Bibliography dey d lahiri a zhang g 2012 hacker

Info icon This preview shows pages 4–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Bibliography Dey, D., Lahiri, A., & Zhang, G. (2012). Hacker behavior, net- work effects, and the security software market. Journal of Management Information Systems, 29 (2), 77–108. Retrieved November 26, 2013 from EBSCO online data- base Business Source Premier. http://search.ebscohost. com/login.aspx?direct=true&db=buh&AN=83778605 Gupta, A., & Zhdanov, D. (2012). Growth and sustainability of managed security services networks: an economic perspective. MIS Quarterly, 36 (4), 1109–A7. Retrieved November 26, 2013 from EBSCO online database Business Source Premier. http://search.ebscohost.com/ login.aspx?direct=true&db=buh&AN=83465896 Juels, A., & Oprea, A. (2013). New approaches to security and availability for cloud data. Communications of the ACM, 56 (2), 64–73. Retrieved November 26, 2013 from EBSCO online database Business Source Premier. http://search. ebscohost.com/login.aspx?direct=true&db=buh&AN= 88141518 Lucas, H. C. Jr. (2005). Information technology: Strategic decision making for managers . New York: John Wiley and Sons. Prince, B. (2014). Cybersecurity. Forbes, 194 (5), 136-142. Retrieved November 5, 2014, from EBSCO Online Database Business Source Complete. http://search.ebsco- host.com/login.aspx?direct=true&db=bth&AN=98671704 Security of the Internet and the Known Unknowns. (2012). Communications of the ACM, 55 (6), 35-37. Retrieved November 5, 2014, from EBSCO Online Database Business Source Complete. http://search.ebscohost.com/ login.aspx?direct=true&db=bth&AN=76246878
Image of page 4

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Page 5 EBSCO Research Starters ® • Copyright © EBSCO Information Services, Inc. • All Rights Reserved Communications, Networking & Security Senn, J. A. (2004). Information technology: Principles, prac- tices, opportunities (3rd ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. Suggested Reading Engebretson, D. (2004). The beginnings: Beyond the PC. Distributing & Marketing, 34 (8), 74-76. Retrieved May 14, 2007, from EBSCO Online Database Business Source Complete. http://search.ebscohost.com/login.aspx?direct= true&db=bth&AN=14161943&site=ehost-live Hui, K.-L. , Hui, W. , & Yue, W. T. (2012). Information security outsourcing with system interdependency and mandatory security requirement. Journal of Management Information Systems, 29 (3), 117–156. Retrieved November 26, 2013 from EBSCO online database Business Source Premier. http://search.ebscohost.com/login.aspx?direct= true&db=buh&AN=85985315 Kamens, M. (2007). Making user access policies work for you. Network World, 24 (12), 33. Retrieved May 16, 2007, from EBSCO Online Database Business Source Complete. http://search.ebscohost.com/login.aspx?direct=true&db= bth&AN=24605995&site=ehost-live McPherson, D. (2007). IP network security: Progress, not per- fection. Business Communications Review, 37 (3), 54-58. Retrieved May 14, 2007, from EBSCO Online Database Business Source Complete. http://search.ebscohost.com/ login.aspx?direct=true&db=bth&AN=24345324&site= ehost-live The Practice of Network Security Monitoring. (2014). Network Security, 2014 (10), 4. Retrieved November 5, 2014, from EBSCO Online Database Business Source Complete.
Image of page 5
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern