Big Data Analytics Adoption Factors in Improving Information Systems Security
暂无分享,去创建一个
[1] D. Gerwin,et al. Do's and Dont's of Computerized Manufacturing , 1982 .
[2] Michel Cukier,et al. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data , 2008, SAFECOMP.
[3] J. Meredith,et al. Justifying new manufacturing systems: a managerial approach , 1990 .
[4] Marco Casassa Mont,et al. Economic Methods and Decision Making by Security Professionals , 2011, WEIS.
[5] William K. Robertson,et al. Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks , 2013, ACSAC.
[6] Kenneth E. Stavinoha. Factors Influencing Adoption of Encryption to Secure Data in the Cloud , 2013, HCI.
[7] Joseph W. Weiss,et al. CIOs and IT professionals as change agents, risk and stakeholder managers: a field study , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[8] Harsh Kupwade Patil,et al. Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.
[9] Alexandros Labrinidis,et al. Challenges and Opportunities with Big Data , 2012, Proc. VLDB Endow..
[10] Domenico Cotroneo,et al. Automated root cause identification of security alerts: Evaluation in a SaaS Cloud , 2016, Future Gener. Comput. Syst..
[11] Thomas G. Gunn. The Mechanization of Design and Manufacturing. , 1982 .
[12] Robert G. Fichman,et al. International Conference on Information Systems ( ICIS ) 1992 INFORMATION TECHNOLOGY DIFFUSION : A REVIEW OF EMPIRICAL RESEARCH , 2017 .
[13] Bruno Bogaz Zarpelão,et al. An Empirical Study of Connections Between Measurements and Information Security , 2012, SECURWARE 2012.
[14] M. Eric Johnson,et al. Embedding Information Security into the Organization , 2007, IEEE Security & Privacy.
[15] Mahmoud Al-Dalahmeh,et al. Data Warehouse Success and Strategic Oriented Business Intelligence: A Theoretical Framework , 2013, ArXiv.
[16] Veda C. Storey,et al. Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..
[17] Paul Hawking. Factors critical to the success of business intelligence systems , 2013 .
[18] Raja Chiky,et al. A clustering approach for sampling data streams in sensor networks , 2012, 2010 IEEE International Conference on Data Mining.
[19] Balakrishnan Ramadoss,et al. Big data predictive analtyics for proactive semiconductor equipment maintenance , 2014, 2014 IEEE International Conference on Big Data (Big Data).
[20] M. Gordon,et al. PUBLICATION RECORDS AND TENURE DECISIONS IN THE FIELD OF STRATEGIC MANAGEMENT , 1996 .
[21] James B. Pick,et al. Technology factors in corporate adoption of mobile cell phones: a case study analysis , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[22] Wei Wang,et al. Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats , 2012 .
[23] Kevin C. Desouza,et al. Big Data Analytics: The Case of Social Security Administration , 2014, Inf. Polity.
[24] Colin Tankard,et al. Big data security , 2012, Netw. Secur..
[25] David R. Lease. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers , 2005 .
[26] M. Hancer,et al. Hotel and IT decision-maker characteristics and information technology adoption relationship in the hotel industry , 2014 .
[27] William Yeoh,et al. Critical Success Factors for Business Intelligence Systems , 2010, J. Comput. Inf. Syst..
[28] Ron Craig,et al. RECOGNITION AND USE OF AUTOMATION: A COMPARISON OF SMALL AND LARGE MANUFACTURERS , 1985 .
[29] Simon Shiu,et al. Decision support for systems security investment , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.
[30] J. Barney. Firm Resources and Sustained Competitive Advantage , 1991 .
[31] R. Grant. Toward a Knowledge-Based Theory of the Firm,” Strategic Management Journal (17), pp. , 1996 .
[32] Paul Fergus,et al. Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.
[33] Hepu Deng,et al. An Exploration of Data Center Information Systems , 2012, J. Syst. Inf. Technol..
[34] Adir Even,et al. THE ROLE OF PROCESS METADATA AND DATA QUALITY PERCEPTIONS IN DECISION MAKING: AN EMPIRICAL FRAMEWORK AND INVESTIGATION , 2006 .
[35] Atish P. Sinha,et al. An empirical investigation of the key determinants of data warehouse adoption , 2008, Decis. Support Syst..
[36] M. Eric Johnson,et al. Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm , 2005, WEIS.
[37] Richard V. McCarthy,et al. Resource-Based View of Knowledge Management for Competitive Advantage , 2005 .
[38] Manole Velicanu,et al. Perspectives on Big Data and Big Data Analytics , 2012 .