-
2
-
-
0025031229
-
Computer security: Planning to protect corporate assets
-
January-February
-
Schwartz, M. "Computer Security: Planning to Protect Corporate Assets," Journal of Business Strategy (11:1), January-February 1990, pp. 38-41.
-
(1990)
Journal of Business Strategy
, vol.11
, Issue.1
, pp. 38-41
-
-
Schwartz, M.1
-
7
-
-
0003811063
-
-
Goodyear Publishing Company, Inc., Santa Monica, CA
-
Stone, E. Research Methods in Organizational Behavior, Goodyear Publishing Company, Inc., Santa Monica, CA, 1978.
-
(1978)
Research Methods in Organizational Behavior
-
-
Stone, E.1
-
8
-
-
0013417738
-
Computer abuse and computer security: Update on an empirical study
-
Spring
-
Straub, D. W. "Computer Abuse and Computer Security: Update on an Empirical Study," Security, Audit, and Control Review (4:2), Spring 1986a, pp. 21-31.
-
(1986)
Security, Audit, and Control Review
, vol.4
, Issue.2
, pp. 21-31
-
-
Straub, D.W.1
-
10
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. W. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), 1990, pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
11
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
March
-
Straub, D. W., and Nance, W. D. "Discovering and Disciplining Computer Abuse in Organizations: A Field Study," MIS Quarterly (14:1), March 1990, pp. 45-62.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-62
-
-
Straub, D.W.1
Nance, W.D.2
-
12
-
-
0021551244
-
Deviancy by bits and bytes: Computer abusers and control measures
-
J. H. Finch and E. G. Dougall (eds.), Elsevier Science Publishers B.V. (North Holland), Amsterdam
-
Straub, D. W., and Widom, C. S. "Deviancy by Bits and Bytes: Computer Abusers and Control Measures," in Computer Security: A Global Challenge, J. H. Finch and E. G. Dougall (eds.), Elsevier Science Publishers B.V. (North Holland), Amsterdam, 1984, pp. 431-442.
-
(1984)
Computer Security: A Global Challenge
, pp. 431-442
-
-
Straub, D.W.1
Widom, C.S.2
-
13
-
-
8744241162
-
Deterring highly motivated computer abusers: A field experiment in computer security
-
G. G. Gable and W. J. Caelli (eds.), North-Holland, Amsterdam
-
Straub, D. W., Carlson, P. J., and Jones, E. H. "Deterring Highly Motivated Computer Abusers: A Field Experiment in Computer Security," in IT Security: The Need for International Cooperation, G. G. Gable and W. J. Caelli (eds.), North-Holland, Amsterdam, 1992, pp. 309-324.
-
(1992)
IT Security: the Need for International Cooperation
, pp. 309-324
-
-
Straub, D.W.1
Carlson, P.J.2
Jones, E.H.3
-
14
-
-
0141463342
-
Deterring cheating by student programmers: A field experiment in computer security
-
Straub, D. W., Carlson, P. J., and Jones, E. H. "Deterring Cheating by Student Programmers: A Field Experiment in Computer Security," Journal of Management Systems (5:1), 1993, pp. 33-48.
-
(1993)
Journal of Management Systems
, vol.5
, Issue.1
, pp. 33-48
-
-
Straub, D.W.1
Carlson, P.J.2
Jones, E.H.3
-
15
-
-
0039818271
-
Research on MIS planning: Some guidelines from strategic planning research
-
Winter
-
Venkatraman, N. "Research on MIS Planning: Some Guidelines from Strategic Planning Research," Journal of Management Information Systems (2:3), Winter 1985-86, pp. 65-77.
-
(1985)
Journal of Management Information Systems
, vol.2
, Issue.3
, pp. 65-77
-
-
Venkatraman, N.1
-
16
-
-
0141917862
-
A framework for information security evaluation
-
March
-
von Solms, R., van de Haar, H., von Solms, S. H., and Caelli, W. J. "A Framework for Information Security Evaluation," Information & Management (26:3), March 1994, pp. 143-153.
-
(1994)
Information & Management
, vol.26
, Issue.3
, pp. 143-153
-
-
Von Solms, R.1
Van De Haar, H.2
Von Solms, S.H.3
Caelli, W.J.4
-
18
-
-
9744223181
-
A context for information systems security planning
-
October
-
Wood, C. C. "A Context for Information Systems Security Planning," Computers & Security (7:5), October 1988, pp. 455-465.
-
(1988)
Computers & Security
, vol.7
, Issue.5
, pp. 455-465
-
-
Wood, C.C.1
|