Market Impact on IT Security Spending
ABSTRACT Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct‐ and cross‐risk elasticity to describe the...
Saved in:
Published in | Decision sciences Vol. 44; no. 3; pp. 517 - 556 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Atlanta
Blackwell Publishing Ltd
01.06.2013
American Institute for Decision Sciences |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | ABSTRACT
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct‐ and cross‐risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous‐time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated. |
---|---|
AbstractList | ABSTRACT
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct‐ and cross‐risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous‐time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated. Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct- and cross-risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous-time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated. Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct- and cross-risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous-time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated. [PUBLICATION ABSTRACT] Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a macro perspective is needed in analyzing these decisions. We utilize the notions of direct- and cross-risk elasticity to describe the customer response to adverse IT security events in the firm and competitor, respectively, thus allowing us to analyze optimal security investment decisions. Examining both symmetric and asymmetric duopoly cases using a continuous-time Markov chain (CTMC) model, we demonstrate that optimal IT security spending, expected firm profits and willingness of firms to cooperate on security improvements are highly dependent on the nature of customer response to adverse events. We also examine the investment problem when security attacks on different firms are correlated. Reprinted by permission of Blackwell Publishing |
Author | Yeo, M. Lisa Kolfal, Bora Patterson, Raymond A. |
Author_xml | – sequence: 1 givenname: Bora surname: Kolfal fullname: Kolfal, Bora email: bkolfal@ualberta.ca organization: Department of Accounting, Operations and Information Systems, University of Alberta, AB, T6G 2R6, Edmonton – sequence: 2 givenname: Raymond A. surname: Patterson fullname: Patterson, Raymond A. email: ray.patterson@ualberta.ca organization: Department of Accounting, Operations and Information Systems, University of Alberta, AB, T6G 2R6, Edmonton – sequence: 3 givenname: M. Lisa surname: Yeo fullname: Yeo, M. Lisa email: mlyeo@loyola.edu organization: Department of Information Systems and Operations Management, The Sellinger School of Business and Management, Loyola University Maryland, MD, 21210, Baltimore |
BookMark | eNqFkMFOwkAQhjcGExG9-ARNjIkxKc50u7vdo0HAJlUPYDhuljI1xdJit0R5e4uoBw86l5nD909mvmPWKauSGDtD6GNb1wtK8z4GEPAD1kURgi80ig7rAiD6iqM4YsfOLQFAipB32cW9rV-o8eLV2qaNV5VePPUmlG7qvNl6kzWVi7x8PmGHmS0cnX71HnsaDaeDOz95HMeDm8RPQ6G5TzYjDllEADbSaIXQei4zITJLkls9R8FJBhDxLIjkvD1CLLRqZyUh1Rp4j13u967r6nVDrjGr3KVUFLakauMMCpBcBqjU_2iIESIPdNii57_QZbWpy_YRg1wFKuKAvKWu9lRaV87VlJl1na9svTUIZifX7OSaT7ktjHv4LS9o-wdpboeD-Dvj7zO5a-j9J9P6N1JxJczsYWyms2Q0GoeJSfgH3xGIdQ |
CODEN | DESCDQ |
