Follow
David Coss
Title
Cited by
Cited by
Year
The CIA strikes back: Redefining confidentiality, integrity and availability in security.
S Samonas, D Coss
Journal of Information System Security 10 (3), 2014
3452014
Interpreting the role of disruptive technologies in e‐businesses
G Dhillon, D Coss, R Hackney
Logistics Information Management 14 (1/2), 163-171, 2001
392001
Cloud privacy objectives a value based approach
DL Coss, G Dhillon
Information & Computer Security 27 (2), 189-220, 2019
172019
A framework for auditing and strategizing to ensure cloud privacy
DL Coss, G Dhillon
Journal of Information Systems 34 (2), 47-63, 2020
62020
BIG DATA IN AUDITING: A VALUE-FOCUSED APPROACH TO CYBERSECURITY MANAGEMENT.
DL Coss, K Smith, J Foster, S Dhillon
Journal of Information Systems Security 15 (2), 2019
62019
Individual’s Intentions to use Self Diagnostic Medical Support Systems
DL Coss
62009
INFORMATION PRIVACY LITERATURE: ISSUES AND CHALLENGES.
S Dhillon, DL Coss
Journal of Information System Security 15 (3), 2019
32019
Strategic planning objectives for venture capitalist investments in emerging information technologies: a value-focused perspective
DL Coss, G Dhillon, I Udeh
The Journal of Entrepreneurial Finance (JEF) 17 (1), 27-64, 2015
32015
Cloud privacy audit framework: A value-based design
DL Coss
Virginia Commonwealth University, 2013
12013
The disconnect between tax laws, public opinion and taxpayer compliance: a study of the taxation of gambling winnings
KB Menk, B Nagle, DL Coss
International Journal of Critical Accounting 9 (3), 206-227, 2017
2017
Internal controls and the power of negotiation: the role of identity management in the protection of information assets
DL Coss
Portuguese Journal of Management Studies 19 (1), 7-21, 2014
2014
Ethics of Information Security
I Udeh, G Dhillon, D Coss
Proceedings of the 11th IFIP TC 11.1 Working Conference on Information …, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–12