- 1 Chen, M.J. Competitor analysis and interfirm rivalry: Toward a theoretical integration. Acad. Manage. Review 21, 1 (1996), 100-134.Google ScholarCross Ref
- 2 Chen, M.J., Smith, K.G., and Grimm, K. Action characteristics as predictors of competitive responses. Manage. Sci. 38 (1992), 439-455. Google ScholarDigital Library
- 3 Denning, D., and Branstad, D. A taxonomy of key escrow encryption systems. Comm ACM 39, 3 (March 1996), 34-40. Google ScholarDigital Library
- 4 Ghoshal, S., and Kim, S.K. Building effective intelligence systems for competitive advantage. Sloan Manage. Rev. 28 (1986), 49-58.Google Scholar
- 5 Ghoshal, S., and Westney, D.E. Organizing competitor analysis systems. Strategic Manage. J. 12 (1991), 17-31.Google ScholarCross Ref
- 6 Guilding, C. Competitor-Focused Accounting: An Exploratory Note. Accounting, Organizations and Society 24, 1999, pp. 583-595.Google ScholarCross Ref
- 7 Peyravian, M., Roginsky, A., and Zunic, N. Hash-based encryption. Computers & Security 18, 4 (1999), 345-350.Google Scholar
- 8 Pfleeger, C. Security in Computing (2nd ed.). Prentice-Hall, Englewood, NJ, 1997. Google ScholarDigital Library
- 9 Porter, M.E. Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press, New York, NY, 1980.Google Scholar
- 10 Simmons, G. Cryptanalysis and protocol failures. Comm. ACM 37, 11 (Nov. 1994), 56-64. Google ScholarDigital Library
- 11 Young, M.A. Sources of competitive data for the management strategist. Strategic Manage. J. 10 (1987), 285-293.Google ScholarCross Ref
- 12 Zajac, E.J., and Bazerman, M.H. Blind spots in industry and competitor analysis: Implications of interfirm (MIS) perceptions for strategic decisions. Acad. Manage. Rev. 16 (1991), 37-56.Google ScholarCross Ref
Index Terms
- Using information security as a response to competitor analysis systems
Recommendations
An impact of information security investment on information security incidents: a case of Korean organizations
ICEC '16: Proceedings of the 18th Annual International Conference on Electronic Commerce: e-Commerce in Smart connected WorldInformation security incidents are serious threats for a modern business environment. Firms believe that an investment on information security contribute to firms avoiding security incidents. However, there is a little research on economic outcomes of ...
Information security management: An information security retrieval and awareness model for industry
The purpose of this paper is to present a conceptual view of an Information Security Retrieval and Awareness (ISRA) model that can be used by industry to enhance information security awareness among employees. A common body of knowledge for information ...
Comments