Knowledge absorption for cyber-security: The role of human beliefs
暂无分享,去创建一个
[1] Andrew C. Simpson,et al. Cyber Threat Information Sharing: Perceived Benefits and Barriers , 2019, ARES.
[2] Alain Mermoud,et al. To share or not to share: a behavioral perspective on human participation in security information sharing , 2019, J. Cybersecur..
[3] Melissa A. Schilling. Strategic management of technological innovation 6th Ed. , 2019 .
[4] Lawrence A. Gordon,et al. Cybersecurity insurance and risk-sharing , 2018, Journal of Accounting and Public Policy.
[5] Ali E. Abdallah,et al. A Novel Trust Taxonomy for Shared Cyber Threat Intelligence , 2018, Secur. Commun. Networks.
[6] James X. Dempsey,et al. Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs , 2018, ArXiv.
[7] Wiem Tounsi,et al. A survey on technical threat intelligence in the age of sophisticated cyber attacks , 2018, Comput. Secur..
[8] Behrouz Tork Ladani,et al. Information sharing vs. privacy: A game theoretic analysis , 2017, Expert Syst. Appl..
[9] Rainer Böhme,et al. Strategic Aspects of Cyber Risk Information Sharing , 2017, ACM Comput. Surv..
[10] Seref Sagiroglu,et al. Big data analytics for network anomaly detection from netflow data , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).
[11] Pedro Casas,et al. Network security and anomaly detection with Big-DAMA, a big data analytics framework , 2017, 2017 IEEE 6th International Conference on Cloud Networking (CloudNet).
[12] A. Salter,et al. Making a marriage of materials: The role of gatekeepers and shepherds in the absorption of external knowledge and innovation performance , 2017 .
[13] Sachin Shetty,et al. Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance , 2017, GAMENETS.
[14] Jens Grossklags,et al. Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs , 2016, J. Cybersecur..
[15] Elkin Olaguer Pérez Sánchez,et al. Measurement of potential absorption capacity in Colombia's innovative companies , 2017 .
[16] Baojiang Cui,et al. Anomaly Detection Model Based on Hadoop Platform and Weka Interface , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
[17] Han Zhang,et al. Knowledge sharing in online health communities: A social exchange theory perspective , 2016, Inf. Manag..
[18] Florian Skopik,et al. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..
[19] Rossouw von Solms,et al. An information security knowledge sharing model in organizations , 2016, Comput. Hum. Behav..
[20] Lawrence A. Gordon,et al. Investing in Cybersecurity: Insights from the Gordon-Loeb Model , 2016 .
[21] Robert M. Davison,et al. Using interactive systems for knowledge sharing: The impact of individual contextual preferences in China , 2016, Inf. Manag..
[22] Kee-Young Kwahk,et al. The effects of network sharing on knowledge-sharing activities and job performance in enterprise social media environments , 2016, Comput. Hum. Behav..
[23] Vidal Díaz de Rada Igúzquiza,et al. Internet, Phone, Mail and Mixed-Mode Surveys: The Tailored Design Method. Don A. Dillman, Jolene D. Smyth y Leah Melani Christian. (New Jersey, John Wiley and Sons, 2014) , 2016 .
[24] Parinaz Naghizadeh Ardabili,et al. Inter-temporal incentives in security information sharing agreements , 2016, 2016 Information Theory and Applications Workshop (ITA).
[25] Saad Y. Sait,et al. Multi-level anomaly detection: Relevance of big data analytics in networks , 2015, Sadhana.
[26] Cleotilde Gonzalez,et al. Effects of cyber security knowledge on attack detection , 2015, Comput. Hum. Behav..
[27] Eric A. M. Luiijf,et al. On the Sharing of Cyber Security Information , 2015, Critical Infrastructure Protection.
[28] Frank Fransen,et al. Cyber security information exchange to gain insight into the effects of cyber threats and incidents , 2015, Elektrotech. Informationstechnik.
[29] Lei Zhou,et al. Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model , 2015 .
[30] Fabio Bisogni,et al. Data Breaches and the Dilemmas in Notifying Customers , 2015, WEIS.
[31] Wei-Tsong Wang,et al. Motivations of employees' knowledge sharing behaviors: A self-determination perspective , 2015, Inf. Organ..
[32] Jay Lee,et al. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .
[33] N. E. Weiss. Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis [December 11, 2014] , 2014 .
[34] Jing Liu,et al. A Network Gene-Based Framework for Detecting Advanced Persistent Threats , 2014, 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[35] Myriam Dunn Cavelty. Cybersecurity in Switzerland , 2014, SpringerBriefs in Cybersecurity.
