-
1
-
-
1542731599
-
-
Pamphlet prepared by the Task force on Computer Crime, American Bar Association, Section on Criminal Justice, 1800 M Street, Washington, DC 20036
-
American Bar Association. Report on Computer Crime. Pamphlet prepared by the Task force on Computer Crime, American Bar Association, Section on Criminal Justice, 1800 M Street, Washington, DC 20036, 1984.
-
(1984)
Report on Computer Crime
-
-
-
2
-
-
0347892655
-
Hack attack: Cyberthieves siphon millions from U.S. firms
-
Anthes, G. "Hack Attack: Cyberthieves Siphon Millions from U.S. Firms," Computerworld, 30:16, 1986, p. 81.
-
(1986)
Computerworld
, vol.30
, Issue.16
, pp. 81
-
-
Anthes, G.1
-
3
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. "Information Systems Security Design Methods: Implications for Information Systems Development," ACM Computing Surveys, 25:4, 1993, pp. 749-764.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 749-764
-
-
Baskerville, R.1
-
4
-
-
84876659318
-
-
CERT Coordination Center. CERT/CC Overview: Trends, on-line. Available: http://www.cert.org/present/certoverview-trends/.
-
CERT/CC Overview: Trends
-
-
-
7
-
-
84876597713
-
New E-commerce study reveals key management issues
-
ISACA, Rolling Meadows, IL
-
Deloitte & Touché. "New E-commerce Study Reveals Key Management Issues," E-commerce Security: A Global Status Report, ISACA, Rolling Meadows, IL, 2000.
-
(2000)
E-commerce Security: A Global Status Report
-
-
Deloitte1
Touché2
-
8
-
-
84876628078
-
-
monograph, Science Applications International Corp., San Diego, CA
-
Drake, D.L. and K.L. Morse. "Applying the Eight-stage Risk Assessment Methodology to Firewalls," monograph, Science Applications International Corp., San Diego, CA, 1996.
-
(1996)
Applying the Eight-stage Risk Assessment Methodology to Firewalls
-
-
Drake, D.L.1
Morse, K.L.2
-
9
-
-
84876645901
-
-
monograph, Science Applications International Corp., San Diego, CA
-
Drake, D.L. and K.L. Morse. "The Security-specific Eight Stage Risk Assessment Methodology," monograph, Science Applications International Corp., San Diego, CA, 1994.
-
(1994)
The Security-specific Eight Stage Risk Assessment Methodology
-
-
Drake, D.L.1
Morse, K.L.2
-
11
-
-
0347871399
-
Developing a computer security policy for organizational use and implementation
-
Forcht, K.A. and W.C. Ayers. "Developing a Computer Security Policy for Organizational Use and Implementation," Journal of Computer Information Systems, 41:2, 2001, pp. 52-57.
-
(2001)
Journal of Computer Information Systems
, vol.41
, Issue.2
, pp. 52-57
-
-
Forcht, K.A.1
Ayers, W.C.2
-
12
-
-
0030487343
-
Ensuring Internet security
-
Foroughi, A. and W.C. Perkins. "Ensuring Internet Security," Journal of Computer Information Systems, 37:1, 1997, pp. 33-38.
-
(1997)
Journal of Computer Information Systems
, vol.37
, Issue.1
, pp. 33-38
-
-
Foroughi, A.1
Perkins, W.C.2
-
13
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crime?
-
Summer
-
Hoffer, J.A. and D.W. Straub. "The 9 to 5 Underground: Are You Policing Computer Crime?" Sloan Management Review, 30:4, Summer 1989, pp. 35-44.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-44
-
-
Hoffer, J.A.1
Straub, D.W.2
-
14
-
-
84860082375
-
-
Chichester: Wiley
-
nd. Chichester: Wiley, 1987.
-
(1987)
nd
-
-
Hogarth, R.M.1
-
15
-
-
84876642056
-
Computer usage characteristics and small service firms: An exploratory study
-
Winter
-
Kahai, P., M Gibson, and K. Swinehart. "Computer Usage Characteristics and Small Service Firms: An Exploratory Study," Journal of Computer Information Systems, 33:2, Winter 1992-1993, pp. 70-76.
