Page 597 -
P. 597

596    References


        Panko, Raymond R. and Julia Panko.  Business Data Networks and   King, Ivory. “The United States, a Top Source and Target of
            Telecommunications 8e.  Upper Saddle River, NJ: Prentice-  Malware.” L’Atelier (August 13, 2012).
            Hall (2011).                                     McGraw, Gary. “Real-World Software Security.” Information Week
        Shaw, Tony. “Innovation Web 3.0.” Baseline (March/April 2011).  (August 9, 2010).
        Simonite, Tom. “Social Indexing.”  Technology Review (May/June   Nachenberg, Carey. “A Window into Mobile Device Security.”
            2011).                                               Symantec (2011).
        “The Internet of Things.” McKinsey Quarterly (March 2010).  Osterman Research. “The Risks of Social Media and What Can Be
        The McKinsey&Company.  “The Impact of Internet Technologies:   Done to Manage Them. Commvault  (June 2011).
            Search (July 2011).                              Ponemon Institute. “Global Study on Mobility Risks.” Websense
        Troianovski, Anton. “Optical Delusion? Fiber Booms Again,   Inc. (February 2012).
            Despite Bust,” The Wall Street Journal, (April 3, 2012).  Ponemon Institute. “Second Annual Cost of Cyber Crime Study.”
         Worldwide Web Consortium, “ Semantic Web.”  w3.org/standards/  (August 2011).
            semanticweb (October 18, 2012).                  Protess, Bill.  “Users of Citibank’s Bill-Pay App Charged Twice.”
        Worthen, Ben and Cari Tuna. “Web Running Out of Addresses.”   The New York Times (February 9, 2012).
            The Wall Street Journal (Feb 1, 2011).           Pug, Ivan P.L. and Qiu-Hong Wang. “Information Security:
        Worthen, Ben. “Upgrade Race for Data Centers.” The Wall Street   Facilitating User Precautions Vis a Vis Enforcement Against
            Journal (June 25, 2012).                             Attackers. “Journal of Management Information Systems 26,
        Xiao, Bo and Izak Benbasat. “E-Commerce Product          No. 2 (Fall 2009).
            Recommendation Agents:  Use, Characteristics, and Impact.”   Rashid, Fahmida Y. “Mobile Malware Grew 3000 Percent in 2011:
            MIS Quarterly 31, No. 1 (March  2007).               Report.” eWeek (February 16,2012).
                                                             Rashid, Fahmida. Y. “Anonymous Avenges Megaupload Shutdown
        CHAPTER 8                                                With Attacks on FBI, Hollywood Websites.  eWeek (January
                                                                 20, 2012).
        “Android Malware Spreading for First Time Via Hacked Sites.” CIO   Roche, Edward M., and George Van Nostrand. Information
            Insight (May 4, 2012).
        Bernstein, Corinne. “The Cost of Data Breaches.” Baseline (April   Systems, Computer Crime and Criminal Justice. New York:
                                                                 Barraclough Ltd. (2004).
            2009)
        Boyle, Randy J. and Raymond Panko.  Corporate Computer   Sadeh, Norman M.  “Phish Isn’t Spam.” Information Week (June
                                                                 25, 2012).
            Security 3e.  Upper Saddle River, NJ: Prentice Hall (2013).
        Bray, Chad. “Global Cyber Scheme Hits Bank Accounts.” The Wall   Schwerha, Joseph J., IV. “Cybercrime: Legal Standards Governing
                                                                 the Collection of Digital Evidence.” Information Systems
            Street Journal (October 1, 2010.)
                                                                 Frontiers 6, no. 2 (June 2004).
        Cavusoglu, Huseyin, Birendra Mishra, and Srinivasan   Sengupta, Somini.  “Logging In with a Touch or a Phrase (Anything
            Raghunathan. “A Model for Evaluating IT Security     But a Password).  The New York Times (December 23, 2011).
            Investments.” Communications of the ACM 47, no. 7 (July   Sherr, Ian. “Fox Says Hackers Hit Twitter Feed.” Wall Street Journal
            2004).
                                                                 (July 5, 2011).
        Choe Sang-Hun, “Cyberattacks Hit U.S. and South Korean Web   Spears. Janine L. and Henri Barki. “User Participation in
