Functionality vs. Security in IS: Tradeoff or equilibrium
| Main Authors: | Baskerville, Richard, Rowe, F., Wolff, F. |
|---|---|
| Other Authors: | Joey F. George |
| Format: | Conference Paper |
| Published: |
Association for Information Systems
2012
|
| Online Access: | http://hdl.handle.net/20.500.11937/6337 |
Similar Items
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Performance Tradeoffs among Beamforming Approaches
by: Rong, Yue, et al.
Published: (2006)
by: Rong, Yue, et al.
Published: (2006)
Performance tradeoffs among adaptive beamforming criteria
by: Rong, Yue, et al.
Published: (2007)
by: Rong, Yue, et al.
Published: (2007)
The risk-return tradeoff: A COGARCH analysis of Merton's hypothesis
by: Müller, G., et al.
Published: (2011)
by: Müller, G., et al.
Published: (2011)
The Risk/Return Tradeoff in Relation to Corporate Performance within Chinese Companies
by: Fu, Xihao
Published: (2015)
by: Fu, Xihao
Published: (2015)
Sustainable Tuna Supply Chain in Thailand: Challenges and Overcoming the Profitability Tradeoff
by: Karanapakorn, Nicha
Published: (2016)
by: Karanapakorn, Nicha
Published: (2016)
Power - reliability tradeoff in low power 4-PAM signaling in on-chip communication
by: Forooshani, Arash Abtahi, et al.
Published: (2011)
by: Forooshani, Arash Abtahi, et al.
Published: (2011)
Design And Tradeoff Characterizations Of High Frequency Balanced Amplifier For RF Integrated System
by: Tai, Wen Qi
Published: (2005)
by: Tai, Wen Qi
Published: (2005)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
Genome Expansion and Gene Loss in Powdery Mildew Fungi Reveal Tradeoffs in Extreme Parasitism
by: Spanu, P., et al.
Published: (2010)
by: Spanu, P., et al.
Published: (2010)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
Test Static Tradeoff Models Against Pecking Order Models of Capital Structure in UK Firms
by: Wu, Jinhua
Published: (2013)
by: Wu, Jinhua
Published: (2013)
A monetary-valuation analysis of the footpath/road tradeoff of Western Australian local government authorities
by: Brown, Alistair
Published: (2014)
by: Brown, Alistair
Published: (2014)
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)
by: Raymond, B., et al.
Published: (2014)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
Correlations between physical and chemical defences in plants: tradeoffs, syndromes, or just many different ways to skin a herbivorous cat?
by: Moles, A., et al.
Published: (2013)
by: Moles, A., et al.
Published: (2013)
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Tradeoff study of heat sink and output filter volume in a GaN HEMT based single-phase inverter
by: Gurpinar, Emre, et al.
Published: (2017)
by: Gurpinar, Emre, et al.
Published: (2017)
Security of tenure vs management prerogative to discharge surplus labour
by: Ali Mohamed, Ashgar Ali, et al.
Published: (2012)
by: Ali Mohamed, Ashgar Ali, et al.
Published: (2012)
Financial security in retirement: the importance of savings vs earnings in Malaysia
by: Krishnaveni, Vilayudhan, et al.
Published: (2024)
by: Krishnaveni, Vilayudhan, et al.
Published: (2024)
Levitin-Polyak Well-Poseness for Equilibrium Problemswith Functional Constraints
by: Long, X., et al.
Published: (2008)
by: Long, X., et al.
Published: (2008)
Intervention effect rates as a path to research relevance: Information systems security example
by: Siponen, M., et al.
Published: (2018)
by: Siponen, M., et al.
Published: (2018)
MTTDFR-SJFR: A Combinatorial Rule Approach To Balance Tradeoff Between Flowtime, Makespan, Delayed Jobs, Total Tardiness And Utilization
by: Zafril Rizal, M Azmi, et al.
Published: (2018)
by: Zafril Rizal, M Azmi, et al.
Published: (2018)
English vs. Dutch high secure hospitals: service user perspectives
by: Völlm, Birgit
Published: (2017)
by: Völlm, Birgit
Published: (2017)
Gap functions and existence of solutions to generalized vector quasi-equilibrium problems
by: Li, S., et al.
Published: (2006)
by: Li, S., et al.
Published: (2006)
Research: Quantity vs quality vs impact (bronze vs silver vs gold)
by: Hughes, Jeff, et al.
Published: (2012)
by: Hughes, Jeff, et al.
Published: (2012)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
UMPSA hosts Community Lecture 2024 Organisational Security vs Leadership Integrity
by: Mohammad Ilzam, Jamat, et al.
Published: (2024)
by: Mohammad Ilzam, Jamat, et al.
Published: (2024)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Organizational Security Learning from Incident Response
by: Ahmad, A., et al.
Published: (2018)
by: Ahmad, A., et al.
Published: (2018)
The equilibrium gap method
by: Syed Muhammad, Kashif
Published: (2011)
by: Syed Muhammad, Kashif
Published: (2011)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Moisture equilibrium, degree of hydration and compressive strength of different cement pastes
by: Shafiq, N., et al.
Published: (2010)
by: Shafiq, N., et al.
Published: (2010)
Equilibrium Relative Humidity-Equilibrium Moisture
Content Isotherms of Oil Palm Kernels
by: Ibrahim, Mohamad Hakimi, et al.
Published: (1997)
by: Ibrahim, Mohamad Hakimi, et al.
Published: (1997)
Apical vertebrae vs lung function in adolescent idiopathic scoliosis (AIS)
by: Johari, Joehaimey, et al.
Published: (2014)
by: Johari, Joehaimey, et al.
Published: (2014)
Existence of equilibrium solution for a non- cooperative game with fuzzy goals and parameters
by: Kacher, F, et al.
Published: (2008)
by: Kacher, F, et al.
Published: (2008)
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Similar Items
-
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018) -
Performance Tradeoffs among Beamforming Approaches
by: Rong, Yue, et al.
Published: (2006) -
Performance tradeoffs among adaptive beamforming criteria
by: Rong, Yue, et al.
Published: (2007) -
The risk-return tradeoff: A COGARCH analysis of Merton's hypothesis
by: Müller, G., et al.
Published: (2011) -
The Risk/Return Tradeoff in Relation to Corporate Performance within Chinese Companies
by: Fu, Xihao
Published: (2015)