Eliot Rich
Eliot Rich
Verified email at albany.edu
Title
Cited by
Cited by
Year
A behavioral theory of insider-threat risks: A system dynamics approach
IJ Martinez-Moyano, E Rich, S Conrad, DF Andersen, TR Stewart
ACM Transactions on Modeling and Computer Simulation (TOMACS) 18 (2), 1-27, 2008
962008
Preliminary system dynamics maps of the insider cyber-threat problem
DF Andersen, D Cappelli, JJ Gonzalez, M Mojtahedzadeh, A Moore, ...
Proceedings of the 22nd International Conference of the System dynamics …, 2004
772004
Using System Dynamics modelling approach to develop management tools for animal production with emphasis on small ruminants
LO Tedeschi, CF Nicholson, E Rich
Small Ruminant Research 98 (1-3), 102-110, 2011
652011
The disconfirmatory interview as a strategy for the assessment of system dynamics models
DL Andersen, LF Luna‐Reyes, VG Diker, L Black, E Rich, DF Andersen
System Dynamics Review 28 (3), 255-275, 2012
622012
Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland
G Schryen, E Rich
IEEE Transactions on Information Forensics and Security 4 (4), 729-744, 2009
462009
Learning before the storm: Modeling multiple stakeholder activities in support of crisis management, a practical case
J Hernantes, E Rich, A Laugé, L Labaka, JM Sarriegi
Technological Forecasting and Social Change 80 (9), 1742-1755, 2013
442013
Overcoming organizational challenges to secure knowledge management
FO Sveen, E Rich, M Jager
Information Systems Frontiers 9 (5), 481-492, 2007
432007
Simulating insider cyber-threat risks: A model-based case and a case-based model
E Rich, IJ Martinez-Moyano, S Conrad, DM Cappelli, AP Moore, ...
Proceedings of the 23rd International Conference of the System dynamics …, 2005
422005
Models for understanding the dynamics of organizational knowledge in consulting firms
E Rich, P Duchessi
Proceedings of the 34th Annual Hawaii International Conference on System …, 2001
372001
Management fads and information delays: An exploratory simulation study
E Rich
Journal of Business Research 61 (11), 1143-1151, 2008
342008
Modeling the emergence of insider threat vulnerabilities
IJ Martinez-Moyano, SH Conrad, EH Rich, DF Andersen
Proceedings of the 2006 Winter Simulation Conference, 562-568, 2006
302006
Exploring the semantic validity of questionnaire scales
KR Larsen, D Nevo, E Rich
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
292008
Toward viable information security reporting systems
S Furnell, N Clarke, FO Sveen, JM Sarriegi, E Rich, JJ Gonzalez
Information Management & Computer Security, 2007
292007
Environmental management evolution framework: Maturity stages and causal loops
M Ormazabal, E Rich, JM Sarriegi, E Viles
Organization & Environment 30 (1), 27-50, 2017
272017
Vulnerability black markets: Empirical evidence and scenario simulation
J Radianti, E Rich, JJ Gonzalez
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
262009
Maintaining security and safety in high-threat e-operations transitions
E Rich, JJ Gonzalez
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
222006
Emergent vulnerabilities in integrated operations: a proactive simulation study of economic risk
E Rich, JJ Gonzalez, Y Qian, FO Sveen, J Radianti, S Hillen
International Journal of Critical Infrastructure Protection 2 (3), 110-123, 2009
202009
Helping prevent information security risks in the transition to integrated operations
JJ Gonzalez, Y Qian, FO Sveen, E Rich
Telektronikk 101 (1), 29, 2005
202005
Simulation-based learning environments to teach complexity: The missing link in teaching sustainable public management
M Deegan, K Stave, R MacDonald, D Andersen, M Ku, E Rich
Systems 2 (2), 217-236, 2014
192014
Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question
G Schryen, E Rich
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
182010
The system can't perform the operation now. Try again later.
Articles 1–20