-
1
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville R. Information systems security design methods: implications for information systems development. ACM Computing Surveys. 25(4):1993;375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
2
-
-
34147129224
-
An application of qualitative risk analysis to computer security for the commercial sector
-
San Antonio, TX, USA
-
S.P. Bennett, M.P. Kailay, An application of qualitative risk analysis to computer security for the commercial sector, in: Proceedings of Eighth IEEE Annual Computer Security Applications Conference, San Antonio, TX, USA, 1992, pp. 64-73.
-
(1992)
Proceedings of Eighth IEEE Annual Computer Security Applications Conference
, pp. 64-73
-
-
Bennett, S.P.1
Kailay, M.P.2
-
3
-
-
0141952239
-
-
CCTA UK Government Central Computer and Telecommunications Agency (CCTA), IT Security and Privacy Group, London, UK
-
CCTA, The CCTA Risk Analysis and Management Method (CRAMM) User Guide, UK Government Central Computer and Telecommunications Agency (CCTA), IT Security and Privacy Group, London, UK, 1993.
-
(1993)
The CCTA Risk Analysis and Management Method (CRAMM) User Guide
-
-
-
5
-
-
0141986903
-
Analyzing the cost-effectiveness of computer controls and security
-
Cerullo M.J., Shelton F.A. Analyzing the cost-effectiveness of computer controls and security. The Internal Auditor. 38(5):1981;30-37.
-
(1981)
The Internal Auditor
, vol.38
, Issue.5
, pp. 30-37
-
-
Cerullo, M.J.1
Shelton, F.A.2
-
6
-
-
0030658708
-
Risk analysis: Requirements, conflicts and problems
-
Ciechanowicz Z. Risk analysis: requirements, conflicts and problems. Computers & Security. 16(3):1997;223-232.
-
(1997)
Computers & Security
, vol.16
, Issue.3
, pp. 223-232
-
-
Ciechanowicz, Z.1
-
7
-
-
0031631068
-
A conceptual framework for information security management
-
Finne T. A conceptual framework for information security management. Computers & Security. 17(4):1998;303-307.
-
(1998)
Computers & Security
, vol.17
, Issue.4
, pp. 303-307
-
-
Finne, T.1
-
8
-
-
0034159453
-
Information systems risk management: Key concepts and business processes
-
Finne T. Information systems risk management: key concepts and business processes. Computers & Security. 19(3):2000;234-242.
-
(2000)
Computers & Security
, vol.19
, Issue.3
, pp. 234-242
-
-
Finne, T.1
-
9
-
-
0141917864
-
-
United States General Accounting Office (GAO), Accounting and Information Management Division, Washington, DC, USA
-
GAO, Executive Guide Information Security Management: Learning from Leading Organizations, United States General Accounting Office (GAO), Accounting and Information Management Division, Washington, DC, USA, 1998.
-
(1998)
Executive Guide Information Security Management: Learning from Leading Organizations
-
-
-
10
-
-
0033114880
-
Physical protection systems - Cost and performance analysis: A case study
-
Hicks M.J., Snell M.S., Sandoval J.S., Potter C.S. Physical protection systems - cost and performance analysis: a case study. IEEE AES Systems Magazine. 14(4):1999;9-13.
-
(1999)
IEEE AES Systems Magazine
, vol.14
, Issue.4
, pp. 9-13
-
-
Hicks, M.J.1
Snell, M.S.2
Sandoval, J.S.3
Potter, C.S.4
-
11
-
-
0003543315
-
-
Addison-Wesley-Longman, New York, NY, USA
-
J.A. Hoffer, J.F. George, J.S. Valacich, Modern Systems Analysis & Design, Addison-Wesley-Longman, New York, NY, USA, 1999.
-
(1999)
Modern Systems Analysis & Design
-
-
Hoffer, J.A.1
George, J.F.2
Valacich, J.S.3
-
12
-
-
0003740958
-
-
Addison-Wesley, New York, NY, USA
-
I. Jacobson, M. Ericsson, A. Jacobson, The Object Advantage: Business Process Reengineering with Object Technology, Addison-Wesley, New York, NY, USA, 1995.
-
(1995)
The Object Advantage: Business Process Reengineering with Object Technology
-
-
Jacobson, I.1
Ericsson, M.2
Jacobson, A.3
-
13
-
-
0141952238
-
Risk analysis for electronic commerce using case-based reasoning
-
Jung C., Han I., Suh B. Risk analysis for electronic commerce using case-based reasoning. International Journal of Intelligent Systems in Accounting, Finance & Management. 8(1):1999;61-73.
-
(1999)
International Journal of Intelligent Systems in Accounting, Finance & Management
, vol.8
, Issue.1
, pp. 61-73
-
-
Jung, C.1
Han, I.2
Suh, B.3
-
14
-
-
0029508261
-
RAMeX: A prototype expert system for computer security risk analysis and management
-
Kailay M.P., Jarratt P. RAMeX: a prototype expert system for computer security risk analysis and management. Computers & Security. 14(5):1995;449-463.