CitedBy_id | crossref_primary_10_1016_j_ijpe_2016_09_018 crossref_primary_10_1080_0740817X_2015_1125044 crossref_primary_10_1016_j_ejor_2019_09_017 crossref_primary_10_1016_j_eswa_2015_03_033 crossref_primary_10_1111_risa_14186 crossref_primary_10_1111_poms_12681 crossref_primary_10_1002_mde_3560 crossref_primary_10_1145_3505227 crossref_primary_10_1007_s10799_015_0253_1 crossref_primary_10_1016_j_ejor_2015_05_049 crossref_primary_10_1016_j_eswa_2021_114990 |
Cites_doi | 10.1287/mnsc.1070.0794 10.3386/w15183 10.1057/crr.2008.6 10.1007/978-1-4419-6967-5_15 10.1023/A:1024119208153 10.1287/isre.1050.0053 10.1145/581271.581274 10.1016/j.jaccpubpol.2003.09.001 10.2753/MIS0742-1222240110 10.1108/00070700510586498 10.1007/1-4020-8090-5_1 |
ContentType | Journal Article |
Copyright | 2013 The Authors Decision Sciences Journal © 2013 Decision Sciences Institute Copyright American Institute for Decision Sciences Jun 2013 |
Copyright_xml | – notice: 2013 The Authors Decision Sciences Journal © 2013 Decision Sciences Institute – notice: Copyright American Institute for Decision Sciences Jun 2013 |
DBID | BSCLL AAYXX CITATION 7SC 7TB 8BJ 8FD FQK FR3 JBE JQ2 L7M L~C L~D |
DOI | 10.1111/deci.12023 |
DatabaseName | Istex CrossRef Computer and Information Systems Abstracts Mechanical & Transportation Engineering Abstracts International Bibliography of the Social Sciences (IBSS) Technology Research Database International Bibliography of the Social Sciences Engineering Research Database International Bibliography of the Social Sciences ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef International Bibliography of the Social Sciences (IBSS) Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Technology Research Database International Bibliography of the Social Sciences (IBSS) International Bibliography of the Social Sciences (IBSS) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Business |
EISSN | 1540-5915 |
EndPage | 556 |
ExternalDocumentID | 3009251711 10_1111_deci_12023 DECI12023 ark_67375_WNG_TWLFFG4L_L |
Genre | article Feature |
GroupedDBID | -~X .-4 .3N .GA .Y3 05W 0R~ 10A 1OB 1OC 1OL 29F 31~ 33P 3V. 4.4 41~ 50Y 50Z 51W 51Y 52M 52O 52Q 52S 52T 52U 52W 5GY 5HH 5LA 5VS 66C 6P2 702 7PT 7WY 8-0 8-1 8-3 8-4 8-5 85S 88I 8AF 8FE 8FG 8FL 8R4 8R5 8UM 8VB 930 96U 9M8 A04 AABNI AAESR AAHHS AAONW AAOUF AASGY AAXRX AAYJJ AAZKR ABCQN ABCUV ABDPE ABIVO ABJCF ABJNI ABPPZ ABPVW ABSOO ABTAH ABUWG ACAHQ ACBKW ACBWZ ACCFJ ACCZN ACGFO ACGFS ACGOD ACHQT ACIWK ACNCT ACPOU ACSCC ACXQS ADBBV ADEMA ADEOM ADIZJ ADKYN ADMGS ADXAS ADZMN ADZOD AEEZP AEGXH AEIGN AEIMD AEMOZ AEQDE AEUQT AEUYR AFAZI AFBPY AFEBI AFFNX AFFPM AFGKR AFKFF AFKRA AFPWT AFZJQ AHBTC AHEFC AI. AIAGR AIFKG AIURR AIWBW AJBDE AKVCP ALAGY ALEEW ALMA_UNASSIGNED_HOLDINGS ALUQN AMBMR AMYDB ASPBG ASTYK AVWKF AZBYB AZFZN AZQEC AZVAB BAFTC BDRZF BENPR BEZIV BFHJK BGLVJ BKOMP BMKGK BMXJE BNVMJ BPHCQ BQESF BROTX BRXPI BSCLL BY8 C1A CAG CCPQU COF CS3 D-C D-D DC6 DCZOG DPXWK DR2 DRFUL DRSSH DU5 DWQXO E3Z EBA EBO EBR EBS EBU EJD EMK F00 F01 FEDTE FRNLG FZ0 G-S G.N G50 GNUQQ GODZA GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH HCIFZ HF~ HGLYW HVGLF HZI HZ~ H~9 IHE IX1 J0M K1G K48 K60 K6~ L6V LATKE LC2 LC4 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LW6 LYRES M0C M2P M2Q M7S MEWTI MK4 MRFUL MRSSH MSFUL MSSSH MXFUL MXSSH N04 N06 N9A NEJ NF~ O66 O9- OHT OIG P2P P2W P2Y P4C PALCI PQBIZ PQBZA PQQKQ PROAC PSYQQ PTHSS Q.N Q11 Q2X QB0 QWB R.K RIWAO RJQFR ROL RWL RX1 RXW S0X SAMSI SUPJJ TAE TH9 TN5 U5U UB1 UCJ UKR UPT V8K VH1 VQA W8V W99 WBKPD WEBCB WH7 WIH WII WOHZO WQZ WRC WSUWO WXSBR XG1 XSW YQJ ZCA ZL0 ZY4 ZZTAW ~IA ~WP G8K AAYXX CITATION 7SC 7TB 8BJ 8FD FQK FR3 JBE JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c4593-eafe30f8e00a891a5599b6f55fae63a9b153e62083f286b0005d97f28760c9903 |