            Sites,” The New York Times, July 9, 2009.
        D’Arcy, John and Anat Hovav. “Deterring Internal Information   Information Systems Security Risk Management.” MIS
                                                                 Quarterly 34, No. 3 (September 2010).
            Systems Use.” Communications of the ACM 50, no. 10   Steinhart, Michael. “A Closer Look at Public Cloud Security.”
            (October 2007).
                                                                 Smartertechnology.com (September 2011).
        “Devastating Downtime: The Surprising Cost of Human Error and   Strom, David. “Cost of a Data Breach Declines For First Time,
            Unforeseen Events.” Focus Research (October 2010).
         Drew, Christopher and Verne G. Kopytoff. “Deploying New Tools   According to Ponemon,” ReadWriteWeb/Enterprise ( March
                                                                 20, 2012).
            to Stop the Hackers.” The New York Times (June 17, 2011).`
        El-Ghobashy, Tamer.  “Columbia Is Hit with $4.5 Million Bank   Symantec. “Symantec Internet Security Threat Report.” (2012).
                                                             Symantec. “More Than a Third of Global Cyber Attacks Aimed at
            Fraud.” The Wall Street Journal (November 29, 2010).
        Fowler, Geoffrey A. “What’s a Company’s Biggest Security Risk?    Small Businesses, Research Shows. “ SupplyChainBrain.com
                                                                 (July 17, 2012).
            YOU.” The Wall Street Journal  (September 26, 2011).
        Galbreth, Michael R. and Mikhael Shor. “The Impact of Malicious   Temizkan , Orcun, Ram L. Kumar , Sungjune Park and
                                                                 Chandrasekar Subramaniam. “Patch Release Behaviors of
            Agents on the Enterprise Software Industry.” MIS Quarterly   Software Vendors in Response to Vulnerabilities: An
            34, no. 3 (September 2010).
        Giordano, Scott M. “Electronic Evidence and the Law.” Information   Empirical Analysis . “ Journal of Management Information
                                                                 Systems 28, No. 4 (Spring 2012).
            Systems Frontiers 6, No. 2 (June 2004).
        Graziano, Dan. “Study Says Malware Attacks Are on the Rise,   Volonino, Linda and Stephen R. Robinson.  Principles and Practice
                                                                 of Information Security. Upper Saddle River, NJ: Pearson
            Mobile Threats Becoming More Serious,” BGR.com       Prentice Hall (2004).
            (September 4, 2012).
        Housley, Russ, and William Arbaugh. “Security Problems in   Warkentin, Merrill, Xin Luo, and Gary F. Templeton. “A
                                                                 Framework for Spyware Assessement.” Communications of
            802.11b Networks.” Communications of the ACM 46, no. 5   the ACM 48, no. 8 (August 2005).
            (May 2003).
        IBM. “Secure By Design: Building Identity-Based Security into   Westerman, George.  IT Risk: Turning Business Threats into
                                                                 Competitive Advantage.  Harvard Business School Publishing
            Today’s Information Systems.” (March 2010).
                                                                 (2007)
        Ives, Blake, Kenneth R. Walsh, and Helmut Schneider. “The   Wright, Ryan T. and Kent Marrett.”The Influence of Experiental
            Domino Effect of Password Reuse.” Communications of the   and Dispositional Factors in Phishing: An Empirical
            ACM 47, no.4 (April 2004).
        Jagatic Tom, Nathaniel Johnson, Markus Jakobsson, and Filippo   Investigation of the Deceived.” Journal of Management
                                                                 Information Systems 27, No. 1 (Summer 2010).
            Menczer. “Social Phishing.” Communications of the ACM 50,
            no. 10 (October 2007).
        Javelin Strategy & Research. “2012 Identity Fraud Survey Report.”
            (2012).

   MIS13_References global.indd   596                                                                         1/17/2013   2:38:45 PM
   592   593   594   595   596   597   598   599   600   601   602