Page 597 -
P. 597
596 References
Panko, Raymond R. and Julia Panko. Business Data Networks and King, Ivory. “The United States, a Top Source and Target of
Telecommunications 8e. Upper Saddle River, NJ: Prentice- Malware.” L’Atelier (August 13, 2012).
Hall (2011). McGraw, Gary. “Real-World Software Security.” Information Week
Shaw, Tony. “Innovation Web 3.0.” Baseline (March/April 2011). (August 9, 2010).
Simonite, Tom. “Social Indexing.” Technology Review (May/June Nachenberg, Carey. “A Window into Mobile Device Security.”
2011). Symantec (2011).
“The Internet of Things.” McKinsey Quarterly (March 2010). Osterman Research. “The Risks of Social Media and What Can Be
The McKinsey&Company. “The Impact of Internet Technologies: Done to Manage Them. Commvault (June 2011).
Search (July 2011). Ponemon Institute. “Global Study on Mobility Risks.” Websense
Troianovski, Anton. “Optical Delusion? Fiber Booms Again, Inc. (February 2012).
Despite Bust,” The Wall Street Journal, (April 3, 2012). Ponemon Institute. “Second Annual Cost of Cyber Crime Study.”
Worldwide Web Consortium, “ Semantic Web.” w3.org/standards/ (August 2011).
semanticweb (October 18, 2012). Protess, Bill. “Users of Citibank’s Bill-Pay App Charged Twice.”
Worthen, Ben and Cari Tuna. “Web Running Out of Addresses.” The New York Times (February 9, 2012).
The Wall Street Journal (Feb 1, 2011). Pug, Ivan P.L. and Qiu-Hong Wang. “Information Security:
Worthen, Ben. “Upgrade Race for Data Centers.” The Wall Street Facilitating User Precautions Vis a Vis Enforcement Against
Journal (June 25, 2012). Attackers. “Journal of Management Information Systems 26,
Xiao, Bo and Izak Benbasat. “E-Commerce Product No. 2 (Fall 2009).
Recommendation Agents: Use, Characteristics, and Impact.” Rashid, Fahmida Y. “Mobile Malware Grew 3000 Percent in 2011:
MIS Quarterly 31, No. 1 (March 2007). Report.” eWeek (February 16,2012).
Rashid, Fahmida. Y. “Anonymous Avenges Megaupload Shutdown
CHAPTER 8 With Attacks on FBI, Hollywood Websites. eWeek (January
20, 2012).
“Android Malware Spreading for First Time Via Hacked Sites.” CIO Roche, Edward M., and George Van Nostrand. Information
Insight (May 4, 2012).
Bernstein, Corinne. “The Cost of Data Breaches.” Baseline (April Systems, Computer Crime and Criminal Justice. New York:
Barraclough Ltd. (2004).
2009)
Boyle, Randy J. and Raymond Panko. Corporate Computer Sadeh, Norman M. “Phish Isn’t Spam.” Information Week (June
25, 2012).
Security 3e. Upper Saddle River, NJ: Prentice Hall (2013).
Bray, Chad. “Global Cyber Scheme Hits Bank Accounts.” The Wall Schwerha, Joseph J., IV. “Cybercrime: Legal Standards Governing
the Collection of Digital Evidence.” Information Systems
Street Journal (October 1, 2010.)
Frontiers 6, no. 2 (June 2004).
Cavusoglu, Huseyin, Birendra Mishra, and Srinivasan Sengupta, Somini. “Logging In with a Touch or a Phrase (Anything
Raghunathan. “A Model for Evaluating IT Security But a Password). The New York Times (December 23, 2011).
Investments.” Communications of the ACM 47, no. 7 (July Sherr, Ian. “Fox Says Hackers Hit Twitter Feed.” Wall Street Journal
2004).
(July 5, 2011).
Choe Sang-Hun, “Cyberattacks Hit U.S. and South Korean Web Spears. Janine L. and Henri Barki. “User Participation in
Sites,” The New York Times, July 9, 2009.
D’Arcy, John and Anat Hovav. “Deterring Internal Information Information Systems Security Risk Management.” MIS
Quarterly 34, No. 3 (September 2010).
Systems Use.” Communications of the ACM 50, no. 10 Steinhart, Michael. “A Closer Look at Public Cloud Security.”
(October 2007).
Smartertechnology.com (September 2011).
“Devastating Downtime: The Surprising Cost of Human Error and Strom, David. “Cost of a Data Breach Declines For First Time,
Unforeseen Events.” Focus Research (October 2010).
Drew, Christopher and Verne G. Kopytoff. “Deploying New Tools According to Ponemon,” ReadWriteWeb/Enterprise ( March
20, 2012).
to Stop the Hackers.” The New York Times (June 17, 2011).`
El-Ghobashy, Tamer. “Columbia Is Hit with $4.5 Million Bank Symantec. “Symantec Internet Security Threat Report.” (2012).
Symantec. “More Than a Third of Global Cyber Attacks Aimed at
Fraud.” The Wall Street Journal (November 29, 2010).
Fowler, Geoffrey A. “What’s a Company’s Biggest Security Risk? Small Businesses, Research Shows. “ SupplyChainBrain.com
(July 17, 2012).
YOU.” The Wall Street Journal (September 26, 2011).
Galbreth, Michael R. and Mikhael Shor. “The Impact of Malicious Temizkan , Orcun, Ram L. Kumar , Sungjune Park and
Chandrasekar Subramaniam. “Patch Release Behaviors of
Agents on the Enterprise Software Industry.” MIS Quarterly Software Vendors in Response to Vulnerabilities: An
34, no. 3 (September 2010).
Giordano, Scott M. “Electronic Evidence and the Law.” Information Empirical Analysis . “ Journal of Management Information
Systems 28, No. 4 (Spring 2012).
Systems Frontiers 6, No. 2 (June 2004).
Graziano, Dan. “Study Says Malware Attacks Are on the Rise, Volonino, Linda and Stephen R. Robinson. Principles and Practice
of Information Security. Upper Saddle River, NJ: Pearson
Mobile Threats Becoming More Serious,” BGR.com Prentice Hall (2004).
(September 4, 2012).
Housley, Russ, and William Arbaugh. “Security Problems in Warkentin, Merrill, Xin Luo, and Gary F. Templeton. “A
Framework for Spyware Assessement.” Communications of
802.11b Networks.” Communications of the ACM 46, no. 5 the ACM 48, no. 8 (August 2005).
(May 2003).
IBM. “Secure By Design: Building Identity-Based Security into Westerman, George. IT Risk: Turning Business Threats into
Competitive Advantage. Harvard Business School Publishing
Today’s Information Systems.” (March 2010).
(2007)
Ives, Blake, Kenneth R. Walsh, and Helmut Schneider. “The Wright, Ryan T. and Kent Marrett.”The Influence of Experiental
Domino Effect of Password Reuse.” Communications of the and Dispositional Factors in Phishing: An Empirical
ACM 47, no.4 (April 2004).
Jagatic Tom, Nathaniel Johnson, Markus Jakobsson, and Filippo Investigation of the Deceived.” Journal of Management
Information Systems 27, No. 1 (Summer 2010).
Menczer. “Social Phishing.” Communications of the ACM 50,
no. 10 (October 2007).
Javelin Strategy & Research. “2012 Identity Fraud Survey Report.”
(2012).
MIS13_References global.indd 596 1/17/2013 2:38:45 PM

