Jacquelyn Rees Ulmer
Jacquelyn Rees Ulmer
Glenn E. Corlett Professor of Business, College of Business, OHIO University
Adresse e-mail validée de
Citée par
Citée par
Market reactions to information security breach announcements: An empirical analysis
K Kannan, J Rees, S Sridhar
International Journal of Electronic Commerce 12 (1), 69-91, 2007
PFIRES: A policy framework for information security
J Rees, S Bandyopadhyay, EH Spafford
Communications of the ACM 46 (7), 101-106, 2003
The association between the disclosure and the realization of information security risk factors
T Wang, KN Kannan, JR Ulmer
Information systems research 24 (2), 201-218, 2013
Competing for attention
W Shen, YJ Hu, JR Ulmer
Mis Quarterly 39 (3), 683-696, 2015
Management of information security: Challenges and research directions
J Choobineh, G Dhillon, MR Grimaila, J Rees
Communications of the Association for Information Systems 20 (1), 57, 2007
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
M Gupta, J Rees, A Chaturvedi, J Chi
Decision Support Systems 41 (3), 592-603, 2006
The association between top management involvement and compensation and information security breaches
J Kwon, JR Ulmer, T Wang
Journal of Information Systems 27 (1), 219-236, 2013
Value at risk: A methodology for information security risk assessment
J Jaisingh, J Rees
Proceedings of the INFORMS Conference on Information Systems and Technology, 3-4, 2001
The textual contents of media reports of information security breaches and profitable short-term investment opportunities
T Wang, JR Ulmer, K Kannan
Journal of Organizational Computing and Electronic Commerce 23 (3), 200-223, 2013
The state of risk assessment practices in information security: An exploratory investigation
J Rees, J Allen
Journal of Organizational Computing and Electronic Commerce 18 (4), 255-277, 2008
Digital piracy, teens, and the source of advice: An experimental study
MJ Hashim, KN Kannan, S Maximiano, JR Ulmer
Journal of Management Information Systems 31 (2), 211-244, 2014
Risk mitigation decisions for IT security
ML Yeo, E Rolland, JR Ulmer, RA Patterson
ACM Transactions on Management Information Systems (TMIS) 5 (1), 1-21, 2014
Simulating sellers in online exchanges
S Bandyopadhyay, J Rees, JM Barron
Decision Support Systems 41 (2), 500-513, 2006
Insider trading ahead of cyber breach announcements
Z Lin, TRA Sapp, JR Ulmer, R Parsa
Journal of Financial Markets 50, 100527, 2020
Learning genetic algorithm parameters using hidden Markov models
J Rees, GJ Koehler
European Journal of Operational Research 175 (2), 806-820, 2006
An investigation of GA performance results for different cardinality alphabets
J Rees, GJ Koehler
Evolutionary Algorithms, 191-206, 1999
Leadership and group search in group decision support systems
J Rees, GJ Koehler
Decision Support Systems 30 (1), 73-82, 2000
The problem of highly constrained tasks in group decision support systems
J Rees, R Barkhi
European Journal of Operational Research 135 (1), 220-229, 2001
Brainstorming, negotiating and learning in group decision support systems: an evolutionary approach
J Rees, G Koehler
Proceedings of the 32nd Annual Hawaii International Conference on Systems …, 1999
Reverse auctions with multiple reinforcement learning agents
S Bandyopadhyay, J Rees, JM Barron
Decision Sciences 39 (1), 33-63, 2008
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20