-
1
-
-
84986665106
-
The measurement and antecedents of affective, continuance and normative commitment to organizations
-
Allen, N.J., & Meyer, J.P. (1990). The measurement and antecedents of affective, continuance and normative commitment to organizations. Journal of Occupational Psychology, 63, 1-18.
-
(1990)
Journal of Occupational Psychology
, vol.63
, pp. 1-18
-
-
Allen, N.J.1
Meyer, J.P.2
-
2
-
-
0242621900
-
Securing the U.S. defense information infrastructure: A proposed approach
-
Washington, DC: Rand.
-
Anderson, R. H., Feldman, P. M., Gerwehr, S., Houghton, B., Mesic, R., Pinder, J. D., Rothenberg, J., & Chiesa, J. (1999). Securing the U.S. defense information infrastructure: A proposed approach. Washington, DC: Rand.
-
(1999)
-
-
Anderson, R.H.1
Feldman, P.M.2
Gerwehr, S.3
Houghton, B.4
Mesic, R.5
Pinder, J.D.6
Rothenberg, J.7
Chiesa, J.8
-
3
-
-
0034294058
-
Potential determinants of heavier Internet usage
-
Armstrong, L., Phillips, J. G., & Saling, L. L. (2000). Potential determinants of heavier Internet usage. International Journal of Human-Computer Studies, 53 (4), 537-550.
-
(2000)
International Journal of Human-Computer Studies
, vol.53
, Issue.4
, pp. 537-550
-
-
Armstrong, L.1
Phillips, J.G.2
Saling, L.L.3
-
4
-
-
0242453510
-
Information security management: Global challenges in the new millennium
-
Dhillon, G. (Ed.); Hershey, PA: Idea Group Publishing
-
Dhillon, G. (Ed.) (2001). Information security management: Global challenges in the new millennium. Hershey, PA: Idea Group Publishing.
-
(2001)
-
-
-
5
-
-
33744996371
-
Global information security survey
-
Published in the UK by Presentation Services
-
Ernst and Young L.L.P. (2002). Global Information Security Survey. Published in the UK by Presentation Services.
-
(2002)
-
-
Ernst1
Young, L.L.P.2
-
6
-
-
0030194196
-
Evaluating ethical decision-making and computer use
-
Loch, K. D., & Congers, S. (1996). Evaluating ethical decision-making and computer use. Communications of the ACM, 39(7),74-83.
-
(1996)
Communications of the ACM
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Congers, S.2
-
7
-
-
0033896875
-
Incidence and correlates of pathological internet use among college students
-
Morahan-Martin, J., & Schumacher, P. (2000), Incidence and correlates of pathological Internet use among college students. Computers in Human Behavior, 16 (1), 13-29.
-
(2000)
Computers in Human Behavior
, vol.16
, Issue.1
, pp. 13-29
-
-
Morahan-Martin, J.1
Schumacher, P.2
-
8
-
-
0242706108
-
OECD guidelines for the security of information systems and networks: Towards a culture of security
-
OECD; Organisation For Economic Co-Operation And Development
-
OECD (2002). OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. Organisation For Economic Co-Operation And Development. Available at: http://www.oecd.org/pdg/M00033000/M00033182.pdf.
-
(2002)
-
-
-
9
-
-
0003487308
-
Secrets and lies
-
New York: Wiley
-
Schneier, B. (2000). Secrets and Lies. New York: Wiley.
-
(2000)
-
-
Schneier, B.1
-
10
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E. E. (2002). A framework for understanding and predicting insider attacks. Computers and Security, 21(6), 526-531.
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
11
-
-
0242621902
-
-
March 27 CSI/FBI study says: Security breaches on the rise. Author; Security Wire Digest
-
Security Wire Digest. (2000, March 27) CSI/FBI study says: Security breaches on the rise. Author. Available: http://www.lexias.com/1.0/securitywiredigest_27MAR2000.html
-
(2000)
-
-
-
12
-
-
4243840131
-
Inside the mind of the insider
-
Shaw, E. D., Post, J. M., & Ruby, K. G. (2002). Inside the Mind of the Insider. Available at http:/www.securitymanagement.com/library/000762.html.
-
(2002)
-
-
Shaw, E.D.1
Post, J.M.2
Ruby, K.G.3
-
13
-
-
85001555189
-
On the role of human morality in information systems security
-
Siponen, M. T. (2001). On the role of human morality in information systems security. Information Resources Management Journal, 14(4), 15-23.
-
(2001)
Information Resources Management Journal
, vol.14
, Issue.4
, pp. 15-23
-
-
Siponen, M.T.1
-
14
-
-
0034926180
-
A framework for the implementation of socio-ethical controls in information security
-
Trompeter, C. M., & Eloff, J. H. P. (2001). A Framework for the Implementation of Socio-ethical Controls in Information Security. Computers & Security, 20,384-391.
-
(2001)
Computers & Security
, vol.20
, pp. 384-391
-
-
Trompeter, C.M.1
Eloff, J.H.P.2
-
16
-
-
0242537133
-
Company profile of the frequent internet user: Web addict or happy employee?
-
Stanton, J. M. (2002). Company profile of the frequent Internet user: Web addict or happy employee? Communications of the Association for Computing Machinery, 45 (1), 55-59.
-
(2002)
Communications of the Association for Computing Machinery
, vol.45
, Issue.1
, pp. 55-59
-
-
Stanton, J.M.1
-
17
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D.W. (1990). Effective IS security: an empirical study. Information System Research, 1 (2), 255-277.
-
(1990)
Information System Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
19
-
-
0242517401
-
Information security awareness: Educating our users effectively
-
Thomson, M.E. and von Solms, R. (1998). Information security awareness: educating our users effectively. Information Management & Computer Security, 6 (4), 167-173.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
20
-
-
0242602106
-
-
Won, D. (Ed.); Berlin: Springer
-
Won, D. (Ed.) (2001). Proceedings of the Third International Conference on Information security and cryptology (ICISC 2000), Seoul, Korea, December 8-9, 2000. Berlin: Springer.
-
(2001)
Proceedings of the Third International Conference on Information Security and Cryptology (ICISC 2000), Seoul, Korea, December 8-9, 2000
-
-
|