-
1
-
-
0003999818
-
-
Alfred Waller
-
Avison, D.E. and Fitzgerald, G. (1993), Information Systems Development: Methodologies, Techniques, Tools, Alfred Waller.
-
(1993)
Information Systems Development: Methodologies, Techniques, Tools
-
-
Avison, D.E.1
Fitzgerald, G.2
-
2
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. (1993), "Information systems security design methods: implications for information systems development", ACM Computing Surveys, Vol. 25 No. 4.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
-
-
Baskerville, R.1
-
4
-
-
0003285928
-
From subroutines to subsystems: Component-based software development
-
Clements, P. (1995), "From subroutines to subsystems: component-based software development", The American Programmer, Vol. 8 No. 11.
-
(1995)
The American Programmer
, vol.8
, Issue.11
-
-
Clements, P.1
-
5
-
-
0011521131
-
Information systems management in Greece: Issues and perceptions
-
Doukidis, G., Smithson, S. and Naoum, G. (1992), "Information systems management in Greece: issues and perceptions", Journal of Strategic Information Systems, Vol. 1 No. 2.
-
(1992)
Journal of Strategic Information Systems
, vol.1
, Issue.2
-
-
Doukidis, G.1
Smithson, S.2
Naoum, G.3
-
6
-
-
0003988099
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Downs, E., Clare, P. and Coe, I. (1992), SSADM: Application and Context, Prentice-Hall, Englewood Cliffs, NJ.
-
(1992)
SSADM: Application and Context
-
-
Downs, E.1
Clare, P.2
Coe, I.3
-
7
-
-
0029533453
-
There are some cracks in the cornerstone of information security
-
Duncan, R. (1995), "There are some cracks in the cornerstone of information security", Computers & Security, Vol. 14, pp. 675-80.
-
(1995)
Computers & Security
, vol.14
, pp. 675-680
-
-
Duncan, R.1
-
8
-
-
0002359154
-
Action research for the study of organisations
-
Clegg, S.R., Hardu, C. and Nord, W.R. (Eds), Sage, Beverly Hills, CA
-
Eden, C. and Huxham, C. (1996), "Action research for the study of organisations", in Clegg, S.R., Hardu, C. and Nord, W.R. (Eds), Handbook of Organisation Studies, Sage, Beverly Hills, CA.
-
(1996)
Handbook of Organisation Studies
-
-
Eden, C.1
Huxham, C.2
-
9
-
-
0011420621
-
Information security: Process evaluation and product evaluation
-
Qing, S. and Eloff, J. (Eds), Kluwer Academic Publishers, New York, NY
-
Eloff, M., and Von Solms, B. (2000), "Information security: process evaluation and product evaluation", in Qing, S. and Eloff, J. (Eds), Information Security for Global Information Infrastructures, Kluwer Academic Publishers, New York, NY, pp. 11-19.
-
(2000)
Information Security for Global Information Infrastructures
, pp. 11-19
-
-
Eloff, M.1
Von Solms, B.2
-
10
-
-
0034321380
-
Integration of functional, cognitive and quality requirements. A railways case study
-
Felici, M. et al. (2000), "Integration of functional, cognitive and quality requirements. A railways case study", Information and Software Technology, Vol. 42, pp. 993-1000.
-
(2000)
Information and Software Technology
, vol.42
, pp. 993-1000
-
-
Felici, M.1
-
11
-
-
0011515608
-
Is lack of serious acceptance and application of software quality assurance principles a password to information security problems?
-
Fillery, P. and Chantler, A. (1994), "Is lack of serious acceptance and application of software quality assurance principles a password to information security problems?", Proceedings of the IFIP/SEC94.
-
(1994)
Proceedings of the IFIP/SEC94
-
-
Fillery, P.1
Chantler, A.2
-
12
-
-
0000722720
-
An empirical investigation into the adoption of system development methodologies
-
Fitzgerald, B. (1998), "An empirical investigation into the adoption of system development methodologies", Information & Management, Vol. 34, pp. 317-28.
-
(1998)
Information & Management
, vol.34
, pp. 317-328
-
-
Fitzgerald, B.1
-
13
-
-
0011467854
-
An examination of the role of the information systems center
-
Fowler, A. and Wilkinson, T. (1998), "An examination of the role of the information systems center", Journal of Strategic Information Systems, Vol. 7, pp. 87-111.
