
5. Chen, C. Y. and G. Lindsay (2000). Viruses, Attacks, and Sabotage: It's a
Computer Crime Wave. Fortune. 141: 484-487.
6. Chen, T.M., (2003). “Trends in Viruses and Worms.” The Internet Protocol Journal
6(3): 23-33.
7. Cohen, F (1984). Computer Viruses: Theory and Experiments. Proceedings of the
Second IFIP International Conference on Computer Security, Toronto, Ontario,
Canada.
8. D'Amico, A. (2000). What Does A Computer Security Breach Really Cost?, The
Sans Institute. 2000.
9. Dyckman, T., D. Philbrick, et al. (1984). “A Comparison of Event Study
Methodologies Using Daily Stock Returns: A Simulation Approach.” Journal of
Accounting Research 22: 1-30.
10.Etebari, A., J. O. Horrigan, et al. (1987). "To Be or Not To Be - Reaction of Stock
Returns to Sudden Deaths of Corporate Chief Executive Officers." Journal of
Business Finance & Accounting 14(2): 255-279.
11.Ettredge, M. and V. J. Richardson (2001). Assessing the Risk in E-Commerce.
Twenty-Second International Conference on Information Systems, New Orleans,
LA.
12.Fama, E., L. Fisher, et al. (1969). "The Adjustment of Stock Prices to New
Information." International Economic Review 10: 1-21.
13.Glover, S., S. Liddle, et al. (2001). Electronic Commerce: Security, Risk
Management, and Control. Upper Saddle River, NJ, Prentice Hall.
14.Gordon, L.A. and M.P. Loeb (2002). “The Economics of Information Security
Investment.” ACM Transactions on Information and Systems Security 5(4): 438-
457.
15.Gordon, L.A., M.P. Loeb, et al. (2003) “A Framework for Using Insurance for
Cyber-Risk Management.” Communications of the ACM 46(3): 81-85.
16.Hancock, B. (2002). “Security Crisis Management - The Basics.” Computers &
Security 21(5): 397-401.
17.Hayes, F. (2003). The Story So Far. Computerworld. 37: 26-27.
18.Hinde, S. (2000). "Love Conquers All?" Computers & Security 19(5): 408-420.
19.Hoffer, J. A. and D. W. Straub (1989). "The 9 to 5 Underground: Are You Policing
Computer Crimes?" Sloan Management Review (Summer 1989): 35-43.
20.Hovav, A. and J. D’Arcy (2003) “The Impact of Denial-of-Service
Announcements on the Market Value of Firms.” Risk Management and Insurance
Review, 6(2): 97-121.
21.Howard, J. D. and T. A. Longstaff (1998). A Common Language For Computer
Security Incidents. Pittsburgh, PA, CERT Coordination Center at Carnegie Mellon
University: 1-33.
22.Im, K. S., K. E. Dow, et al. (2001). “A Reexamination of IT Investment and the
Market Value of the Firm: An Event Study Methodology.” Information Systems
Research 12(1): 103-117.
23.Kelly, B. J. (1999). "Preserve, Protect, and Defend." Journal of Business Strategy
(September/October 1999): 22-26.
24.Loderer, C. and D. C. Mauer (1992). “Corporate Dividends and Seasoned Equity
Issues: An Empirical Investigation.” Journal of Finance 47(1): 201-225.
25.Lyman, J. (2002). In Search of the World's Costliest Computer Virus,
www.newsfactor.com/perl/story/16407.html. 2002.
154