Market reactions to information security breach announcements: An empirical analysis K Kannan, J Rees, S Sridhar International Journal of Electronic Commerce 12 (1), 69-91, 2007 | 260 | 2007 |
PFIRES: A policy framework for information security J Rees, S Bandyopadhyay, EH Spafford Communications of the ACM 46 (7), 101-106, 2003 | 217 | 2003 |
The association between the disclosure and the realization of information security risk factors T Wang, KN Kannan, JR Ulmer Information systems research 24 (2), 201-218, 2013 | 197 | 2013 |
Competing for attention W Shen, YJ Hu, JR Ulmer Mis Quarterly 39 (3), 683-696, 2015 | 180 | 2015 |
Management of information security: Challenges and research directions J Choobineh, G Dhillon, MR Grimaila, J Rees Communications of the Association for Information Systems 20 (1), 57, 2007 | 104 | 2007 |
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach M Gupta, J Rees, A Chaturvedi, J Chi Decision Support Systems 41 (3), 592-603, 2006 | 104 | 2006 |
The association between top management involvement and compensation and information security breaches J Kwon, JR Ulmer, T Wang Journal of Information Systems 27 (1), 219-236, 2013 | 100 | 2013 |
Value at risk: A methodology for information security risk assessment J Jaisingh, J Rees Proceedings of the INFORMS Conference on Information Systems and Technology, 3-4, 2001 | 36 | 2001 |
The textual contents of media reports of information security breaches and profitable short-term investment opportunities T Wang, JR Ulmer, K Kannan Journal of Organizational Computing and Electronic Commerce 23 (3), 200-223, 2013 | 35 | 2013 |
The state of risk assessment practices in information security: An exploratory investigation J Rees, J Allen Journal of Organizational Computing and Electronic Commerce 18 (4), 255-277, 2008 | 35 | 2008 |
Digital piracy, teens, and the source of advice: An experimental study MJ Hashim, KN Kannan, S Maximiano, JR Ulmer Journal of Management Information Systems 31 (2), 211-244, 2014 | 31 | 2014 |
Risk mitigation decisions for IT security ML Yeo, E Rolland, JR Ulmer, RA Patterson ACM Transactions on Management Information Systems (TMIS) 5 (1), 1-21, 2014 | 27 | 2014 |
Simulating sellers in online exchanges S Bandyopadhyay, J Rees, JM Barron Decision Support Systems 41 (2), 500-513, 2006 | 27 | 2006 |
Insider trading ahead of cyber breach announcements Z Lin, TRA Sapp, JR Ulmer, R Parsa Journal of Financial Markets 50, 100527, 2020 | 26 | 2020 |
Learning genetic algorithm parameters using hidden Markov models J Rees, GJ Koehler European Journal of Operational Research 175 (2), 806-820, 2006 | 22 | 2006 |
An investigation of GA performance results for different cardinality alphabets J Rees, GJ Koehler Evolutionary Algorithms, 191-206, 1999 | 19 | 1999 |
Leadership and group search in group decision support systems J Rees, GJ Koehler Decision Support Systems 30 (1), 73-82, 2000 | 18 | 2000 |
The problem of highly constrained tasks in group decision support systems J Rees, R Barkhi European Journal of Operational Research 135 (1), 220-229, 2001 | 17 | 2001 |
Brainstorming, negotiating and learning in group decision support systems: an evolutionary approach J Rees, G Koehler Proceedings of the 32nd Annual Hawaii International Conference on Systems …, 1999 | 17 | 1999 |
Reverse auctions with multiple reinforcement learning agents S Bandyopadhyay, J Rees, JM Barron Decision Sciences 39 (1), 33-63, 2008 | 16 | 2008 |