-
1
-
-
1842709028
-
Business reengineering with business rules
-
Grover, V. and Kettinger, W. (Eds), IDEA Group Publishing, London
-
Appleton, D. (1995), "Business reengineering with business rules", in Grover, V. and Kettinger, W. (Eds), Business Process Change: Concepts, Methods and Technologies, IDEA Group Publishing, London, pp. 291-329.
-
(1995)
Business Process Change: Concepts, Methods and Technologies
, pp. 291-329
-
-
Appleton, D.1
-
2
-
-
0043000704
-
Modelling offices through discourse analysis: The SAMPO approach
-
Auramaki, E., Hirschheim, R. and Lyytinen, K. (1992), "Modelling offices through discourse analysis: the SAMPO approach", The Computer Journal. Vol. 35 No. 4, pp. 342-52.
-
(1992)
The Computer Journal
, vol.35
, Issue.4
, pp. 342-352
-
-
Auramaki, E.1
Hirschheim, R.2
Lyytinen, K.3
-
3
-
-
21344459955
-
Structures of responsibility and security of information systems
-
Backhouse, J. and Dhillon, G. (1996), "Structures of responsibility and security of information systems", European Journal of Information Systems, Vol. 5 No. 1, pp. 2-9.
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-9
-
-
Backhouse, J.1
Dhillon, G.2
-
4
-
-
0024717026
-
Framework of a methodology for the life cycle of computer security in an organization
-
Badenhorst, K.P. and Eloff, J.H.P. (1989), "Framework of a methodology for the life cycle of computer security in an organization", Computers & Security, Vol. 8, pp. 433-42.
-
(1989)
Computers & Security
, vol.8
, pp. 433-442
-
-
Badenhorst, K.P.1
Eloff, J.H.P.2
-
6
-
-
0013324190
-
Risk analysis: An interpretive feasibility tool in justifying information systems security
-
Baskerville, R. (1991), "Risk analysis: an interpretive feasibility tool in justifying information systems security", European Journal of Information Systems, Vol. 1 No. 2, pp. 121-30.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 121-130
-
-
Baskerville, R.1
-
9
-
-
84976766949
-
The entity-relationship model: Towards a unified view of data
-
Chen, P.P. (1976), "The entity-relationship model: towards a unified view of data", ACM Transactions on Database Systems, Vol. 1 No. 1, pp. 9-35.
-
(1976)
ACM Transactions on Database Systems
, vol.1
, Issue.1
, pp. 9-35
-
-
Chen, P.P.1
-
10
-
-
0026923229
-
Process modeling
-
Curtis, B., Kellner, M.I. and Over, J. (1992), "Process modeling", Communications of the ACM, Vol. 35 No. 9, pp. 75-90.
-
(1992)
Communications of the ACM
, vol.35
, Issue.9
, pp. 75-90
-
-
Curtis, B.1
Kellner, M.I.2
Over, J.3
-
11
-
-
1842709019
-
A methodology for analysing human and computer-related issues in secure systems
-
Dittrich, K., Rautakivi, S. and Saari, J. (Eds), Elsevier Science Publ., North-Holland
-
Dobson, J. (1991), "A methodology for analysing human and computer-related issues in secure systems", in Dittrich, K., Rautakivi, S. and Saari, J. (Eds), Computer Security and Information Integrity, Elsevier Science Publ., North-Holland.
-
(1991)
Computer Security and Information Integrity
-
-
Dobson, J.1
-
13
-
-
0007423744
-
-
European Commission, DGXIII, contract S2001, Brussels, Luxembourg
-
European Commission (1993a), Glossary of Information Systems Security, European Commission, DGXIII, contract S2001, Brussels, Luxembourg.
-
(1993)
Glossary of Information Systems Security
-
-
-
14
-
-
0003799580
-
-
European Commission, DGXIII, INFOSEC Project S2014/WP08, Brussels, Luxembourg
-
European Commission (1993b), Risk Analysis Methods Database, European Commission, DGXIII, INFOSEC Project S2014/WP08, Brussels, Luxembourg.
-
(1993)
Risk Analysis Methods Database
-
-
-
16
-
-
1842658950
-
-
PhD thesis, Engineering Department, Cambridge University, Cambridge
-
Glykas, M. (1994), "Agent relationship analysis in organisational transformation: the ARMA methodology for systematic business process redesign", PhD thesis, Engineering Department, Cambridge University, Cambridge.
-
(1994)
Agent Relationship Analysis in Organisational Transformation: The ARMA Methodology for Systematic Business Process Redesign
-
-
Glykas, M.1
-
17
-
-
0031628589
-
Recent security surveys
-
Hinde, S. (1998), "Recent security surveys", Computers & Security, Vol. 17, pp. 207-10.
-
(1998)
Computers & Security
, vol.17
, pp. 207-210
-
-
Hinde, S.1
-
18
-
-
8644292339
-
Achieving an integrated design: The way forward for information security
-
Ellof, J. and von Solms, S. (Eds), IFIP SEC'95, Chapman & Hall, London
-
Hitchings, J. (1995), "Achieving an integrated design: the way forward for information security", in Ellof, J. and von Solms, S. (Eds), Information Security - the Next Decade, IFIP SEC'95, Chapman & Hall, London.
-
(1995)
Information Security - The next Decade
-
-
Hitchings, J.1
-
19
-
-
1842709005
-
The use of business process models for security design in organizations
-
Katsikas, S. and Gritzalis, D. (Eds), IFIP SEC'96, Chapman & Hall, London
-
Holbein, R., Teufel, S. and Bauknecht, K. (1996), "The use of business process models for security design in organizations", in Katsikas, S. and Gritzalis, D. (Eds), Information Systems Security: Facing the Information Society of the 21st Century, IFIP SEC'96, Chapman & Hall, London.
-
(1996)
Information Systems Security: Facing the Information Society of the 21st Century
-
-
Holbein, R.1
Teufel, S.2
Bauknecht, K.3
-
20
-
-
0004637330
-
Process modelling - Who, what and how - role activity diagramming
-
Grover, V. and Kettinger, W. (Eds), IDEA Group Publishing, London
-
Huckvale, T. and Ould, M. (1995), "Process modelling - who, what and how - role activity diagramming", in Grover, V. and Kettinger, W. (Eds), Business Process Change: Concepts, Methods and Technologies. IDEA Group Publishing, London, pp. 330-49.
-
(1995)
Business Process Change: Concepts, Methods and Technologies
, pp. 330-349
-
-
Huckvale, T.1
Ould, M.2
-
22
-
-
0001841217
-
Business process change: A study of methodologies, techniques, and tools
-
Kettinger, W.J., Teng, J.T.C. and Guha, S. (1997), "Business process change: a study of methodologies, techniques, and tools", MIS Quarterly, Vol. 21 No. 1.
-
(1997)
MIS Quarterly
, vol.21
, Issue.1
-
-
Kettinger, W.J.1
Teng, J.T.C.2
Guha, S.3
-
23
-
-
0030384205
-
The role of information security in corporate governance
-
Lindup, K. (1996), "The role of information security in corporate governance", Computers & Security, Vol. 15, pp. 477-85.
-
(1996)
Computers & Security
, vol.15
, pp. 477-485
-
-
Lindup, K.1
-
24
-
-
1642620069
-
Enterprise modelling and security policies
-
Jajodia, S. and Landwehr, C.E. (Eds), Elsevier Science Publ., North-Holland
-
Martin, M. and Dobson, J. (1991), "Enterprise modelling and security policies", in Jajodia, S. and Landwehr, C.E. (Eds), Database Security IV: Status and Prospects, Elsevier Science Publ., North-Holland.
-
(1991)
Database Security IV: Status and Prospects
-
-
Martin, M.1
Dobson, J.2
-
25
-
-
0004637331
-
A framework and a suite of methods for business process reengineering
-
Grover, V. and Kettinger, W. (Eds). IDEA Group Publishing, London
-
Mayer, R., Benjamin, P., Caraway, B. and Painter, M. (1995), "A framework and a suite of methods for business process reengineering", in Grover, V. and Kettinger, W. (Eds). Business Process Change: Concepts. Methods and Technologies, IDEA Group Publishing, London, pp. 245-90.
-
(1995)
Business Process Change: Concepts. Methods and Technologies
, pp. 245-290
-
-
Mayer, R.1
Benjamin, P.2
Caraway, B.3
Painter, M.4
-
26
-
-
0003718069
-
-
Jossey-Bass, San Francisco, CA
-
Rummler, G.A. and Brache, A.P. (1990), Improving Performance: How to Manage the White Space on the Organisational Chart, Jossey-Bass, San Francisco, CA.
-
(1990)
Improving Performance: How to Manage the White Space on the Organisational Chart
-
-
Rummler, G.A.1
Brache, A.P.2
-
27
-
-
0027874793
-
A new approach to business processes
-
Scherr, A.L. (1993), "A new approach to business processes", IBM Systems Journal, Vol. 32 No. 1, pp. 80-98.
-
(1993)
IBM Systems Journal
, vol.32
, Issue.1
, pp. 80-98
-
-
Scherr, A.L.1
-
30
-
-
0043112275
-
-
Wiley, Chichester
-
Wolstenholme, E.F., Henderson, S. and Gavine, A. (1993), The Evaluation of Management Information Systems, A Dynamic Approach, Wiley, Chichester.
-
(1993)
The Evaluation of Management Information Systems, a Dynamic Approach
-
-
Wolstenholme, E.F.1
Henderson, S.2
Gavine, A.3
|