IEDL.DBID | DR2 |
ISSN | 0011-7315 |
IngestDate | Fri Aug 16 08:01:01 EDT 2024 Sat Aug 17 00:27:26 EDT 2024 Thu Oct 10 17:38:04 EDT 2024 Fri Aug 23 10:51:37 EDT 2024 Sat Aug 24 01:14:07 EDT 2024 Wed Oct 30 09:53:10 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c4593-eafe30f8e00a891a5599b6f55fae63a9b153e62083f286b0005d97f28760c9903 |
Notes | ArticleID:DECI12023 The authors would like to thank the research workshop participants at the University of Calgary, University of Alberta and University of California Riverside, as well as the reviewers and associate editor for their insightful comments on this article. ark:/67375/WNG-TWLFFG4L-L istex:29A9847EE4399B09EC8ED451374D497611D9B778 ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 1372783013 |
PQPubID | 37118 |
PageCount | 40 |
ParticipantIDs | proquest_miscellaneous_1506362177 proquest_miscellaneous_1418113294 proquest_journals_1372783013 crossref_primary_10_1111_deci_12023 wiley_primary_10_1111_deci_12023_DECI12023 istex_primary_ark_67375_WNG_TWLFFG4L_L |
PublicationCentury | 2000 |
PublicationDate | 2013-06 June 2013 2013-06-00 20130601 |
PublicationDateYYYYMMDD | 2013-06-01 |
PublicationDate_xml | – month: 06 year: 2013 text: 2013-06 |
PublicationDecade | 2010 |
PublicationPlace | Atlanta |
PublicationPlace_xml | – name: Atlanta |
PublicationTitle | Decision sciences |
PublicationTitleAlternate | Decision Sciences |
PublicationYear | 2013 |
Publisher | Blackwell Publishing Ltd American Institute for Decision Sciences |
Publisher_xml | – name: Blackwell Publishing Ltd – name: American Institute for Decision Sciences |
References | Gal-Or, E. & Ghose, A. (2005). The economic incentives for sharing security information. Information Systems Research, 16(2), 186-208. Kunreuther, H., & Heal, G. (2003). Interdependent security. Journal of Risk and Uncertainty, 26(2), 231-249. Duh, R.-R., Sunder, S., & Jamal, K. (2002). Control and assurance in e-Commerce: Privacy, integrity, and security at eBay. Taiwan Accounting Review, 3(1), 1-27. Yu, T., & Lester, R. H. (2008). Moving beyond firm boundaries: A social network perspective on reputation spillover. Corporate Reputation Review, 11(1), 94-108. Cavusoglu, H., Cavusoglu, H., & Zhang, J. (2008). Security patch management: Share the burden or share the damage? Management Science, 54(4), 657-670. Gordon, L. A., Loeb, M. P., & Lucyshyn, W. (2003). Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy, 22(6), 461-485. HIPAA. (1996). Health Insurance Portability and Accountability Act of 1996. PUBLIC LAW 104-191 (US). Acohido, B. (2009). Cybercrooks stalk small businesses that bank online. USA Today, accessed February 7, 2013, available at http://usatoday30.usatoday.com/tech/news/computersecurity/2009-12-30-cybercrime-small-business-online-banking_N.htm. Conz, N. (2008). Selling security-Innovative carriers are nurturing a new kind of customer loyalty by establishing themselves as IT security stalwarts. Insurance and Technology, 33(3), 31. Yue, W., & Çakanyildirim, M. (2007). Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24(1), 329-353. Gordon, L. A. & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security, 5(4), 438-457. Allan, A., & Warden, P. (2011). Got an iPhone or 3G iPad? Apple is recording your moves. O'Reilly Radar, accessed February 7, 2013, available at http://radar.oreilly.com/2011/04/apple-location-tracking.html. Freedman, S., Kearney, M. S., & Lederman, M. (2009). Product recalls, imperfect information, and spillover effects: Lessons from the consumer response to the 2007 toy recalls. NBER Working Paper No. 15183. Smed, S., & Jensen, J. (2005). Food safety information and food demand. British Food Journal, 107(3), 173-186. 2012 2011 2010 2002; 5 2009 1998 2008 2002; 3 1996 2007 2011b 2011a 2008; 54 2008; 33 2004 2008; 11 2002 2011; 7 2009b 2009a 2005; 107 2003; 26 2013 2005; 16 2007; 24 2003; 22 Duh R.‐R (e_1_2_6_14_1) 2002; 3 e_1_2_6_32_1 e_1_2_6_31_1 Allan A. (e_1_2_6_3_1) 2011; 7 e_1_2_6_30_1 Conz N (e_1_2_6_10_1) 2008; 33 e_1_2_6_19_1 Krebs B (e_1_2_6_22_1) 2009 e_1_2_6_13_1 e_1_2_6_11_1 e_1_2_6_12_1 e_1_2_6_17_1 e_1_2_6_18_1 e_1_2_6_15_1 e_1_2_6_16_1 e_1_2_6_21_1 e_1_2_6_20_1 e_1_2_6_9_1 e_1_2_6_8_1 e_1_2_6_5_1 e_1_2_6_4_1 e_1_2_6_6_1 e_1_2_6_25_1 e_1_2_6_24_1 e_1_2_6_23_1 Acohido B (e_1_2_6_2_1) 2009 e_1_2_6_29_1 e_1_2_6_28_1 e_1_2_6_27_1 Burke R. J (e_1_2_6_7_1) 2011 e_1_2_6_26_1 |
References_xml | – year: 2008 article-title: Maple Leaf Foods plant reopens after listeriosis outbreak – year: 2009 article-title: Cybercrooks stalk small businesses that bank online publication-title: USA Today – year: 1996 article-title: Health Insurance Portability and Accountability Act of 1996 publication-title: PUBLIC LAW 104‐191 – start-page: 31 year: 2011 end-page: 42 – volume: 54 start-page: 657 issue: 4 year: 2008 end-page: 670 article-title: Security patch management: Share the burden or share the damage? publication-title: Management Science – year: 2007 article-title: Data breaches and buyer behavior: Unfolding TJX Press release – year: 2011b article-title: Sony suffers second data breach with theft of 25m more user details – volume: 33 start-page: 31 issue: 3 year: 2008 article-title: Selling security—Innovative carriers are nurturing a new kind of customer loyalty by establishing themselves as IT security stalwarts publication-title: Insurance and Technology – year: 1998 article-title: Data Protection Act 1998 – year: 2013 article-title: PCI SSC Data Security Standards Overview – volume: 7 start-page: 2013 year: 2011 article-title: Got an iPhone or 3G iPad? Apple is recording your moves publication-title: Reilly Radar, accessed February – start-page: 301 year: 2010 end-page: 320 – start-page: 1 year: 2004 end-page: 15 – volume: 11 start-page: 94 issue: 1 year: 2008 end-page: 108 article-title: Moving beyond firm boundaries: A social network perspective on reputation spillover publication-title: Corporate Reputation Review – year: 2011 article-title: 2010 annual study: U – volume: 16 start-page: 186 issue: 2 year: 2005 end-page: 208 article-title: The economic incentives for sharing security information publication-title: Information Systems Research – year: 2011 article-title: Pending cyber security bills 03‐19‐11 – volume: 107 start-page: 173 issue: 3 year: 2005 end-page: 186 publication-title: British Food Journal – year: 2011 article-title: Massive breach at Epsilon compromises customer lists of major brands – year: 2009b article-title: The growing threat to business banking online – volume: 5 start-page: 438 issue: 4 year: 2002 end-page: 457 article-title: The economics of information security investment publication-title: ACM Transactions