Big Data Analytics Adoption Factors in Improving Information Systems Security

[1]  D. Gerwin,et al.  Do's and Dont's of Computerized Manufacturing , 1982 .

[2]  Michel Cukier,et al.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data , 2008, SAFECOMP.

[3]  J. Meredith,et al.  Justifying new manufacturing systems: a managerial approach , 1990 .

[4]  Marco Casassa Mont,et al.  Economic Methods and Decision Making by Security Professionals , 2011, WEIS.

[5]  William K. Robertson,et al.  Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks , 2013, ACSAC.

[6]  Kenneth E. Stavinoha Factors Influencing Adoption of Encryption to Secure Data in the Cloud , 2013, HCI.

[7]  Joseph W. Weiss,et al.  CIOs and IT professionals as change agents, risk and stakeholder managers: a field study , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[8]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[9]  Alexandros Labrinidis,et al.  Challenges and Opportunities with Big Data , 2012, Proc. VLDB Endow..

[10]  Domenico Cotroneo,et al.  Automated root cause identification of security alerts: Evaluation in a SaaS Cloud , 2016, Future Gener. Comput. Syst..

[11]  Thomas G. Gunn The Mechanization of Design and Manufacturing. , 1982 .

[12]  Robert G. Fichman,et al.  International Conference on Information Systems ( ICIS ) 1992 INFORMATION TECHNOLOGY DIFFUSION : A REVIEW OF EMPIRICAL RESEARCH , 2017 .

[13]  Bruno Bogaz Zarpelão,et al.  An Empirical Study of Connections Between Measurements and Information Security , 2012, SECURWARE 2012.

[14]  M. Eric Johnson,et al.  Embedding Information Security into the Organization , 2007, IEEE Security & Privacy.

[15]  Mahmoud Al-Dalahmeh,et al.  Data Warehouse Success and Strategic Oriented Business Intelligence: A Theoretical Framework , 2013, ArXiv.

[16]  Veda C. Storey,et al.  Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..

[17]  Paul Hawking Factors critical to the success of business intelligence systems , 2013 .

[18]  Raja Chiky,et al.  A clustering approach for sampling data streams in sensor networks , 2012, 2010 IEEE International Conference on Data Mining.

[19]  Balakrishnan Ramadoss,et al.  Big data predictive analtyics for proactive semiconductor equipment maintenance , 2014, 2014 IEEE International Conference on Big Data (Big Data).

[20]  M. Gordon,et al.  PUBLICATION RECORDS AND TENURE DECISIONS IN THE FIELD OF STRATEGIC MANAGEMENT , 1996 .

[21]  James B. Pick,et al.  Technology factors in corporate adoption of mobile cell phones: a case study analysis , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[22]  Wei Wang,et al.  Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats , 2012 .

[23]  Kevin C. Desouza,et al.  Big Data Analytics: The Case of Social Security Administration , 2014, Inf. Polity.

[24]  Colin Tankard,et al.  Big data security , 2012, Netw. Secur..

[25]  David R. Lease Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers , 2005 .

[26]  M. Hancer,et al.  Hotel and IT decision-maker characteristics and information technology adoption relationship in the hotel industry , 2014 .

[27]  William Yeoh,et al.  Critical Success Factors for Business Intelligence Systems , 2010, J. Comput. Inf. Syst..

[28]  Ron Craig,et al.  RECOGNITION AND USE OF AUTOMATION: A COMPARISON OF SMALL AND LARGE MANUFACTURERS , 1985 .

[29]  Simon Shiu,et al.  Decision support for systems security investment , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.

[30]  J. Barney Firm Resources and Sustained Competitive Advantage , 1991 .

[31]  R. Grant Toward a Knowledge-Based Theory of the Firm,” Strategic Management Journal (17), pp. , 1996 .

[32]  Paul Fergus,et al.  Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[33]  Hepu Deng,et al.  An Exploration of Data Center Information Systems , 2012, J. Syst. Inf. Technol..

[34]  Adir Even,et al.  THE ROLE OF PROCESS METADATA AND DATA QUALITY PERCEPTIONS IN DECISION MAKING: AN EMPIRICAL FRAMEWORK AND INVESTIGATION , 2006 .

[35]  Atish P. Sinha,et al.  An empirical investigation of the key determinants of data warehouse adoption , 2008, Decis. Support Syst..

[36]  M. Eric Johnson,et al.  Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm , 2005, WEIS.

[37]  Richard V. McCarthy,et al.  Resource-Based View of Knowledge Management for Competitive Advantage , 2005 .

[38]  Manole Velicanu,et al.  Perspectives on Big Data and Big Data Analytics , 2012 .