-
1
-
-
0013323636
-
Lotsa talk, little walk
-
Anthes G.H. Lotsa talk, little walk. Computerworld. 32(38):1998;70-71.
-
(1998)
Computerworld
, vol.32
, Issue.38
, pp. 70-71
-
-
Anthes, G.H.1
-
2
-
-
21344459955
-
Structures of responsibility and security of information systems
-
Backhouse J., Dhillon G. Structures of responsibility and security of information systems. European Journal of Information Systems. 5(1):1996;2-9.
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-9
-
-
Backhouse, J.1
Dhillon, G.2
-
4
-
-
0013323252
-
Modern network complexity needs comprehensive security
-
Barsanti C. Modern network complexity needs comprehensive security. Security. 36(7):1999;65-68.
-
(1999)
Security
, vol.36
, Issue.7
, pp. 65-68
-
-
Barsanti, C.1
-
5
-
-
0013324190
-
Risk analysis: An interpretive feasibility tool in justifying information systems security
-
Baskerville R. Risk analysis. An interpretive feasibility tool in justifying information systems security European Journal of Information Systems. 1:1991;121-130.
-
(1991)
European Journal of Information Systems
, vol.1
, pp. 121-130
-
-
Baskerville, R.1
-
7
-
-
9744281201
-
Key issues in information systems management: 1994-95 SIM Delphi results
-
Brancheau J.C., Janz B.D., Wetherbe J.C. Key issues in information systems management. 1994-95 SIM Delphi results MIS Quarterly. 20(2):1996;225-242.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 225-242
-
-
Brancheau, J.C.1
Janz, B.D.2
Wetherbe, J.C.3
-
8
-
-
0013417916
-
The new age of anxiety
-
Burger K. The new age of anxiety. Insurance and Technology. 18(10):1993;48-54.
-
(1993)
Insurance and Technology
, vol.18
, Issue.10
, pp. 48-54
-
-
Burger, K.1
-
10
-
-
0042500199
-
-
Calgary, AB: University of Calgary
-
Chin W. PLS-Graph: Version 2.7. 1994;University of Calgary, Calgary, AB.
-
(1994)
PLS-Graph: Version 2.7
-
-
Chin, W.1
-
13
-
-
0000935861
-
Research in criminal deterrence: Laying the groundwork for the second decade
-
N. Morris & M. Tonry (Eds.). Chicago, IL: University of Chicago Press
-
Cook, P. J. (1982). Research in criminal deterrence: Laying the groundwork for the second decade. In N. Morris & M. Tonry (Eds.), Crime and justice: An annual review of research (pp. 211-268). Chicago, IL: University of Chicago Press.
-
(1982)
Crime and Justice: An Annual Review of Research
, pp. 211-268
-
-
Cook, P.J.1
-
15
-
-
0000277455
-
Organizational innovation: A meta-analysis of effects of determinants and moderators
-
Damanpour F. Organizational innovation. A meta-analysis of effects of determinants and moderators Academy of Management Journal. 34(3):1991;555-590.
-
(1991)
Academy of Management Journal
, vol.34
, Issue.3
, pp. 555-590
-
-
Damanpour, F.1
-
16
-
-
0002681615
-
Determinants of success for computer usage in small business
-
Delone W.H. Determinants of success for computer usage in small business. MIS Quarterly. 12(1):1988;51-61.
-
(1988)
MIS Quarterly
, vol.12
, Issue.1
, pp. 51-61
-
-
Delone, W.H.1
-
17
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon G., Backhouse J. Information system security management in the new millennium. Communications of the ACM. 43(7):2000;125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
18
-
-
0001049818
-
Organizational context and the success of management information systems
-
Ein-Dor P., Segev E. Organizational context and the success of management information systems. Management Science. 24(10):1978;1064-1077.
-
(1978)
Management Science
, vol.24
, Issue.10
, pp. 1064-1077
-
-
Ein-Dor, P.1
Segev, E.2
-
19
-
-
0024129483
-
Computer security policy: Important issues
-
Eloff J.H.P. Computer security policy. Important issues Computers and Security. 7(6):1988;559-562.
-
(1988)
Computers and Security
, vol.7
, Issue.6
, pp. 559-562
-
-
Eloff, J.H.P.1
-
23
-
-
0001823869
-
Security concerns of system users: A study of perceptions of the adequacy of security
-
Goodhue D.L., Straub D.W. Security concerns of system users. A study of perceptions of the adequacy of security Information and Management. 20(1):1991;13-27.
-
(1991)
Information and Management
, vol.20
, Issue.1
, pp. 13-27
-
-
Goodhue, D.L.1
Straub, D.W.2
-
25
-
-
0003506109
-
-
Englewood Cliffs, NJ: Prentice-Hall
-
Hair J.F., Anderson R.E., Tatham R.L., Black W.C. Multivariate data analysis with readings. 1998;Prentice-Hall, Englewood Cliffs, NJ.
-
(1998)
Multivariate Data Analysis with Readings
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
26
-
-
0013422604
-
The 9 to 5 underground: Are you policing computer crimes?
-
P. Gray, W. R. King, E. R. Mclean, & H. Watson (Eds.). Fort Worth, TX: Harcourt Brace
-
Hoffer, J. A., & Straub, D. W. (1994). The 9 to 5 underground: Are you policing computer crimes? In P. Gray, W. R. King, E. R. Mclean, & H. Watson (Eds.), Management of information systems (pp. 388-401). Fort Worth, TX: Harcourt Brace.
-
(1994)
Management of Information Systems
, pp. 388-401
-
-
Hoffer, J.A.1
Straub, D.W.2
-
27
-
-
0001366346
-
Information technology and corporate strategy: A view from the top
-
Jarvenpaa S.L., Ives B. Information technology and corporate strategy. A view from the top Information Systems Research. 1(4):1990;351-375.