on Information and System Security – volume: 24 start-page: 329 issue: 1 year: 2007 end-page: 353 article-title: Intrusion prevention in information systems: Reactive and proactive responses publication-title: Journal of Management Information Systems – volume: 3 start-page: 1 issue: 1 year: 2002 end-page: 27 article-title: Control and assurance in e‐Commerce: Privacy, integrity, and security at eBay publication-title: Taiwan Accounting Review – year: 2012 article-title: ISO 27001 & Information Security – volume: 26 start-page: 231 issue: 2 year: 2003 end-page: 249 article-title: Interdependent security publication-title: Journal of Risk and Uncertainty – year: 2011 article-title: Sony PlayStation suffers massive data breach – year: 2009a – year: 2011a article-title: iPhone keeps record of everywhere you go – start-page: 15183 year: 2009 – volume: 22 start-page: 461 issue: 6 year: 2003 end-page: 485 article-title: Sharing information on computer systems security: An economic analysis publication-title: Journal of Accounting and Public Policy – year: 2002 article-title: California Senate Bill: Personal information: privacy – ident: e_1_2_6_8_1 doi: 10.1287/mnsc.1070.0794 – ident: e_1_2_6_20_1 – ident: e_1_2_6_23_1 – ident: e_1_2_6_26_1 – volume: 7 start-page: 2013 year: 2011 ident: e_1_2_6_3_1 article-title: Got an iPhone or 3G iPad? Apple is recording your moves publication-title: Reilly Radar, accessed February contributor: fullname: Allan A. – start-page: 31 volume-title: Corporate reputation: Managing opportunities & threats year: 2011 ident: e_1_2_6_7_1 contributor: fullname: Burke R. J – ident: e_1_2_6_15_1 doi: 10.3386/w15183 – volume-title: Washington Post year: 2009 ident: e_1_2_6_22_1 contributor: fullname: Krebs B – ident: e_1_2_6_31_1 doi: 10.1057/crr.2008.6 – ident: e_1_2_6_9_1 doi: 10.1007/978-1-4419-6967-5_15 – ident: e_1_2_6_11_1 – ident: e_1_2_6_28_1 – ident: e_1_2_6_4_1 – ident: e_1_2_6_25_1 – ident: e_1_2_6_24_1 doi: 10.1023/A:1024119208153 – ident: e_1_2_6_19_1 – year: 2009 ident: e_1_2_6_2_1 article-title: Cybercrooks stalk small businesses that bank online publication-title: USA Today contributor: fullname: Acohido B – ident: e_1_2_6_5_1 – ident: e_1_2_6_16_1 doi: 10.1287/isre.1050.0053 – ident: e_1_2_6_27_1 – ident: e_1_2_6_17_1 doi: 10.1145/581271.581274 – ident: e_1_2_6_13_1 – ident: e_1_2_6_21_1 – ident: e_1_2_6_18_1 doi: 10.1016/j.jaccpubpol.2003.09.001 – ident: e_1_2_6_6_1 – ident: e_1_2_6_32_1 doi: 10.2753/MIS0742-1222240110 – volume: 33 start-page: 31 issue: 3 year: 2008 ident: e_1_2_6_10_1 article-title: Selling security—Innovative carriers are nurturing a new kind of customer loyalty by establishing themselves as IT security stalwarts publication-title: Insurance and Technology contributor: fullname: Conz N – ident: e_1_2_6_12_1 – volume: 3 start-page: 1 issue: 1 year: 2002 ident: e_1_2_6_14_1 article-title: Control and assurance in e‐Commerce: Privacy, integrity, and security at eBay publication-title: Taiwan Accounting Review contributor: fullname: Duh R.‐R – ident: e_1_2_6_29_1 doi: 10.1108/00070700510586498 – ident: e_1_2_6_30_1 doi: 10.1007/1-4020-8090-5_1 |
SSID | ssj0006543 |
Score | 2.158069 |
Snippet | ABSTRACT
Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely... Traditionally, IT security investment decisions are made in isolation. However, as firms that compete for customers in an industry are closely interlinked, a... |
