Search Results - "Madnick, Stuart"
-
1
Blockchain Isn't as Unbreakable as You Think
Published in MIT Sloan management review (01-01-2020)“…Sometimes it seems as if everyone has bought into the hype: Industries as far-flung as real estate and diamond sales have embraced blockchain without entirely…”
Get full text
Journal Article -
2
Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems
Published in IEEE transactions on dependable and secure computing (01-09-2022)“…Recent cyber-physical attacks, such as Stuxnet, Triton etc., have invoked an ominous realization about the vulnerability of critical infrastructure, including…”
Get full text
Journal Article -
3
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach
Published in Network (Basel) (01-12-2022)“…Recent world events and geopolitics have brought the vulnerability of critical infrastructure to cyberattacks to the forefront. While there has been…”
Get full text
Journal Article -
4
Understanding the Dynamics of Service-Oriented Architecture Implementation
Published in Journal of management information systems (03-04-2015)“…Despite the potential benefits, many organizations have failed in service-oriented architecture (SOA) implementation projects. Prior research often used a…”
Get full text
Journal Article -
5
Homophily and the speed of social mobilization: the effect of acquired and ascribed traits
Published in PloS one (01-04-2014)“…Large-scale mobilization of individuals across social networks is becoming increasingly prevalent in society. However, little is known about what affects the…”
Get full text
Journal Article -
6
What Executives Get Wrong About Cybersecurity
Published in MIT Sloan management review (01-12-2017)“…Cyberattacks are in the news. All kinds of organizations â[euro]" ranging from Target Corp. and Bangladesh Bank to the Democratic National Committee in the…”
Get full text
Journal Article -
7
Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail
Published in PloS one (30-09-2015)“…Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media…”
Get full text
Journal Article -
8
Bibliometric analysis of distributed generation
Published in Technological forecasting & social change (01-03-2011)“…This paper presents an application of term frequency ( TF) as a means of identifying useful trends from text documents. Of particular interest is the…”
Get full text
Journal Article -
9
Centralizing Data Management with Considerations of Uncertainty and Information-Based Flexibility
Published in Journal of management information systems (01-12-2013)“…This paper applies the theory of real options to analyze how the value of information-based flexibility should affect the decision to centralize or…”
Get full text
Journal Article -
10
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet
Published in IEEE transactions on dependable and secure computing (01-01-2018)“…Cyber physical systems (CPSs) are increasingly being adopted in a wide range of industries such as smart power grids. Even though the rapid proliferation of…”
Get full text
Journal Article -
11
A pattern-based approach to protocol mediation for web services composition
Published in Information and software technology (01-03-2010)“…With the increasing popularity of Service Oriented Architecture (SOA), service composition is gaining momentum as the potential silver bullet for application…”
Get full text
Journal Article -
12
Finding New Uses For Information
Published in MIT Sloan management review (01-06-2009)“…Without any doubt, data can be an important asset of a business. The business owns the data when it can fully control who can access the information and how it…”
Get full text
Journal Article -
13
An Economic Analysis of Policies for the Protection and Reuse of Noncopyrightable Database Contents
Published in Journal of management information systems (01-07-2008)“…The availability of data on the Web and new data extraction technologies have made it increasingly easy to reuse existing data to create new databases and…”
Get full text
Journal Article -
14
Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems
Published in IEEE transactions on dependable and secure computing (01-09-2022)“…Not provided…”
Get full text
Journal Article -
15
Applying the Lessons from the Equifax Cybersecurity Incident to Build a Better Defense
Published in MIS quarterly executive (2021)Get full text
Journal Article -
16
Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment
Published in The journal of strategic information systems (01-03-2019)“…•Increasing cyber risks demand proactive decisions for cybersecurity development.•Significant delays exist in building capabilities for mitigating cyber…”
Get full text
Journal Article -
17
Health Care and Cybersecurity: Bibliometric Analysis of the Literature
Published in Journal of medical Internet research (15-02-2019)“…Over the past decade, clinical care has become globally dependent on information technology. The cybersecurity of health care information systems is now an…”
Get full text
Journal Article -
18
CYBERSECURITY AS A UNIFYING FACTOR FOR PRIVACY, COMPLIANCE AND TRUST: THE HAGA HOSPITAL CASE
Published in Issues in information systems (2022)Get full text
Journal Article -
19
The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process
Published in Information security journal. (03-05-2024)“…Developing cybersecurity norms and global normative cybersecurity behaviors play an increasingly critical role in global cybersecurity governance. This paper…”
Get full text
Journal Article -
20
CONVERGENCE AND DIVERGENCE OF REGULATORY COMPLIANCE AND CYBERSECURITY
Published in Issues in information systems (2021)Get full text
Journal Article