-
(1995)
Computers & Security
, vol.14
, Issue.5
, pp. 449-463
-
-
Kailay, M.P.1
Jarratt, P.2
-
15
-
-
0003482038
-
-
Macmillan, New York, NY, USA
-
K.C. Laudon, J.P. Laudon, Management Information Systems: Organization and Technology, third ed., Macmillan, New York, NY, USA, 1994.
-
(1994)
Management Information Systems: Organization and Technology, Third Ed.
-
-
Laudon, K.C.1
Laudon, J.P.2
-
16
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch K.D., Carr H.H., Warkentin M.E. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly. 16(2):1992;173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
17
-
-
0003463944
-
-
Prentice-Hall, Englewood Cliffs, NJ, USA
-
J. Martin, Strategic Data-Planning Methodologies, Prentice-Hall, Englewood Cliffs, NJ, USA, 1982.
-
(1982)
Strategic Data-Planning Methodologies
-
-
Martin, J.1
-
18
-
-
0141952237
-
Developing an IS risk assessment process
-
McNamee D. Developing an IS risk assessment process. IS Audit & Control Journal. 1996(3):1996;14-18.
-
(1996)
IS Audit & Control Journal
, vol.1996
, Issue.3
, pp. 14-18
-
-
McNamee, D.1
-
19
-
-
0141883324
-
-
Wiley, New York, NY, USA
-
R.R. Moeller, Computer Audit, Control, and Security, Wiley, New York, NY, USA, 1989.
-
(1989)
Computer Audit, Control, and Security
-
-
Moeller, R.R.1
-
20
-
-
0033646117
-
A practical risk analysis approach: Managing BCM risk
-
Nosworthy J.D. A practical risk analysis approach: managing BCM risk. Computers & Security. 19(7):2000;596-614.
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 596-614
-
-
Nosworthy, J.D.1
-
21
-
-
55249117122
-
A stochastic dominance approach to risk analysis of computer systems
-
Post G.V., Diltz J.D. A stochastic dominance approach to risk analysis of computer systems. MIS Quarterly. 10(4):1986;363-375.
-
(1986)
MIS Quarterly
, vol.10
, Issue.4
, pp. 363-375
-
-
Post, G.V.1
Diltz, J.D.2
-
23
-
-
0025700933
-
How to make a decision: The analytic hierarchy process
-
Saaty T.L. How to make a decision: the analytic hierarchy process. European Journal of Operational Research. 48(1):1990;9-26.
-
(1990)
European Journal of Operational Research
, vol.48
, Issue.1
, pp. 9-26
-
-
Saaty, T.L.1
-
24
-
-
0003443508
-
-
McGraw-Hill, New York, NY, USA
-
T.L. Saaty, The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation, McGraw-Hill, New York, NY, USA, 1980.
-
(1980)
The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation
-
-
Saaty, T.L.1
-
26
-
-
0141917862
-
A framework for information security evaluation
-
Solms R.V., Haar H.V.D., Solms S.H.V., Caelli W.J. A framework for information security evaluation. Information & Management. 26(3):1994;143-153.
-
(1994)
Information & Management
, vol.26
, Issue.3
, pp. 143-153
-
-
Solms, R.V.1
Haar, H.V.D.2
Solms, S.H.V.3
Caelli, W.J.4
-
27
-
-
0141917863
-
Whose Risk Is It Anyway?
-
Ottawa, Canada
-
D.A. Stolovitch, L.D. Robertson, Whose Risk Is It Anyway? in: Proceedings of the 10th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, 1998, pp. 123-148.
-
(1998)
Proceedings of the 10th Annual Canadian Information Technology Security Symposium
, pp. 123-148
-
-
Stolovitch, D.A.1
Robertson, L.D.2
-
28
-
-
0039972049
-
-
Texas Instruments Incorporated, Texas Instruments Incorporated, USA
-
Texas Instruments Incorporated, A Guide to Information Engineering Using the IEF™: Computer-Aided Planning, Analysis, and Design, second ed., Texas Instruments Incorporated, USA, 1990.
-
(1990)
A Guide to Information Engineering Using the IEF™: Computer-Aided Planning, Analysis, and Design, Second Ed.
-
-
-
29
-
-
0003669731
-
-
Prentice-Hall, Englewood Cliffs, NJ, USA
-
R. Weber, Information Systems Control and Audit, Prentice-Hall, Englewood Cliffs, NJ, USA, 1999.
-
(1999)
Information Systems Control and Audit
-
-
Weber, R.1
-
30
-
-
0141883323
-
Third generation risk management practices
-
Wright M. Third generation risk management practices. Computer Fraud & Security. 1999(2):1999;9-12.
-
(1999)
Computer Fraud & Security
, vol.1999
, Issue.2
, pp. 9-12
-
-
Wright, M.1
|