This work is licensed under a
Creative Commons Attribution 4.0 International License
Basu, Amit, A Metagraph View-Based Approach to Multi-firm Process coordination", Proceedings of the CAiSE, 05 Forum, Porto, Portugal, (2005).
Basu, Amit, Robert Blanning, Management Science 44 (7) (1998) 982-995.
Baskerville Richard, Journal of Information System Security 1(1) (2005) 23-50.
Basu Amit, Robert Blanning, Management Science 40(12) (1994) 1579-1600.
Richardson Karen, Keeping Accounting Close to Home--Firms Shun Outsourcers as Sarbanes-Oxley Fears Outweigh Any Cost Savings, The Wall Street Journal, 19 May, 2006, C3.
Ransbotham Sam, Mitra Sabyasachi, Analyzing Business Process Security using Attributed Metagraphs, 16th Annual Workshop on Information Technologies & Systems (WITS) Paper.
Basu Amit, Robert W. Blanning, Information Systems Research 11(1) (2000) 17-36.
Barkataki Sharad, Mapping Petri Nets and Metagraphs: A Step Towards Inter- Organizational Workflows, Proceedings of the 9th Americas Conference on Information Systems, (2003).
Basu Amit, Robert W. Blanning, Workflow Analysis using Attributed Metagraphs, Proceedings of the 34th Hawaii International Conference on System Sciences, Maui, (2001).
Basu Amit, Robert W. Blanning, Information Systems Research 14(4) (2003) 337-355.
Bhargava Hermant K., Steven O. Kimbrough, Ramayya Krishnan, ORSA Journal on Computing 3(2) (1991) 107-120.
Basu Amit, Akhil Kumar, Information Systems Research 13(1) (2002) 1-14.
Kriplani Manjeet, BusinessWeek 3996(7) (2006) 40.
Van der Aalst W. M. P., The Journal of Circuits, Systems and Computers 8(1) (1998) 21-66.
Federal Bureau of Investigation, IC3 2005 Internet Crime Report, 2005, 1-27.
Hamming Richard W., Bell System Technical Journal 29(2) (1950) 147-160.
http: /www. computer. org/csdl/proceedings/iccsit/2008/3308/00/3308a729-abs. html.
http: /www. ijcaonline. org/archives/volume56/number6/8893-2910 ( Received 10 June 2013; accepted 16 June 2013 ).
[1] N. Doherty, S. Tajuddin, "Towards a user-centric theory of value-driven information security compliance", Information Technology & People, Vol. 31, p. 348, 2018
DOI: https://doi.org/10.1108/ITP-08-2016-0194[2] P. Wortman, J. Chandy, "SMART: security model adversarial risk-based tool for systems security design evaluation", Journal of Cybersecurity, Vol. 6, 2020
DOI: https://doi.org/10.1093/cybsec/tyaa003[3] P. Wortman, F. Tehranipoor, J. Chandy, "An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design", 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), p. 1, 2018
DOI: https://doi.org/10.1109/CyberSecPODS.2018.8560685