-
(1990)
Information Systems Research
, vol.1
, Issue.4
, pp. 351-375
-
-
Jarvenpaa, S.L.1
Ives, B.2
-
28
-
-
0002904380
-
Organizational characteristics and information systems planning: An empirical study
-
King W.R. Organizational characteristics and information systems planning. An empirical study Information Systems Research. 5(2):1994;75-109.
-
(1994)
Information Systems Research
, vol.5
, Issue.2
, pp. 75-109
-
-
King, W.R.1
-
29
-
-
85021329238
-
Some minimum requirements for legal sanctioning systems special emphasis on detection
-
A. Blumstein, J. Cohen, & D. Nagin. Washington, DC: National Academy of Sciences
-
Klete H. Some minimum requirements for legal sanctioning systems special emphasis on detection. Blumstein A., Cohen J., Nagin D. Deterrence and incapacitation: Estimating the effects of criminal sanctions on crime rates. 1978;National Academy of Sciences, Washington, DC.
-
(1978)
Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
-
-
Klete, H.1
-
30
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch K.D., Carr H.H., Warkentin M.E. Threats to information systems. Today's reality, yesterday's understanding MIS Quarterly. 17(2):1992;173-186.
-
(1992)
MIS Quarterly
, vol.17
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
31
-
-
0018012506
-
Management policies and procedures needed for effective computer security
-
Madnick S. Management policies and procedures needed for effective computer security. Sloan Management Review. 20(1):1978;61-74.
-
(1978)
Sloan Management Review
, vol.20
, Issue.1
, pp. 61-74
-
-
Madnick, S.1
-
34
-
-
0028713556
-
Development of security policies
-
Olnes J. Development of security policies. Computers and Security. 13(8):1994;628-636.
-
(1994)
Computers and Security
, vol.13
, Issue.8
, pp. 628-636
-
-
Olnes, J.1
-
35
-
-
0011410153
-
Informationweek/Ernst and Young security survey
-
Panettieri J.C. Informationweek/Ernst and Young security survey. Informationweek. 555:1995;32-37.
-
(1995)
Informationweek
, vol.555
, pp. 32-37
-
-
Panettieri, J.C.1
-
39
-
-
70449781351
-
Organizational context and information systems success: A contingency approach
-
Raymond L. Organizational context and information systems success. A contingency approach Journal of Management Information Systems. 6(4):1990;5-20.
-
(1990)
Journal of Management Information Systems
, vol.6
, Issue.4
, pp. 5-20
-
-
Raymond, L.1
-
40
-
-
0003186053
-
An empirical investigation of factors influencing the success of customer oriented strategic systems
-
Reich B.H., Benbasat I. An empirical investigation of factors influencing the success of customer oriented strategic systems. Information Systems Research. 1(3):1990;325-347.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 325-347
-
-
Reich, B.H.1
Benbasat, I.2
-
41
-
-
84925902298
-
Toward a theory of criminal deterrence
-
Silberman M. Toward a theory of criminal deterrence. American Sociological Review. 41:1976;442-461.
-
(1976)
American Sociological Review
, vol.41
, pp. 442-461
-
-
Silberman, M.1
-
43
-
-
0013417738
-
Computer abuse and computer security: Update on an empirical study
-
Straub D.W. Computer abuse and computer security. Update on an empirical study Security, Audit, and Control Review. 4(2):1986;21-31.
-
(1986)
Security, Audit, and Control Review
, vol.4
, Issue.2
, pp. 21-31
-
-
Straub, D.W.1
-
44
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub D.W. Effective IS security. An empirical study Information Systems Research. 1(3):1990;255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
45
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub D.W., Nance W.D. Discovering and disciplining computer abuse in organizations. A field study MIS Quarterly. 14(1):1990;45-60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
46
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub D.W., Welke R.J. Coping with systems risk. Security planning models for management decision making MIS Quarterly. 22(4):1998;441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
47
-
-
0030488640
-
Top management support, external expertise and information systems implementation in small businesses
-
Thong J.Y.L., Yap C.S., Raman K.S. Top management support, external expertise and information systems implementation in small businesses. Information Systems Research. 7(2):1996;248-267.
-
(1996)
Information Systems Research
, vol.7
, Issue.2
, pp. 248-267
-
-
Thong, J.Y.L.1
Yap, C.S.2
Raman, K.S.3
-
48
-
-
0013417739
-
Disaster recovery planning still lags
-
Verton D. Disaster recovery planning still lags. Computerworld. 36(14):2002;10.
-
(2002)
Computerworld
, vol.36
, Issue.14
, pp. 10
-
-
Verton, D.1
-
52
-
-
84935665607
-
Perceptual research on general deterrence: A critical review
-
Williams K.R., Hawkins R. Perceptual research on general deterrence. A critical review Law and Society. 20(4):1986;545-572.
-
(1986)
Law and Society
, vol.20
, Issue.4
, pp. 545-572
-
-
Williams, K.R.1
Hawkins, R.2
-
53
-
-
0023401519
-
Information systems security: Management success factors
-
Wood C.C. Information systems security. Management success factors Computers and Security. 4(6):1987;314-320.
-
(1987)
Computers and Security
, vol.4
, Issue.6
, pp. 314-320
-
-
Wood, C.C.1
-
54
-
-
0001761622
-
Information system success factors in small business
-
Yap C.S., Soh C.P.P., Raman K.S. Information system success factors in small business. Omega. 20(5):1992;597-609.
-
(1992)
Omega
, vol.20
, Issue.5
, pp. 597-609
-
-
Yap, C.S.1
Soh, C.P.P.2
Raman, K.S.3
|