SourceID | proquest crossref wiley istex |
SourceType | Aggregation Database Publisher |
StartPage | 517 |
SubjectTerms | Asymmetry Capital investments Continuous-Time Markov Chain Decision analysis Direct and Cross-Risk Elasticity of Demand Duopoly Economic behaviour Elasticity Information technology Investment decision IT Security Markovian processes Regulation Security Security management Studies |
Title | Market Impact on IT Security Spending |
URI | https://api.istex.fr/ark:/67375/WNG-TWLFFG4L-L/fulltext.pdf https://onlinelibrary.wiley.com/doi/abs/10.1111%2Fdeci.12023 https://www.proquest.com/docview/1372783013 https://search.proquest.com/docview/1418113294 https://search.proquest.com/docview/1506362177 |
Volume | 44 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3da9swED9KB2Uv29p1zF1WXLr2YaBgWR-OYS-jTdqUJA9NQvsyhORIUArOWBIY--t3ku007UOhfRP4BDqd7u4n6z4AvqWUiSJPHWEzIwl3QhKTdgzx6LzglhZO-xfd4UheTvnVrbjdgh9NLkxVH2L9w81rRrDXXsG1WWwo-cwWd23qu3-jAaYs8_Fc59cPtaN80mRlhinJGBV1bVIfxvMw9ZE3euM39u8jqLkJWIPH6b2HX81aq0CT-_ZqadrFvydlHF_LzAd4V0PR-Gd1dnZhy5Z7sNNEwn-Ek2HIiI77IZEynpdxfxKP63538dg3z0W_tw_TXndydknqrgqk4CJnxGpnWeI6Nkl0J6falxwz0gnhtJVM5wZtoJUpQjOXdmQAdbM8w3EmkwJ9F_sE2-W8tJ8hFpq6xHCXSpZwJ502WTqzrMgMRxxieATHze6q31XxDNVcOjzHKnAcwWnY-DUJMufDzTKhbkYXanIz6PUu-EANImg1klG1pi0USt43C0EkG8HR-jPqiH_40KWdr5CGI47Ba3fOn6ERCNYkXtCyCL4HUT2zZHXePeuH0cFLiL_A27TqpkES2oLt5Z-V_YqYZmkOw9n9Dy8q7cI |
link.rule.ids | 315,783,787,1378,27936,27937,46306,46730 |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LaxsxEB7SBNpe2vQRus1rQx-Hgsxq9VjvsSRx7Mb2oXFIbkJaS1AK69LYUPrrM6NdO49DILkJdgQ7kkbzSZqZD-BzzoWqyjwwMXWayaA0c3nXMULnlfS8CpZedEdj3T-XPy7VZRubQ7kwTX2I1YUbWUbcr8nA6UL6lpVPffWrw4n--xlsoL0LYm44-nlTPYrSJpuNmLNCcNVWJ6VAnpu-d_zRBg3tvztg8zZkjT6n97ohVr2KpQop1OR3ZzF3ner_vUKOT1ZnE161aDT93iyfN7Dm67fwfBkM_w6-jGJSdDqIuZTprE4Hk_SspbxLz4g_F13fezjvHU8O-6wlVmCVVKVg3gYvstD1WWa7JbdUdczpoFSwXgtbOtwGvc4RnYW8qyOum5YFtgudVei-xBas17Paf4BUWR4yJ0OuRSaDDtYV-dSLqnASoYiTCXxaDq_509TPMMtzB2lsosYJfI0jvxJB5SjirFDmYnxiJhfDXu9EDs0wgZ3l1JjW2K4MFwXxhSCYTeBg9RnNhN4-bO1nC5SRCGXw5F3KB2QU4jWNZ7QigW9xrh74ZXN0fDiIrY-PEd6HF_3JCDUZjE-34WXekGuwjO_A-vzvwu8ixJm7vbiQrwEPqvHa |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dSxwxEB-sgvSlta2la9VuaetDIcdm87G34Iuoq9eeR6kn-iIh2U1AhL3D3kHxr3eS3T0_HoT2LbATyEwyM79s5gPga0qZKPPUEVYZSbgTkpi0b4hH5yW3tHTav-iejOTxGf9xIS6WYLfLhWnqQyx-uHnNCPbaK_i0cg-UvLLlVY_67t8vYIVLhL4eEv2-Lx7lsyYbO0xJxqhoi5P6OJ77uY_c0YqX7N9HWPMhYg0up3gNl91im0iT6958Znrl7ZM6jv_LzRq8arFovNccnjewZOu3sNqFwr-DbychJToehEzKeFLHg3F82ja8i09991x0fOtwVhyO949J21aBlFzkjFjtLEtc3yaJ7udU-5pjRjohnLaS6dygEbQyRWzm0r4MqK7KMxxnMinRebH3sFxPavsBYqGpSwx3KYqfO-m0ydLKsjIzHIGI4RF86aSrpk31DNXdOjzHKnAcwU4Q_IIEmfPxZplQ56MjNT4fFsURH6phBJvdzqhW1f4oyjLfLQShbASfF59RSfzLh67tZI40HIEM3rtz_gyNQLQm8YaWRfA9bNUzS1YHh_uDMNr4F-JPsPrroFDDwejnR3iZNp01SEI3YXl2M7dbiG9mZjsc4zs_rfCJ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Market+Impact+on+IT+Security+Spending&rft.jtitle=Decision+sciences&rft.au=Kolfal%2C+Bora&rft.au=Patterson%2C+Raymond+A&rft.au=Yeo%2C+M+Lisa&rft.date=2013-06-01&rft.pub=American+Institute+for+Decision+Sciences&rft.issn=0011-7315&rft.eissn=1540-5915&rft.volume=44&rft.issue=3&rft.spage=517&rft_id=info:doi/10.1111%2Fdeci.12023&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=3009251711 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0011-7315&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0011-7315&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0011-7315&client=summon |