• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4637604)   Today's Articles (3155)   Subscriber (50137)
For: Soomro ZA, Shah MH, Ahmed J. Information security management needs more holistic approach: A literature review. International Journal of Information Management 2016;36:215-25. [DOI: 10.1016/j.ijinfomgt.2015.11.009] [Citation(s) in RCA: 208] [Impact Index Per Article: 26.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Number Cited by Other Article(s)
1
Pahlavanpour O, Gao S. A systematic mapping study on gamification within information security awareness programs. Heliyon 2024;10:e38474. [PMID: 39398049 PMCID: PMC11467640 DOI: 10.1016/j.heliyon.2024.e38474] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/20/2023] [Revised: 09/23/2024] [Accepted: 09/24/2024] [Indexed: 10/15/2024]  Open
2
Gurcan F. What are developers talking about information security? A large-scale study using semantic analysis of Q&A posts. PeerJ Comput Sci 2024;10:e1954. [PMID: 38660176 PMCID: PMC11041951 DOI: 10.7717/peerj-cs.1954] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/18/2024] [Accepted: 03/03/2024] [Indexed: 04/26/2024]
3
Sukumar A, Mahdiraji HA, Jafari-Sadeghi V. Cyber risk assessment in small and medium-sized enterprises: A multilevel decision-making approach for small e-tailors. RISK ANALYSIS : AN OFFICIAL PUBLICATION OF THE SOCIETY FOR RISK ANALYSIS 2023;43:2082-2098. [PMID: 36627823 DOI: 10.1111/risa.14092] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/09/2020] [Revised: 09/29/2022] [Accepted: 12/07/2022] [Indexed: 06/17/2023]
4
Plachkinova M, Knapp K. Least Privilege across People, Process, and Technology: Endpoint Security Framework. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2128937] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
5
Gale M, Bongiovanni I, Slapnicar S. Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102840] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
6
Stewart H. Digital Transformation Security Challenges. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2115953] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
7
Schinagl S, Shahim A, Khapova S. Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102903] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
8
Du Y, Xu Y, Wang X, Liu L, Ma P. EEG temporal-spatial transformer for person identification. Sci Rep 2022;12:14378. [PMID: 35999245 PMCID: PMC9399234 DOI: 10.1038/s41598-022-18502-3] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/11/2022] [Accepted: 08/12/2022] [Indexed: 11/09/2022]  Open
9
Ou CX, Zhang X, Angelopoulos S, Davison RM, Janse N. Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2022.102498] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
10
CAESAR8: an Agile Enterprise Architecture Approach to Managing Information Security Risks. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102877] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
11
Manickam S, Rahef Nuiaa R, Hakem Alsaeedi A, Alyasseri ZAA, Mohammed MA, Jaber MM. An enhanced mechanism for detection of Domain Name System‐based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques. IET NETWORKS 2022. [DOI: 10.1049/ntw2.12043] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
12
Yeoh W, Wang S, Popovič A, Chowdhury NH. A systematic synthesis of critical success factors for cybersecurity. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102724] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
13
Khan NF, Yaqoob A, Khan MS, Ikram N. The Cybersecurity Behavioral Research: A Tertiary Study. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102826] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
14
Guggenmos F, Häckel B, Ollig P, Stahl B. Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102747] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
15
Ahmad Wani T, Mendoza A, Gray K, Smolenaers F. BYOD usage and security behaviour of hospital clinical staff: an Australian survey. Int J Med Inform 2022;165:104839. [DOI: 10.1016/j.ijmedinf.2022.104839] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2022] [Revised: 07/13/2022] [Accepted: 07/20/2022] [Indexed: 11/25/2022]
16
Nord J, Sargent CS, Koohang A, Marotta A. Predictors of Success in Information Security Policy Compliance. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2067795] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
17
Wani TA, Mendoza A, Gray K, Smolenaers F. Status of Bring-Your-Own-Device (BYOD) Security Practices in Australian Hospitals – A National Survey. HEALTH POLICY AND TECHNOLOGY 2022. [DOI: 10.1016/j.hlpt.2022.100627] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
18
Bergquist JH, Tinet S, Gao S. An information classification model for public sector organizations in Sweden: a case study of a Swedish municipality. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-03-2021-0032] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
19
Goel L, Zhang JZ, Williamson S. IT assimilation: construct, measurement, and implications in cybersecurity. ENTERP INF SYST-UK 2022. [DOI: 10.1080/17517575.2022.2052187] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
20
Bongiovanni I, Renaud K, Brydon H, Blignaut R, Cavallo A. A quantification mechanism for assessing adherence to information security governance guidelines. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-08-2021-0112] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
21
A systematic framework to explore the determinants of information security policy development and outcomes. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-06-2021-0076] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
22
Singh N, Krishnaswamy V, Zhang JZ. Intellectual structure of cybersecurity research in enterprise information systems. ENTERP INF SYST-UK 2022. [DOI: 10.1080/17517575.2022.2025545] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/03/2023]
23
Zhang H, Hong X, Li Q, Gong Y, Liu S. Exploring the Intellectual Structure and International Cooperation in Information Management. JOURNAL OF GLOBAL INFORMATION MANAGEMENT 2021. [DOI: 10.4018/jgim.294577] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/12/2023]
24
The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework. INFORMATION 2021. [DOI: 10.3390/info12110446] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
25
A framework for ID fraud prevention policies in E-tailing sector. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102403] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
26
Kim TY, Cho SB. Optimizing CNN-LSTM neural networks with PSO for anomalous query access control. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2020.07.154] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
