Follow
Eliot Rich
Eliot Rich
Verified email at albany.edu
Title
Cited by
Cited by
Year
A behavioral theory of insider-threat risks: A system dynamics approach
IJ Martinez-Moyano, E Rich, S Conrad, DF Andersen, TR Stewart
ACM Transactions on Modeling and Computer Simulation (TOMACS) 18 (2), 1-27, 2008
1042008
Preliminary system dynamics maps of the insider cyber-threat problem
DF Andersen, D Cappelli, JJ Gonzalez, M Mojtahedzadeh, A Moore, ...
Proceedings of the 22nd International Conference of the System dynamics …, 2004
862004
The disconfirmatory interview as a strategy for the assessment of system dynamics models
DL Andersen, LF Luna‐Reyes, VG Diker, L Black, E Rich, DF Andersen
System Dynamics Review 28 (3), 255-275, 2012
772012
Using System Dynamics modelling approach to develop management tools for animal production with emphasis on small ruminants
LO Tedeschi, CF Nicholson, E Rich
Small Ruminant Research 98 (1-3), 102-110, 2011
732011
Learning before the storm: Modeling multiple stakeholder activities in support of crisis management, a practical case
J Hernantes, E Rich, A Laugé, L Labaka, JM Sarriegi
Technological Forecasting and Social Change 80 (9), 1742-1755, 2013
602013
Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland
G Schryen, E Rich
IEEE Transactions on Information Forensics and Security 4 (4), 729-744, 2009
552009
Overcoming organizational challenges to secure knowledge management
FO Sveen, E Rich, M Jager
Information Systems Frontiers 9 (5), 481-492, 2007
472007
Simulating insider cyber-threat risks: A model-based case and a case-based model
E Rich, IJ Martinez-Moyano, S Conrad, DM Cappelli, AP Moore, ...
Proceedings of the 23rd International Conference of the System dynamics …, 2005
462005
Environmental management evolution framework: Maturity stages and causal loops
M Ormazabal, E Rich, JM Sarriegi, E Viles
Organization & Environment 30 (1), 27-50, 2017
412017
Management fads and information delays: An exploratory simulation study
E Rich
Journal of Business Research 61 (11), 1143-1151, 2008
392008
Models for understanding the dynamics of organizational knowledge in consulting firms
E Rich, P Duchessi
Proceedings of the 34th Annual Hawaii International Conference on System …, 2001
392001
Exploring the semantic validity of questionnaire scales
KR Larsen, D Nevo, E Rich
Proceedings of the 41st annual Hawaii international conference on system …, 2008
342008
Modeling the emergence of insider threat vulnerabilities
IJ Martinez-Moyano, SH Conrad, EH Rich, DF Andersen
Proceedings of the 2006 Winter Simulation Conference, 562-568, 2006
312006
Toward viable information security reporting systems
FO Sveen, JM Sarriegi, E Rich, JJ Gonzalez
Information Management & Computer Security, 2007
302007
Vulnerability black markets: Empirical evidence and scenario simulation
J Radianti, E Rich, JJ Gonzalez
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
292009
Simulation-based learning environments to teach complexity: The missing link in teaching sustainable public management
M Deegan, K Stave, R MacDonald, D Andersen, M Ku, E Rich
Systems 2 (2), 217-236, 2014
242014
Emergent vulnerabilities in integrated operations: a proactive simulation study of economic risk
E Rich, JJ Gonzalez, Y Qian, FO Sveen, J Radianti, S Hillen
International Journal of Critical Infrastructure Protection 2 (3), 110-123, 2009
222009
Maintaining security and safety in high-threat e-operations transitions
E Rich, JJ Gonzalez
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
222006
Helping prevent information security risks in the transition to integrated operations
JJ Gonzalez, Y Qian, FO Sveen, E Rich
Telektronikk 101 (1), 29, 2005
222005
Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question
G Schryen, E Rich
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
182010
The system can't perform the operation now. Try again later.
Articles 1–20