[36] Frank T. Piller,et al. Opening the Black Box of “Not Invented Here”: Attitudes, Decision Biases, and Behavioral Consequences , 2014 .
[37] Chris Hankin,et al. Game Theory Meets Information Security Management , 2014, SEC.
[38] Vala Ali Rohani,et al. Evaluation model for knowledge sharing in information security professional virtual community , 2014, Comput. Secur..
[39] Malcolm Robert Pattinson,et al. Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..
[40] Tariq Mahmood,et al. Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[41] Alvaro A. Cárdenas,et al. Big Data Analytics for Security , 2013, IEEE Security & Privacy.
[42] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[43] Shih-Ming Pi,et al. A study of Facebook Groups members' knowledge sharing , 2013, Comput. Hum. Behav..
[44] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[45] Stefan Fenz,et al. Toward web-based information security knowledge sharing , 2013, Inf. Secur. Tech. Rep..
[46] M. Goh,et al. Knowledge sharing in collaborative supply chains: twin effects of trust and power , 2013 .
[47] M. Nene,et al. A Survey on Machine Learning Techniques for Intrusion Detection Systems , 2013 .
[48] Nipun Bansal,et al. Peer to Peer Networking and Applications , 2013 .
[49] Veda C. Storey,et al. Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..
[50] Nathan L. Clarke,et al. Power to the people? The evolving recognition of human aspects of security , 2012, Comput. Secur..
[51] Sarah Brown,et al. Conceptual framework for cyber defense information sharing within trust relationships , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[52] Peter S. Fader,et al. Introduction to the Special Issue on the Emergence and Impact of User-Generated Content , 2012, Mark. Sci..
[53] Chei Sian Lee,et al. News sharing in social media: The effect of gratifications and prior experience , 2012, Comput. Hum. Behav..
[54] Gerald C. Kane,et al. Network Characteristics and the Value of Collaborative User-Generated Content , 2011, Mark. Sci..
[55] T. Pedersen,et al. Why a Central Network Position Isn't Enough: The Role of Motivation and Ability for Knowledge Sharing in Employee Networks , 2011 .
[56] Annette Hofmann,et al. Interdependent risk networks: the threat of cyber attack , 2011 .
[57] Gabriel Jakobson,et al. Mission cyber security situation assessment using impact dependency graphs , 2011, 14th International Conference on Information Fusion.
[58] N. Foss,et al. Managing Joint Production Motivation: The Role of Goal Framing and Governance Mechanisms , 2011 .
[59] Joon Koh,et al. An Integrative Model for Knowledge Sharing in Communities-of-Practice , 2011, J. Knowl. Manag..
[60] Tyler Moore,et al. The Impact of Public Information on Phishing Attack and Defense , 2011 .
[61] B. Park. Knowledge transfer capacity of multinational enterprises and technology acquisition in international joint ventures , 2011 .
[62] Jiahai Yang,et al. A study on key strategies in P2P file sharing systems and ISPs’ P2P traffic management , 2011, Peer-to-Peer Netw. Appl..
[63] Amitai Etzioni. Cybersecurity in the Private Sector , 2011 .
[64] Hsin Hsin Chang,et al. Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator , 2011, Inf. Manag..
[65] César Camisón,et al. Knowledge absorptive capacity: New insights for its conceptualization and measurement☆ , 2010 .
[66] R. Noe,et al. Knowledge sharing: A review and directions for future research , 2010 .
[67] Dipankar Dasgupta,et al. Game theory for cyber security , 2010, CSIIRW '10.
[68] Colin Camerer,et al. Neural evidence for inequality-averse social preferences , 2010, Nature.
[69] Tyler Moore,et al. The Phish-Market Protocol: Securely Sharing Attack Data between Competitors , 2010, Financial Cryptography.
[70] Johannes M. Bauer,et al. Cybersecurity: Stakeholder incentives, externalities, and policy options , 2009 .
[71] Z. Zhao,et al. A multilevel perspective on knowledge transfer: evidence from the Chinese automotive industry , 2009 .
[72] Ross J. Anderson,et al. Security Economics and Critical National Infrastructure , 2009, WEIS.
[73] W. S. Chow,et al. Social network, social trust and shared goals in organizational knowledge sharing , 2008, Inf. Manag..
[74] Kevin W. Hamlen,et al. Flow-based identification of botnet traffic by mining multiple log files , 2008, 2008 First International Conference on Distributed Framework and Applications.
