• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4640945)   Today's Articles (1823)   Subscriber (50399)
For: Spanos G, Angelis L. The impact of information security events to the stock market: A systematic literature review. Comput Secur 2016. [DOI: 10.1016/j.cose.2015.12.006] [Citation(s) in RCA: 85] [Impact Index Per Article: 10.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Number Cited by Other Article(s)
1
Smith KT, Smith LM, Burger M, Boyle ES. Cyber terrorism cases and stock market valuation effects. INFORMATION AND COMPUTER SECURITY 2023. [DOI: 10.1108/ics-09-2022-0147] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
2
Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Comput Secur 2023. [DOI: 10.1016/j.cose.2022.102974] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/05/2022]
3
Aivazpour Z, Valecha R, Chakraborty R. Data Breaches. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2022. [DOI: 10.1145/3571823.3571829] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
4
Fortin A, Héroux S. Limited usefulness of firm-provided cybersecurity information in institutional investors’ investment analysis. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-07-2022-0122] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
5
Ford A, Al-Nemrat A, Ghorashi SA, Davidson J. The impact of GDPR infringement fines on the market value of firms. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-03-2022-0049] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
Tripathi M, Mukhopadhyay A. Does Privacy Breach Affect Firm Performance? An Analysis Incorporating Event-Induced Changes and Event Clustering. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103707] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
7
Antecedents and consequences of data breaches: A systematic review. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103638] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
8
Verma S. Sentiment analysis of public services for smart society: Literature review and future research directions. GOVERNMENT INFORMATION QUARTERLY 2022. [DOI: 10.1016/j.giq.2022.101708] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/04/2022]
9
Stock market reactions to favorable and unfavorable information security events: A systematic literature review. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102451] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
10
Comparative Analysis of Recurrent Neural Networks in Stock Price Prediction for Different Frequency Domains. ALGORITHMS 2021. [DOI: 10.3390/a14080251] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
11
Avery A. After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-10-2020-0161] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
12
Cao L, Yang Q, Yu PS. Data science and AI in FinTech: an overview. INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS 2021. [DOI: 10.1007/s41060-021-00278-w] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
13
Tayaksi C, Ada E, Kazancoglu Y, Sagnak M. The financial impacts of information systems security breaches on publicly traded companies: reactions of different sectors. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2021. [DOI: 10.1108/jeim-11-2020-0450] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
14
Trang S, Nastjuk I. Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102222] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
15
Knight R, Nurse JR. A framework for effective corporate communication after cyber security incidents. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102036] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/24/2023]
16
Ali O, Ally M, Clutterbuck, Dwivedi Y. The state of play of blockchain technology in the financial services sector: A systematic literature review. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2020.102199] [Citation(s) in RCA: 90] [Impact Index Per Article: 22.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/29/2022]
17
Shao X, Siponen M, Liu F. Shall we follow? Impact of reputation concern on information security managers’ investment decisions. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101961] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
18
Tripathi M, Mukhopadhyay A. Financial Loss due to a Data Privacy Breach: An Empirical Analysis. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2020. [DOI: 10.1080/10919392.2020.1818521] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
19
Juma'h AH, Alnsour Y. The effect of data breaches on company performance. INTERNATIONAL JOURNAL OF ACCOUNTING AND INFORMATION MANAGEMENT 2020. [DOI: 10.1108/ijaim-01-2019-0006] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
20
Ruohonen J, Hyrynsalmi S, Leppänen V. A mixed methods probe into the direct disclosure of software vulnerabilities. COMPUTERS IN HUMAN BEHAVIOR 2020. [DOI: 10.1016/j.chb.2019.09.028] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
21
Sadoughi F, Ali O, Erfannia L. Evaluating the factors that influence cloud technology adoption-comparative case analysis of health and non-health sectors: A systematic review. Health Informatics J 2019;26:1363-1391. [PMID: 31608737 DOI: 10.1177/1460458219879340] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/08/2023]
22
Enterprise reputation threats on social media: A case of data breach framing. JOURNAL OF STRATEGIC INFORMATION SYSTEMS 2019. [DOI: 10.1016/j.jsis.2018.12.001] [Citation(s) in RCA: 27] [Impact Index Per Article: 5.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
23
Ali O, Shrestha A, Soar J, Wamba SF. Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2018. [DOI: 10.1016/j.ijinfomgt.2018.07.009] [Citation(s) in RCA: 85] [Impact Index Per Article: 14.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
24
The market's response toward privacy and mass surveillance: The Snowden aftermath. Comput Secur 2018. [DOI: 10.1016/j.cose.2017.11.002] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA