Follow
Eliot Rich
Eliot Rich
Verified email at albany.edu - Homepage
Title
Cited by
Cited by
Year
A behavioral theory of insider-threat risks: A system dynamics approach
IJ Martinez-Moyano, E Rich, S Conrad, DF Andersen, TR Stewart
ACM Transactions on Modeling and Computer Simulation (TOMACS) 18 (2), 1-27, 2008
1202008
The disconfirmatory interview as a strategy for the assessment of system dynamics models
DL Andersen, LF Luna‐Reyes, VG Diker, L Black, E Rich, DF Andersen
System Dynamics Review 28 (3), 255-275, 2012
1042012
Using System Dynamics modelling approach to develop management tools for animal production with emphasis on small ruminants
LO Tedeschi, CF Nicholson, E Rich
Small Ruminant Research 98 (1-3), 102-110, 2011
942011
Preliminary system dynamics maps of the insider cyber-threat problem
DF Andersen, D Cappelli, JJ Gonzalez, M Mojtahedzadeh, A Moore, ...
Proceedings of the 22nd International Conference of the System dynamics …, 2004
892004
Learning before the storm: Modeling multiple stakeholder activities in support of crisis management, a practical case
J Hernantes, E Rich, A Laugé, L Labaka, JM Sarriegi
Technological Forecasting and Social Change 80 (9), 1742-1755, 2013
702013
Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland
G Schryen, E Rich
IEEE Transactions on Information Forensics and Security 4 (4), 729-744, 2009
632009
Environmental management evolution framework: Maturity stages and causal loops
M Ormazabal, E Rich, JM Sarriegi, E Viles
Organization & Environment 30 (1), 27-50, 2017
512017
Overcoming organizational challenges to secure knowledge management
FO Sveen, E Rich, M Jager
Information Systems Frontiers 9, 481-492, 2007
472007
Simulating insider cyber-threat risks: A model-based case and a case-based model
E Rich, IJ Martinez-Moyano, S Conrad, DM Cappelli, AP Moore, ...
Proceedings of the 23rd International Conference of the System dynamics …, 2005
462005
Management fads and information delays: An exploratory simulation study
E Rich
Journal of business research 61 (11), 1143-1151, 2008
442008
Exploring the semantic validity of questionnaire scales
KR Larsen, D Nevo, E Rich
Proceedings of the 41st annual Hawaii international conference on system …, 2008
422008
Models for understanding the dynamics of organizational knowledge in consulting firms
E Rich, P Duchessi
Proceedings of the 34th Annual Hawaii International Conference on System …, 2001
402001
Vulnerability black markets: Empirical evidence and scenario simulation
J Radianti, E Rich, JJ Gonzalez
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
302009
Toward viable information security reporting systems
F Olav Sveen, JM Sarriegi, E Rich, JJ Gonzalez
Information Management & Computer Security 15 (5), 408-419, 2007
302007
Modeling the emergence of insider threat vulnerabilities
IJ Martinez-Moyano, SH Conrad, EH Rich, DF Andersen
Proceedings of the 2006 Winter Simulation Conference, 562-568, 2006
302006
Simulation-based learning environments to teach complexity: The missing link in teaching sustainable public management
M Deegan, K Stave, R MacDonald, D Andersen, M Ku, E Rich
Systems 2 (2), 217-236, 2014
282014
Emergent vulnerabilities in integrated operations: a proactive simulation study of economic risk
E Rich, JJ Gonzalez, Y Qian, FO Sveen, J Radianti, S Hillen
International Journal of Critical Infrastructure Protection 2 (3), 110-123, 2009
242009
System dynamics applications to public policy
DF Andersen, E Rich, R Macdonald
System dynamics: Theory and applications, 253-271, 2020
212020
Increasing software security through open source or closed source development? Empirics suggest that we have asked the wrong question
G Schryen, E Rich
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
212010
Maintaining security and safety in high-threat e-operations transitions
E Rich, JJ Gonzalez
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
212006
The system can't perform the operation now. Try again later.
Articles 1–20