Decision quality using ranked attribute weights
Management Science
Time Series Analysis: Forecasting and Control
Time Series Analysis: Forecasting and Control
A framework for classifying denial of service attacks
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Understanding user goals in web search
Proceedings of the 13th international conference on World Wide Web
Using web-based search data to predict macroeconomic statistics
Communications of the ACM
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Information Systems Frontiers
The comparative effectiveness of sponsored and nonsponsored links for Web e-commerce queries
ACM Transactions on the Web (TWEB)
What are people searching on government web sites?
Communications of the ACM
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge
IEEE Transactions on Software Engineering
An examination of private intermediaries' roles in software vulnerabilities disclosure
Information Systems Frontiers
Learning about the world through long-term query logs
ACM Transactions on the Web (TWEB)
Computers in Human Behavior
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Journal of Management Information Systems
Empirical Estimates and Observations of 0Day Vulnerabilities
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Vulnerability Black Markets: Empirical Evidence and Scenario Simulation
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Studying users' computer security behavior: A health belief perspective
Decision Support Systems
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Financial Cryptography and Data Security
Information Systems Research
Network intrusion and fault detection: a statistical anomaly approach
IEEE Communications Magazine
A novel approach to evaluate software vulnerability prioritization
Journal of Systems and Software
Hi-index | 0.00 |
More and more people use search engines to seek for various information. This study investigates the search behavior that drives the search for information security knowledge via a search engine. Based on theories in information search and information security behavior we examine the effects of network attacks and vulnerability disclosures on search for information security knowledge by ordinary users. We construct a unique dataset from publicly available sources, and use a dynamic regression model to test the hypotheses empirically. We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search. Implications of the study are discussed.