-
1
-
-
0041482691
-
Sicherheit in Europa
-
Studie 2001, Andersen, Dusseldorf
-
Andersen, I.T. (2001), "Sicherheit in Europa", Studie 2001, Status Quo, Trends, Perspektiven, Studie 2001, Andersen, Dusseldorf.
-
(2001)
Status Quo, Trends, Perspektiven, Studie 2001
-
-
Andersen, I.T.1
-
3
-
-
0041983747
-
Strategy paper
-
28 February
-
Arnott, S. (2002), "Strategy paper", Computing, Vol. 16, 28 February.
-
(2002)
Computing
, vol.16
-
-
Arnott, S.1
-
4
-
-
0041482690
-
The evaluation and certification of information security against BS 7799
-
Barnard, L. and von Solms, R. (1998), "The evaluation and certification of information security against BS 7799", Information Management & Computer Security, Vol. 6 No. 2, pp. 72-7.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.2
, pp. 72-77
-
-
Barnard, L.1
Von Solms, R.2
-
6
-
-
0003693270
-
-
The Dryden Press, Hinsdale, IL
-
Churchill, G.A. Jr (1997), Marketing Research, Methodological Foundations, The Dryden Press, Hinsdale, IL.
-
(1997)
Marketing Research, Methodological Foundations
-
-
Churchill G.A., Jr.1
-
7
-
-
0041482689
-
-
Technical Report, April, DTI, London
-
Department of Trade and Industry (DTI) (2000), Information Security Breaches Survey 2000, Technical Report, April, DTI, London.
-
(2000)
Information Security Breaches Survey 2000
-
-
-
8
-
-
33947111683
-
-
Technical Report, April, DTI, London
-
Department of Trade and Industry (DTI) (2002), Information Security Breaches Survey 2002, Technical Report, April, DTI, London.
-
(2002)
Information Security Breaches Survey 2002
-
-
-
9
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon, G. and Backhouse, J. (2001), "Current directions in IS security research: towards socio-organizational perspectives", Information Systems Journal, Vol. 11, pp. 127-53.
-
(2001)
Information Systems Journal
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
10
-
-
84993016651
-
The second annual global information security survey
-
Dinnie, G. (1999), "The Second Annual Global Information Security Survey", Information Management & Computer Security, Vol. 7 No. 3, pp. 112-20.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.3
, pp. 112-120
-
-
Dinnie, G.1
-
11
-
-
0042985321
-
-
Ernst & Young, London
-
Ernst & Young (2001), Information Security Survey, Ernst & Young, London.
-
(2001)
Information Security Survey
-
-
-
12
-
-
0032715522
-
Computer hacking and cyber terrorism: The real threats of the new millennium?
-
Furnell, S.M. and Warren, M.J. (1999), "Computer hacking and cyber terrorism: the real threats of the new millennium?", Computers and Security, Vol. 18 No. 1, pp. 28-34.
-
(1999)
Computers and Security
, vol.18
, Issue.1
, pp. 28-34
-
-
Furnell, S.M.1
Warren, M.J.2
-
13
-
-
0035780599
-
Formalizing information security requirements
-
Gerber, M., von Solms, R. and Overbeek, P. (2001), "Formalizing information security requirements", Information Management & Computer Security, Vol. 9 No. 1, pp. 32-7.
-
(2001)
Information Management & Computer Security
, vol.9
, Issue.1
, pp. 32-37
-
-
Gerber, M.1
Von Solms, R.2
Overbeek, P.3
-
14
-
-
0041482688
-
Corporate system security: Towards an integrated management approach
-
Higgins, H.N. (1999), "Corporate system security: towards an integrated management approach", Information Management & Computer Security, Vol. 7 No. 5, pp 217-22.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.5
, pp. 217-222
-
-
Higgins, H.N.1
-
15
-
-
0036330173
-
Information security policy - What do international security standards say?
-
Hone, K. and Eloff, J.H.P. (2002), "Information security policy - what do international security standards say?", Computers & Security, Vol. 21 No. 5, pp. 402-9.
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Hone, K.1
Eloff, J.H.P.2
-
17
-
-
0000133760
-
Threats to information systems - Today's reality, yesterday's understanding
-
Lock, K.D., Carr, H.H. and Warkentin, M.E. (1992), "Threats to information systems - today's reality, yesterday's understanding", MIS Quarterly, Vol. 16 No. 2, pp. 173-86.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Lock, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
18
-
-
0002495427
-
Policies, procedures and standards: An approach for implementation
-
Moule, B. and Giavara, L. (1995), "Policies, procedures and standards: an approach for implementation". Information Management & Computer Security, Vol. 3 No. 3, pp. 7-16.
-
(1995)
Information Management & Computer Security
, vol.3
, Issue.3
, pp. 7-16
-
-
Moule, B.1
Giavara, L.2
-
19
-
-
0041983746
-
Management trade-offs in anti-virus strategies
-
Post, G. and Kagan, A. (2000), "Management trade-offs in anti-virus strategies", Information & Management, Vol. 37 No. 1, pp. 13-24.
-
(2000)
Information & Management
, vol.37
, Issue.1
, pp. 13-24
-
-
Post, G.1
Kagan, A.2
-
20
-
-
0001775054
-
An empirical assessment of information systems planning and the role of information systems in organisations
-
Prembukar, G. and King, W.R. (1992), "An empirical assessment of information systems planning and the role of information systems in organisations", Journal of Management Information Systems, Vol. 19 No. 2, pp. 99-125.
-
(1992)
Journal of Management Information Systems
, vol.19
, Issue.2
, pp. 99-125
-
-
Prembukar, G.1
King, W.R.2
-
21
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. T. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
22
-
-
3242661193
-
Information security management (1): Why information security is so important
-
von Solms, R. (1998), "Information security management (1): why information security is so important", Information Management & Computer Security, Vol. 6 No. 5, pp. 224-5.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.5
, pp. 224-225
-
-
Von Solms, R.1
|