1 |
Trustwave, 2012 Global Security Report, Trustwave, 2012.
|
2 |
A. G. Kotulic and J. G. Clark, "Why there aren't more information security research studies," Information & Management, Vol. 41, Issue 5, pp. 597-607, May, 2004.
DOI
|
3 |
KISA, 2010 Information Security Survey: Firm-level, KISA, Seoul, 2011.
|
4 |
KISA, 2010 Information Security Survey: Individual-level, KISA, Seoul, 2011.
|
5 |
P. Rosenbaum and D. Rubin, "Reducing bias in observational studies using subclassification on the propensity score," Journal of the American Statistical Association, Vol. 79, No. 387, pp.516-524, Sep, 1984.
DOI
|
6 |
H. Park and I. Shin, "Estimating the Effect on firm's productivity of Enterprise Software using PSM," Journal of Economics and Commerce, Vol. 28, No. 1-2. pp.1-28, Dec, 2014.
|
7 |
P. C. Austin, "Some Methods of Propensity-Score Matching had Superior Performance to Others: Results of an Empirical Investigation and Monte Carlo simulations," Biometrical Journal, Vol. 51, No. 1. pp.171-184, Feb, 2008.
DOI
|
8 |
R. H. Dehejia and S. Wahba, "Propensity score matching methods for non-experimental causal studies," Review of Economics and Statistics, Vol. 84, No. 1. pp.151-161, Feb, 2002.
DOI
|
9 |
R. B. d'Agostino, Jr, "Tutorial in Biostatistics Propensity score methods for bias reduction in the comparison of a treatment to a non-randomized control group," Stat Med, Vol. 17, No. 19, pp.2265-2281, Oct, 1998.
DOI
|
10 |
W. Lee, "Propensity score matching and variations on the balancing test," Empirical Economics, Vol. 44, No. 1, pp.47-80, Feb, 2013.
DOI
|