[75] Huseyin Cavusoglu,et al. Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment , 2008, J. Manag. Inf. Syst..
[76] Bruce Tether,et al. Beyond industry–university links: Sourcing knowledge for innovation from consultants, private research organisations and the public science-base , 2008 .
[77] D. Collard,et al. Handbook of the Economics of Giving, Altruism and Reciprocity. Volume 1, Foundations: Volume 2, Applications, Handbooks in Economics, Serge-Christophe Kolm and Jean Mercier Ythier (eds). North Holland, 2006, xxv, xxii + 1588 pages , 2008, Economics and Philosophy.
[78] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[79] Anthony J. Nyberg,et al. Keeping Your Headcount When All About You Are Losing Theirs: Downsizing, Voluntary Turnover Rates, and The Moderating Role of HR Practices , 2008 .
[80] K. Hausken. Information sharing among firms and cyber attacks , 2007 .
[81] Chih-Chiang Chen,et al. Knowledge sharing, absorptive capacity, and innovation capability: an empirical study of Taiwan's knowledge-intensive industries , 2007, J. Inf. Sci..
[82] Ulrich Lichtenthaler,et al. Developing reputation to overcome the imperfections in the markets for knowledge , 2007 .
[83] Xianggui Qu,et al. Multivariate Data Analysis , 2007, Technometrics.
[84] Morten T. Hansen,et al. Knowledge Transfer in Intraorganizational Networks : Effects of Network Position and Absorptive Capacity on Business Unit Innovation and Performance , 2007 .
[85] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[86] William J. Kettinger,et al. An Evolutionary Information-Processing Theory of Knowledge Creation , 2006, J. Assoc. Inf. Syst..
[87] Ulrich Lichtenthaler,et al. Attitudes to Externally Organising Knowledge Management Tasks: A Review, Reconsideration and Extension of the NIH Syndrome , 2006 .
[88] David I. Laibson,et al. Costly Information Acquisition: Experimental Analysis of a Boundedly Rational Model , 2006 .
[89] Serge-Christophe Kolm,et al. Handbook of the Economics of Giving, Altruism and Reciprocity , 2006 .
[90] Tobias Schmidt,et al. Absorptive Capacity: One Size Fits All? Firm-level Analysis of Absorptive Capacity for Different Kinds of Knowledge , 2005 .
[91] Giovanni Peri,et al. Determinants of Knowledge Flows and Their Effect on Innovation , 2005, Review of Economics and Statistics.
[92] Anindya Ghose,et al. The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..
[93] James B. Rebitzer,et al. The Sociology of Groups and the Economics of Incentives: Theory and Evidence on Compensation Systems , 1997, SSRN Electronic Journal.
[94] Jack A. Nickerson,et al. A Knowledge-based Theory of the Firm - A Problem-solving Perspective , 2004, Organ. Sci..
[95] Dario Forte. The “Art” of log correlation , 2004 .
[96] Dario Forte. Log correlation: Part 2 , 2004 .
[97] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[98] Melissa A. Schilling. Strategic Management of Technological Innovation , 2004 .
[99] Dario Forte. The “ART” of log correlation: part 1 , 2004 .
[100] Lawrence A. Gordon,et al. Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .
[101] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[102] S. Brosnan,et al. Monkeys reject unequal pay , 2003, Nature.
[103] H. Scarbrough. Knowledge management, HRM and the innovation process , 2003 .
[104] Stephen J. Redding,et al. R&D and Absorptive Capacity: Theory and Empirical Evidence* , 2003 .
[105] H. Kunreuther,et al. Interdependent Security , 2003 .
[106] Peter W. Liesch,et al. Information internalisation in internationalising the firm , 2002 .
[107] Ulrich Flegel. Pseudonymizing Unix Log Files , 2002, InfraSec.
[108] K. M. Bartol,et al. Encouraging Knowledge Sharing: The Role of Organizational Reward Systems , 2002 .
[109] T. Davenport,et al. Just-in-time delivery comes to knowledge management. , 2002, Harvard business review.
[110] Young-Gul Kim,et al. Breaking the Myths of Rewards: An Exploratory Study of Attitudes about Knowledge Sharing , 2002, Inf. Resour. Manag. J..
[111] James B. Rebitzer,et al. Monitoring, Motivation and Management: The Determinants of Opportunistic Behavior in a Field Experiment , 2002 .
[112] E. Fehr,et al. Altruistic punishment in humans , 2002, Nature.
[113] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[114] S. Zahra,et al. The effects of alliance portfolio characteristics and absorptive capacity on performance A study of biotechnology firms , 2001 .
