Zobrazeno 1 - 10
of 46
pro vyhledávání: '"Wade H. Baker"'
Publikováno v:
Journal of Cybersecurity. 6
Despite significant innovations in IT security products and research over the past 20 years, the information security field is still immature and struggling. Practitioners lack the ability to properly assess cyber risk, and decision-makers continue t
Publikováno v:
Decision Support Systems. 51:493-505
Security countermeasures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due to uncertainty, the financial impact of threats attacking assets is
Publikováno v:
Communication Research Reports. 24:327-339
Relationship management theory focuses on processes of shared goals and favorable outcomes for organizations and their publics. Relationship management theory also provides theoretical justification for research exploring the threat phishing poses to
Publikováno v:
Communications of the ACM. 50:101-106
Use measurable, reliable real-world metrics to improve information security decision making.
Publikováno v:
International Journal of Production Research. 45:2595-2613
Integration of information flows facilitated by advances in information technology (IT) has increased collaboration across supply chains. However, benefits of interconnectivity are not gained without risk, as IT has removed protective barriers around
Autor:
Linda G. Wallace, Wade H. Baker
Publikováno v:
IEEE Security and Privacy Magazine. 5:36-44
Over the past decade, organizations have sought to become more efficient and productive by adopting information and communication technologies. Organizations are consequently more aware of information security risks and the need to take appropriate a
Publikováno v:
Journal of Website Promotion. 2:89-113
This article reports results of a pre-test/post-test experimental analysis of anti-phishing website promotional effects on participant trust. Participants (n = 101) were randomly assigned to view varying levels (high, medium, low) of online promotion
Collaboration between supply chain partners, facilitated by integration of information flows, has created more efficient and effective networks. However, the benefits of interconnectivity are not gained without risk. Though essential to support colla
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::55389a8b08b844500cdb999583c8b918
https://doi.org/10.4018/978-1-59904-255-8.ch007
https://doi.org/10.4018/978-1-59904-255-8.ch007
Autor:
Wade H. Baker, Linda Wallace
Publikováno v:
IEEE Security & Privacy; Jan/Feb2007, Vol. 5 Issue 1, p36-44, 9p
Publikováno v:
International Journal of Electronic Marketing and Retailing. 3:145
Many medical organisations around the world have connected themselves in supply chains, and are exploring the strategic utilisation of information technology (IT) throughout their chains to improve their overall efficiency and effectiveness. Although