H
Hasan Cavusoglu
Researcher at University of British Columbia
Publications - 63
Citations - 2697
Hasan Cavusoglu is an academic researcher from University of British Columbia. The author has contributed to research in topics: Context (language use) & Information security. The author has an hindex of 16, co-authored 53 publications receiving 2300 citations.
Papers
More filters
Journal ArticleDOI
Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness
TL;DR: The results show that an employee's intention to comply with the ISP is significantly influenced by attitude, normative beliefs, and self-efficacy to comply, and the role of ISA and compliance-related beliefs in an organization's efforts to encourage compliance is shed.
Journal ArticleDOI
Security Patch Management: Share the Burden or Share the Damage?
TL;DR: A game-theoretic model to study the strategic interaction between a vendor and a firm in balancing the costs and benefits of patch management and shows that an incentive-compatible contract on cost sharing can be designed to achieve coordination in case of information asymmetry.
Journal ArticleDOI
Institutional pressures in security management
TL;DR: Coercive and normative pressures are found to have not only a direct impact but also an indirect impact through ISNA on organizational investment in ISCR.
Journal ArticleDOI
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems
TL;DR: In this article, the authors study configuration of and interaction between a firewall and intrusion detection systems (IDS) and find that the optimal configuration of an IDS does not change whether it is deployed alone or together with a firewall.
Journal ArticleDOI
Economics of ITSecurity Management: Four Improvements to Current Security Practices
TL;DR: Four important elements that every IT security manager should consider while managing the security function from an economic perspective are presented: estimation of security breach cost, a risk management approach, cost effective technology configuration, and value from deployment of multiple technologies.