[115] George P. Huber,et al. Transfer of knowledge in knowledge management systems: unexplored issues and suggested studies , 2001, Eur. J. Inf. Syst..
[116] Steven E. Phelan,et al. ARRIVING AT A STRATEGIC THEORY OF THE FIRM , 2000 .
[117] Paul A. McDermott,et al. Preschool peer interactions and readiness to learn: Relationships between classroom peer play and learning behaviors and conduct. , 2000 .
[118] Gary E. Bolton,et al. ERC: A Theory of Equity, Reciprocity, and Competition , 2000 .
[119] B. Kogut. The network as knowledge : Generative rules and the emergence of structure , 2000 .
[120] E. Fehr,et al. Fairness and Retaliation: The Economics of Reciprocity , 2000, SSRN Electronic Journal.
[121] Thomas H. Davenport,et al. Book review:Working knowledge: How organizations manage what they know. Thomas H. Davenport and Laurence Prusak. Harvard Business School Press, 1998. $29.95US. ISBN 0‐87584‐655‐6 , 1998 .
[122] E. Deci,et al. Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. , 2000, Contemporary educational psychology.
[123] Henk W. Volberda,et al. Co-evolution of Firm Absorptive Capacity and Knowledge Environment: Organizational Forms and Combinative Capabilities , 1999 .
[124] C. Antonelli. Localized technological change, new information technology and the knowledge-based economy: The European evidence , 1998 .
[125] Dale Neef,et al. The Economic Impact of Knowledge , 1998 .
[126] R. Grant. Toward a Knowledge-Based Theory of the Firm,” Strategic Management Journal (17), pp. , 1996 .
[127] J. Spender. Making knowledge the basis of a dynamic theory of the firm , 1996 .
[128] Nicolai J. Foss,et al. More Critical Comments on Knowledge-Based Theories of the Firm , 1996 .
[129] R. Grant,et al. Environments: Organizational Capability as Knowledge Integration , 2022 .
[130] M. Crossan. The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation , 1996 .
[131] M. Gordon,et al. PUBLICATION RECORDS AND TENURE DECISIONS IN THE FIELD OF STRATEGIC MANAGEMENT , 1996 .
[132] J. Andreoni. Cooperation in Public-Goods Experiments: Kindness or Confusion? , 1995 .
[133] I. Nonaka,et al. How Japanese Companies Create the Dynamics of Innovation , 1995 .
[134] B. Kogut,et al. Knowledge of the Firm and the Evolutionary Theory of the Multinational Corporation , 1993 .
[135] J. Barney. Firm Resources and Sustained Competitive Advantage , 1991 .
[136] H. Simon,et al. Bounded Rationality and Organizational Learning , 1991 .
[137] J. March. Exploration and exploitation in organizational learning , 1991, STUDI ORGANIZZATIVI.
[138] Daniel A. Levinthal,et al. Innovation and Learning: The Two Faces of R&D , 1989 .
[139] P. M. Podsakoff,et al. Self-Reports in Organizational Research: Problems and Prospects , 1986 .
[140] J. Hiebert,et al. Conceptual and Procedural Knowledge in Mathematics: An Introductory Analysis , 1986 .
[141] John T. Cacioppo,et al. The Elaboration Likelihood Model of Persuasion , 1986, Advances in Experimental Social Psychology.
[142] Peter J. Buckley,et al. The Growth of International Business. , 1983 .
[143] R. Katz,et al. Investigating the Not Invented Here (NIH) syndrome: A look at the performance, tenure, and communication patterns of 50 R & D Project Groups , 1982 .
[144] O. Williamson. The Economics of Organization: The Transaction Cost Approach , 1981, American Journal of Sociology.
[145] J. March,et al. Information in Organizations as Signal and Symbol. , 1981 .
[146] D. Teece. Technology Transfer by Multinational Firms: The Resource Cost of Transferring Technological Know-How , 1977 .
[147] Arne L. Kalleberg,et al. Work Values and Job Rewards: A Theory of Job Satisfaction. , 1977 .
[148] Jacob Cohen,et al. Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .
[149] David Hume. A Treatise of Human Nature: Being an Attempt to introduce the experimental Method of Reasoning into Moral Subjects , 1972 .
[150] R. Centers,et al. Intrinsic and extrinsic job motivations among different segments of the working population. , 1966, The Journal of applied psychology.
[151] M. Polanyi,et al. Tacit Knowing: Its Bearing on Some Problems of Philosophy , 1962 .
[152] David Hume. A Treatise Of Human Nature Volume Two , 1949 .