Works matching IS 13873326 AND DT 2006 AND VI 8 AND IP 5
Results: 6
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 5, p. 350, doi. 10.1007/s10796-006-9012-5
- By:
- Publication type:
- Article
Reverse engineering relational databases to identify and specify basic Web services with respect to service oriented computing.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 5, p. 395, doi. 10.1007/s10796-006-9007-2
- By:
- Publication type:
- Article
Capturing and reusing knowledge in engineering change management: A case of automobile development.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 5, p. 375, doi. 10.1007/s10796-006-9009-0
- By:
- Publication type:
- Article
An experimental economics approach toward quantifying online privacy choices.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 5, p. 363, doi. 10.1007/s10796-006-9013-4
- By:
- Publication type:
- Article
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 5, p. 338, doi. 10.1007/s10796-006-9011-6
- By:
- Publication type:
- Article
Economic aspects of information security: An emerging field of research.
- Published in:
- 2006
- By:
- Publication type:
- Editorial