27
The Impact of Organizational Practices on the Information Security Management Performance. INFORMATION 2021. [DOI: 10.3390/info12100398] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
28
Arbanas K, Spremic M, Zajdela Hrustek N. Holistic framework for evaluating and improving information security culture. ASLIB J INFORM MANAG 2021. [DOI: 10.1108/ajim-02-2021-0037] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
29
Edu AS, Agoyi M, Agozie D. Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis. PeerJ Comput Sci 2021;7:e658. [PMID: 34435101 PMCID: PMC8356653 DOI: 10.7717/peerj-cs.658] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/08/2021] [Accepted: 07/12/2021] [Indexed: 05/24/2023]
30
Kuo KM, Talley PC, Lin DYM. Hospital Staff's Adherence to Information Security Policy: A Quest for the Antecedents of Deterrence Variables. INQUIRY: The Journal of Health Care Organization, Provision, and Financing 2021;58:469580211029599. [PMID: 34229507 PMCID: PMC8576356 DOI: 10.1177/00469580211029599] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
31
Pollini A, Callari TC, Tedeschi A, Ruscio D, Save L, Chiarugi F, Guerri D. Leveraging human factors in cybersecurity: an integrated methodological approach. COGNITION, TECHNOLOGY & WORK (ONLINE) 2021;24:371-390. [PMID: 34149309 PMCID: PMC8195225 DOI: 10.1007/s10111-021-00683-y] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/06/2021] [Accepted: 05/24/2021] [Indexed: 06/12/2023]
32
Sari PK, Prasetio A, Candiwan, Handayani PW, Hidayanto AN, Syauqina S, Astuti EF, Tallei FP. Information security cultural differences among health care facilities in Indonesia. Heliyon 2021;7:e07248. [PMID: 34179533 PMCID: PMC8214091 DOI: 10.1016/j.heliyon.2021.e07248] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/24/2020] [Revised: 11/17/2020] [Accepted: 06/03/2021] [Indexed: 11/16/2022]  Open
33
Stacey P, Taylor R, Olowosule O, Spanaki K. Emotional reactions and coping responses of employees to a cyber-attack: A case study. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2020.102298] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
34
Sharma A, Rana NP, Nunkoo R. Fifty years of information management research: A conceptual structure analysis using structural topic modeling. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2021.102316] [Citation(s) in RCA: 25] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/22/2022]
35
Evaluating the cyber security readiness of organizations and its influence on performance. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2020.102726] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
36
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11083383] [Citation(s) in RCA: 21] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
37
Forty years of the International Journal of Information Management: A bibliometric analysis. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2020.102307] [Citation(s) in RCA: 37] [Impact Index Per Article: 12.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
38
Lee L, Charles V. The impact of consumers’ perceptions regarding the ethics of online retailers and promotional strategy on their repurchase intention. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2020.102264] [Citation(s) in RCA: 18] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
39
Polkinghorne S, Given LM. Holistic information research: From rhetoric to paradigm. J Assoc Inf Sci Technol 2021. [DOI: 10.1002/asi.24450] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
40
Ahmadi S, Ershadi MJ. Investigating the role of social networking technology on the organizational agility: a structural equation modeling approach. JOURNAL OF ADVANCES IN MANAGEMENT RESEARCH 2021. [DOI: 10.1108/jamr-04-2020-0052] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
41
Ameen N, Tarhini A, Shah MH, Madichie N, Paul J, Choudrie J. Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2020.106531] [Citation(s) in RCA: 25] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
42
Khan F, Kim JH, Mathiassen L, Moore R. DATA BREACH MANAGEMENT: AN INTEGRATED RISK MODEL. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2020.103392] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
43
Georgiadou A, Mouzakitis S, Bounas K, Askounis D. A Cyber-Security Culture Framework for Assessing Organization Readiness. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2020. [DOI: 10.1080/08874417.2020.1845583] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
44
Palanisamy R, Norman AA, Kiah MLM. Compliance with bring your own device security policies in organizations: A systematic literature review. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101998] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
45
Teixeira da Silva JA. On the fate of social networking sites of deceased academics in the Covid-19 era and beyond. CURRENT RESEARCH IN BEHAVIORAL SCIENCES 2020. [PMID: 37519628 PMCID: PMC8963909 DOI: 10.1016/j.crbeha.2020.100007] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]  Open
46
Barlette Y, Jaouen A, Baillette P. Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' coping strategies. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020;56:102212. [PMID: 32934432 PMCID: PMC7484736 DOI: 10.1016/j.ijinfomgt.2020.102212] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/28/2020] [Revised: 08/04/2020] [Accepted: 08/04/2020] [Indexed: 11/01/2022]
47
Chang SI, Chang LM, Liao JC. Risk factors of enterprise internal control under the internet of things governance: A qualitative research approach. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2020.103335] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
48
Validation of a socio-technical management process for optimising cybersecurity practices. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101846] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
49
Lian JW. Understanding cloud-based BYOD information security protection behaviour in smart business: in perspective of perceived value. ENTERP INF SYST-UK 2020. [DOI: 10.1080/17517575.2020.1791966] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
50
Wani TA, Mendoza A, Gray K. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature. JMIR Mhealth Uhealth 2020;8:e18175. [PMID: 32554388 PMCID: PMC7333072 DOI: 10.2196/18175] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/09/2020] [Revised: 04/08/2020] [Accepted: 04/09/2020] [Indexed: 12/16/2022]  Open
PrevPage 1 of 2 12Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA