(IC)3 Workshops
Sloan Papers
- A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems: Applied to Stuxnet
- Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks (Condensed 37 page version)
- Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks (Full 157 page version)
- The House of Security: Stakeholder Perceptions of Security Assessment and Importance (FSTC)
- Using System Dynamics to Model and Better Understand State Stability (SD)
- Institutional Foundations for Cyber Security: Current Responses and New Challenges (JITD)
- Inter-Organizational Information Sharing of Customer Data in Retail
- Issues in Strategic Management of Large-Scale Software Product Line Development
- Challenges in Implementing Enterprise Resource Planning (ERP) system in Large Organizations: Similarities and Differences Between Corporate and University Environment
- Using System Dynamics to Analyze the Effect of Funding Fluctuation on Software Development (ASEM)
- Agile Project Dynamics: A System Dynamics Investigation of Agile Software Development Methods (SD Conference)
- Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same? (WISP)
- Strategic Philanthropy for Cyber Security: An extended cost-benefit analysis framework to study cybersecurity
- Comparative Analysis of Cybersecurity Metrics to Develop New Hypotheses (WISP)
- Institutional Foundations for Cyber Security: Current Responses and New Challenges (revised)
- Exploring Terms and Taxonomies Relating to the Cyber International Relations Research Field: or are "Cyberspace" and "Cyber Space" the same?
- Institutional Foundations for Cyber Security: Current Responses and New Challenges
- Experiences and Challenges with using CERT Data to Analyze International Cyber Security (AIS/WISP)
- Explorations in Cyber International Relations (ECIR) - Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System
- A Systems Approach to Risk Management (ASEM)
- An Economic Analysis of Policies for the Protection and Reuse of Non-Copyrightable Database Contents (JMIS)
- Preventing Accidents and Building a Culture of Safety: Insights from a Simulation Model
- Enhancing Vehicle Safety Management in Training Deployments: An Application of System Dynamics
- House of Security: Locale, Roles and Resources for Ensuring Information Security (AMCIS)
- Improving National and Homeland Security through Context Knowledge Representation & Reasoning Technologies (Book chapter)
- Understanding & Modeling State Stability: Exploiting System Dynamics (IEEE Aerospace)
- Understanding & Modeling State Stability: Exploiting System Dynamics (PCAS Final Report with Appendices)
- Policy for the Protection and Reuse of Non-Copyrightable Database Contents
- To Standardize Enterprise Data or Not? An Economic Analysis of Flexibility versus Control
- Context Mediation Demonstration of Counter-Terrorism Intelligence (CTI) Integration
- Research Initiative to Understand & Model State Stability: Exploiting System Dynamics (SD)
- Linkage Between Pre- and Post- Conflict: Exploiting Information Integration & System Dynamics (IEEE Aerospace)
- Improving National and Homeland Security through a proposed Laboratory for Information Globalization and Harmonization Technologies (LIGHT)
- Global e-Readiness - For What? Readiness for e-Banking (Journal of IT Development)
- Improving UccNet-Compliant B2B Supply-Chain Applications Using a Context Interchange Framework (BAI2004)
- Information Integration for Counter Terrorism Activities: The Requirement for Context Mediation (IEEE Aerospace)
- LIGHTS: Laboratory for Information Globalization and Harmonization Technologies and Studies
- Attribution Principles for Data Integration: Technology and Policy Perspectives - Part 2: Focus on Policy
- Attribution Principles for Data Integration: Technology and Policy Perspectives - Part 1: Focus on Technology
- Why Not One Big Database? Principles for Data Ownership (DSS)