Author of the publication

The value of the CIO in the top management team on performance in the case of information security breaches.

, , and . Inf. Syst. Frontiers, 18 (6): 1205-1215 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gender-based differences in culture in the Indian IT workplace., , and . Int. J. Inf. Manag., 36 (4): 507-519 (2016)The Economic Ramifications of Strategic IT Security Information Sharing in the Financial Services Industry., and . AMCIS, page 281. Association for Information Systems, (2009)The value of the CIO in the top management team on performance in the case of information security breaches., , and . Inf. Syst. Frontiers, 18 (6): 1205-1215 (2016)A primer on carrying out a successful yet rigorous security risk management based case study.. InfoSecCD, page 48. ACM, (2010)Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud., and . AMCIS, Association for Information Systems, (2017)Security Risk Management in Healthcare: A Case Study., , and . Commun. Assoc. Inf. Syst., (2014)Toward a More Secure HRIS: The Role of HCI and Unconscious Behavior., , and . AIS Trans. Hum. Comput. Interact., 9 (1): 4 (2017)Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?, , and . AMCIS, Association for Information Systems, (2023)Intra-Industry Effects of Information Security Breaches on Firm Performance., , and . AMCIS, page 590. Association for Information Systems, (2009)IR, DR and BC with wireless mesh networks., and . InfoSecCD, page 33-39. ACM, (2012)