethz.ch, Schaltegger, Thierry2 (AUTHOR) thierry.schaltegger@zhaw.ch, Ambuehl, Benjamin2 (AUTHOR) benjamin.ambuehl@zhaw.ch, Knieps, Melanie3 (AUTHOR) melanie.knieps@dsi.uzh.ch, Ebert, Nico2 (AUTHOR) nico.ebert@zhaw.ch
Source: Communications of the ACM. Nov2024, Vol. 67 Issue 11, p72-81. 10p.
Subject Terms: *Cyberterrorism, *Human error, *Human-computer interaction, Internet security, Motivation (Psychology)
-
6Periodical
Authors: Deumens, Erik1, deumens@ufl.edu, Ellis, Carolyn2, carolynellis@asu.edu
Source: Communications of the ACM; Jan2025, Vol. 68 Issue 1, p24-26, 3p
-
7
Source: Palo Alto Networks, Inc. MarketLine Company Profile. 2/14/2025, p1-55. 55p.
Subject Terms: *Automation, Internet security
Geographic Terms: Santa Clara (Calif.)
Company/Entity: Palo Alto Networks Inc.
-
8Academic Journal
Authors: Cram, W. Alec1 wacram@uwaterloo.ca, D'Arcy, John2 jdarcy@udel.edu, Benlian, Alexander3 benlian@ise.tu-darmstadt.de
Source: MIS Quarterly. Mar2024, Vol. 48 Issue 1, p95-136. 42p.
Subject Terms: *Behavioral research, Internet security, Neutralization theory, Human behavior
-
9
Source: Firstwave Cloud Technology Ltd. MarketLine Company Profile. 11/12/2024, p1-18. 18p.
Subject Terms: *Computer security, Internet security
Geographic Terms: South Wales
Company/Entity: Firstwave Cloud Technology Ltd.
-
10
Source: Gen Digital Inc. MarketLine Company Profile. 12/12/2024, p1-44. 44p.
Subject Terms: *Cyberterrorism, Internet security
Geographic Terms: Tempe (Ariz.)
Company/Entity: Gen Digital Inc.
-
11
Source: Palo Alto Networks, Inc. MarketLine Company Profile. 11/6/2024, p1-54. 54p.
Subject Terms: *Computer security, Internet security
Geographic Terms: Santa Clara (Calif.)
Company/Entity: Palo Alto Networks Inc.
-
12Periodical
Authors: Suhail, Sabah1 s.suhail@qub.ac.uk, Iqbal, Mubashar2 mubashar.iqbal@ut.ee, Jurdak, Raja3 r.jurdak@qut.edu.au
Source: Communications of the ACM. Jan2024, Vol. 67 Issue 1, p39-42. 4p.
Subject Terms: *Cyber physical systems, Digital twin, Internet security
-
13Periodical
Authors: KAUFLIN, JEFF
Source: Forbes. Feb/Mar2024, Vol. 207 Issue 1, p74-88. 9p. 2 Color Photographs, 1 Graph.
Subject Terms: *Insurance companies, *Effect of technological innovations on financial institutions, *Cyberterrorism, *Insurance premiums, Internet security
People: Iram, Rotem
-
14Academic Journal
Authors: Bana, Sarah H., sarah.bana@gmail.com, Brynjolfsson, Erik, erik.brynjolfsson@gmail.com, Wang Jin, jwangjin@stanford.edu, Steffen, Sebastian, sebastian.steffen88@gmail.com, Xiupeng Wang, xiupeng.j.wang@gmail.com
Source: MIS Quarterly; Mar2025, Vol. 49 Issue 1, p367-388, 22p, 16 Charts, 8 Graphs
-
15Academic Journal
Authors: Zhu, Yanfeng1 (AUTHOR), Li, Zheng2 (AUTHOR), Li, Tianyi1 (AUTHOR) litianyi@hlju.edu.cn, Jiang, Lei2 (AUTHOR)
Source: PLoS ONE. 2/21/2025, Vol. 20 Issue 2, p1-26. 26p.
Subject Terms: *PATH analysis (Statistics), *INTERNET security, *DYNAMIC models, *RESEARCH methodology, *COMPARATIVE studies
-
16Academic Journal
Authors: Cheimonidis, Pavlos1, k.rantos@cs.duth.grpcheimon@cs.duth.gr, Rantos, Konstantinos1
Source: Applied Sciences (2076-3417); Feb2025, Vol. 15 Issue 4, p2171, 28p
-
17Academic Journal
Authors: Jeong, Minki1, hoodit@seoultech.ac.kr, Park, Jongyoul1, jongyoul@seoultech.ac.kr, Oh, Sang Ho2, shoh0320@pknu.ac.kr
Source: Applied Sciences (2076-3417); Feb2025, Vol. 15 Issue 4, p2120, 14p
-
18Academic Journal
Authors: Zhong, Xiaofeng1,2, zhongxiaofeng17@nudt.edu.cn, Zhang, Yunlong1,2, liujingju17@nudt.edu.cnzhangyunlong@nudt.edu.cn, Liu, Jingju1,2
Source: Applied Sciences (2076-3417); Feb2025, Vol. 15 Issue 4, p2117, 15p
-
19Academic Journal
Authors: Hu, Jie1,2, hujie5@cetc.com.cn, Long, Lingchun3, 18873261035@126.com, Sui, He3, hsui@cauc.edu.cn, Gu, Zhaojun4, zjgu@cauc.edu.cn, Zheng, Guangming5, kaworu922@126.com
Source: Applied Sciences (2076-3417); Feb2025, Vol. 15 Issue 4, p1740, 21p
-
20Academic Journal
Authors: Sokol, Pavol1, pavol.sokol@upjs.sk, Bachňáková Rózenfeldová, Laura2, laura.rozenfeldova@upjs.sk
Source: EURASIP Journal on Information Security; 2/14/2025, Vol. 2025 Issue 1, p1-11, 11p