|
[1]
|
黄道丽. 网络安全漏洞披露规则及其体系设计[J]. 暨南学报(哲学社会科学版), 2018(1): 94-106.
|
|
[2]
|
Gordon, L.A., Loeb, M.P. and Lucyshyn, W. (2003) Sharing Information on Computer Systems Security: An Economic Analysis. Journal of Accounting and Public Policy, 22, 461-485. [Google Scholar] [CrossRef]
|
|
[3]
|
Ransbotham, S., Mitra, S. and Ramsey, J. (2012) Are Markets for Vulnerabilities Effective? MIS Quarterly, 36, 43-64. [Google Scholar] [CrossRef]
|
|
[4]
|
Cavusoglu, H., Cavusoglu, H. and Raghunathan, S. (2007) Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. IEEE Transactions on Software Engineering, 33, 171-185. [Google Scholar] [CrossRef]
|
|
[5]
|
Gordon, L.A., Loeb, M.P. and Sohail, T. (2010) Market Value of Voluntary Disclosures Concerning Information Security. MIS Quarterly, 34, 567-594. [Google Scholar] [CrossRef]
|
|
[6]
|
Lei, M., Zhou, S.L., Yang, X.X., et al. (2012) The Consequences of Information Technology Control Weaknesses on Management Information Systems: The Case of Sarbanes-Oxley Internal Control Reports. MIS Quarterly, 36, 179-203. [Google Scholar] [CrossRef]
|
|
[7]
|
Wang, T., Kannan, K.N. and Ulmer, J.R. (2013) The Association between the Disclosure and the Realization of Information Security Risk Factors. Information Systems Research, 24, 201-218. [Google Scholar] [CrossRef]
|
|
[8]
|
Tang, Q. and Whinston, A.B. (2015) Improving Internet Security through Mandatory Information Disclosure. 2015 48th Hawaii International Conference on System Sciences, Kauai, 5-8 January 2015, 4813-4823. [Google Scholar] [CrossRef]
|
|
[9]
|
Mitra, S. and Ransbotham, S. (2015) Information Disclosure and the Diffusion of Information Security Attacks. Information Systems Research, 26, 565-584. [Google Scholar] [CrossRef]
|
|
[10]
|
Hausken, K. (2017) Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Games, 8, 1-23. [Google Scholar] [CrossRef]
|
|
[11]
|
尹建国. 美国网络信息安全治理机制及其对我国之启示[J]. 法商研究, 2013, 30(2): 138-146.
|
|
[12]
|
陈美. 国家信息安全协同治理: 美国的经验与启示[J]. 情报杂志, 2014, 33(2): 10-14.
|
|
[13]
|
张涛, 王玥, 黄道丽. 信息系统安全治理框架: 欧盟的经验与启示——基于网络攻击的视角[J]. 情报杂志, 2016, 35(8): 17-24.
|
|
[14]
|
董俊祺. 韩国网络空间的主体博弈对我国信息安全治理的启示——以韩国网络实名制政策为例[J]. 情报科学, 2016, 34(4): 153-157.
|
|
[15]
|
蒋鲁宁. 信息安全供应链的安全[J]. 中国信息安全, 2014(3): 111.
|
|
[16]
|
谢宗晓, 林润辉, 王兴起. 用户参与对信息安全管理有效性的影响——多重中介方法[J]. 管理科学, 2013, 26(3): 65-76.
|
|
[17]
|
林润辉, 谢宗晓, 王兴起, 等. 制度压力、信息安全合法化与组织绩效——基于中国企业的实证研究[J]. 管理世界, 2016, 32(2): 112-127.
|
|
[18]
|
甄杰, 谢宗晓, 林润辉. 治理机制、制度化与企业信息安全绩效[J]. 工业工程与管理, 2018, 23(3): 171-176.
|
|
[19]
|
陈昊, 李文立, 陈立荣. 组织控制与信息安全制度遵守: 面子倾向的调节效应[J]. 管理科学, 2016, 29(3): 1-12.
|
|
[20]
|
甄杰, 谢宗晓, 董坤祥. 信息安全压力与员工违规意愿: 被调节的中介效应[J]. 管理科学, 2018, 31(4): 91-102.
|