TOC: Bus Horizons
Introduction
!Business Horizons, 59(6)
GUEST EDITORS’ PERSPECTIVE
Cybersecurity in 2016: People, technology, and processes
–Michael Parent, Brian Cusack [] []
SPECIAL ARTICLES
Impacts of security climate on employees’ sharing of security advice and troubleshooting: Empirical networks
–Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno [] []
The emerging role of the CISO
–Val Hooper, Jeremy McKissack [] []
A multidisciplinary digital forensic investigation process model
–Raymond Lutui [] []
Evaluating single sign-on security failure in cloud services
–Brian Cusack, Eghbal Ghazizadeh [] []
Wearing safe: Physical and informational security in the age of the wearable device
–Adam J. Mills, Richard T. Watson, Leyland Pitt, Jan Kietzmann [] []
Protecting corporate intellectual property: Legal and technical approaches
–Michael G. Crowley, Michael N. Johnstone [] []
EXECUTIVE DIGEST
Managing the transition to the new agile business and product development model: Lessons from Cisco Systems
–Roger (Ronxin) Chen, Ramya Ravichandar, Don Proctor [] []
ACCOUNTING MATTERS
IT cost benchmarking: Drawing the right conclusions
–Vlad Krotov, Blake Ives [] []
MARKETING & TECHNOLOGY
Service, emotional labor, and mindfulness
–Emma (Junhong) Wang, Pierre Berthon, Leyland Pitt, Ian P. McCarthy [] []
FEATURE ARTICLES
The sharing economy: Your business model’s friend or foe?
–Wolfgang Kathan, Kurt Matzler, Viktoria Veider [] [Google Scholar]
Managerial work in the realm of the digital universe: The role of the data triad
–Vijay Khatri [] []
The challenges of and solutions for implementing enterprise risk management
–John R.S. Fraser, Betty J. Simkins [] []
Connecting ethnography to the business of innovation
–Marc H. Meyer, Frederick G. Crane, Chaewon Lee [] []
Bringing new high-technology products to market: Six perils awaiting marketers
–Anirudh Dhebar [] []