-
(1998)
Journal of Strategic Information Systems
, vol.7
, pp. 87-111
-
-
Fowler, A.1
Wilkinson, T.2
-
15
-
-
0032624280
-
Security views
-
Hancock, B. (1999), "Security views", Computers & Security, Vol. 18, pp. 646-59.
-
(1999)
Computers & Security
, vol.18
, pp. 646-659
-
-
Hancock, B.1
-
16
-
-
0011418384
-
Integrating data security into the systems development life cycle
-
Hayam, A. and Oz, E. (1993), "Integrating data security into the systems development life cycle", Journal of Systems Management, Vol. 8 No 44, pp. 16-20.
-
(1993)
Journal of Systems Management
, vol.8
, Issue.44
, pp. 16-20
-
-
Hayam, A.1
Oz, E.2
-
17
-
-
0000179686
-
Personal information privacy: Implications for MIS managers
-
Henderson, S. and Snyder, C. (1999), "Personal information privacy: implications for MIS managers", Information & Management, Vol. 36, pp. 213-20.
-
(1999)
Information & Management
, vol.36
, pp. 213-220
-
-
Henderson, S.1
Snyder, C.2
-
18
-
-
0011432676
-
Deficiencies of the traditional approach to information security and the requirements for a new methodology
-
Hitchings, J. (1995), "Deficiencies of the traditional approach to information security and the requirements for a new methodology", Computers & Security, Vol. 14, pp. 377-83.
-
(1995)
Computers & Security
, vol.14
, pp. 377-383
-
-
Hitchings, J.1
-
19
-
-
0041033430
-
The efficacy of matching information systems development methodologies with application characteristics - An empirical study
-
Howard, G.S. et al. (1999), "The efficacy of matching information systems development methodologies with application characteristics - an empirical study", The Journal of Systems and Software, Vol. 45, pp. 177-95.
-
(1999)
The Journal of Systems and Software
, vol.45
, pp. 177-195
-
-
Howard, G.S.1
-
20
-
-
0011517012
-
-
INFOSEC Business Advisory Group, Version 2.0
-
IBAG (1993), Framework for Commercial IT Security, INFOSEC Business Advisory Group, Version 2.0.
-
(1993)
Framework for Commercial IT Security
-
-
-
23
-
-
0001946339
-
A set of principles for conducting and evaluating interpretive field studies in information systems
-
Klein, H. and Myers, M. (1999), "A set of principles for conducting and evaluating interpretive field studies in information systems", MIS Quarterly, Vol. 23 No. 1, pp. 67-94.
-
(1999)
MIS Quarterly
, vol.23
, Issue.1
, pp. 67-94
-
-
Klein, H.1
Myers, M.2
-
28
-
-
84974872728
-
Interpretive case studies in IS research: Nature and method
-
Walsham, G. (1995), "Interpretive case studies in IS research: nature and method", European Journal of Information Systems, Vol. 4, pp. 74-81.
-
(1995)
European Journal of Information Systems
, vol.4
, pp. 74-81
-
-
Walsham, G.1
-
29
-
-
0002005711
-
Understanding user perceptions of information systems success
-
Whyte, G., Bytheway, A. and Edwards, C. (1997), "Understanding user perceptions of information systems success", Journal of Strategic Information Systems, Vol. 6, pp. 35-68.
-
(1997)
Journal of Strategic Information Systems
, vol.6
, pp. 35-68
-
-
Whyte, G.1
Bytheway, A.2
Edwards, C.3
-
30
-
-
0011476534
-
Shifting IS security responsibility from user organisations to vendor/publisher organisations
-
Wood, C.C. (1995), "Shifting IS security responsibility from user organisations to vendor/publisher organisations", Computers & Security, Vol. 14, pp. 283-4.
-
(1995)
Computers & Security
, vol.14
, pp. 283-284
-
-
Wood, C.C.1
-
31
-
-
0011430405
-
ISO 9000 and information security
-
Wood, C.C. and Snow, K. (1995), "ISO 9000 and information security", Computers & Security, Vol. 14, pp. 287-8.
-
(1995)
Computers & Security
, vol.14
, pp. 287-288
-
-
Wood, C.C.1
Snow, K.2
|