-
(1992)
Journal of Computer Information Systems
, vol.33
, Issue.2
, pp. 70-76
-
-
Kahai, P.1
Gibson, M.2
Swinehart, K.3
-
16
-
-
0023825657
-
Computer backup pools, disaster recovery, and default risk
-
Kahane, Y., S. Neumann, and C. Tapiero. "Computer Backup Pools, Disaster Recovery, and Default Risk," Communications of the ACM, 31:1, 1988.
-
(1988)
Communications of the ACM
, vol.31
, Issue.1
-
-
Kahane, Y.1
Neumann, S.2
Tapiero, C.3
-
17
-
-
0346173289
-
Information security
-
Kulczycki, G. "Information Security," Management Accounting, LXXIX:6, 1997, pp. 18-24.
-
(1997)
Management Accounting
, vol.79
, Issue.6
, pp. 18-24
-
-
Kulczycki, G.1
-
18
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K.D., H.H. Carr, and M.E. Warkentin. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly, 16:2, 1992, pp. 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
22
-
-
34249866520
-
-
New York: Chas. Scribners Sons
-
Parker, D.B. Crime by Computer. New York: Chas. Scribners Sons, 1976.
-
(1976)
Crime by Computer
-
-
Parker, D.B.1
-
29
-
-
84876658271
-
Computer viruses: Symptoms, remedies, and preventive measures
-
Sanford, C. "Computer Viruses: Symptoms, Remedies, and Preventive Measures," Journal of Computer Information Systems, 22:3, 1993, p. 67.
-
(1993)
Journal of Computer Information Systems
, vol.22
, Issue.3
, pp. 67
-
-
Sanford, C.1
-
31
-
-
1642568985
-
Hackers are ubiquitous, malicious and taken far too lightly, experts say
-
Schwartz, K. "Hackers are Ubiquitous, Malicious and Taken Far Too Lightly, Experts Say," Government Computer News, 16:23, 1997, pp. 81-82.
-
(1997)
Government Computer News
, vol.16
, Issue.23
, pp. 81-82
-
-
Schwartz, K.1
-
32
-
-
21844505207
-
International viruses and the computer network
-
Seymour, T.J. and E. Robinson. "International Viruses and the Computer Network," Journal of Computer Information Systems, 35:1, 1995, pp. 23-27.
-
(1995)
Journal of Computer Information Systems
, vol.35
, Issue.1
, pp. 23-27
-
-
Seymour, T.J.1
Robinson, E.2
-
33
-
-
1642328743
-
How secure is your network?
-
Shipley, G. "How Secure is Your Network?" Network Computing," 2000, p. 58.
-
(2000)
Network Computing
, pp. 58
-
-
Shipley, G.1
-
34
-
-
0031524645
-
A task-based approach to implementing computer security
-
Steinke, G. "A Task-based Approach to Implementing Computer Security," Journal of Computer Information Systems, 38:1, 1998, pp. 47-54.
-
(1998)
Journal of Computer Information Systems
, vol.38
, Issue.1
, pp. 47-54
-
-
Steinke, G.1
-
35
-
-
85139144524
-
Controlling computer abuse: An empirical study of effective security countermeasures
-
Pittsburgh, PA, December 6-8
-
Straub, D. "Controlling Computer Abuse: An Empirical Study of Effective Security Countermeasures," Proceedings of the International Conference on Information Systems, Pittsburgh, PA, December 6-8, 1987, pp. 277-289.
-
(1987)
Proceedings of the International Conference on Information Systems
, pp. 277-289
-
-
Straub, D.1
-
36
-
-
1542626402
-
-
Indiana University Graduate School of Business, Dissertation, Bloomington, IN
-
Straub, D. Deterring Computer Abuse: The Effectiveness of Deterrent Countermeasures in the Computer Security Environment, Indiana University Graduate School of Business, Dissertation, Bloomington, IN, 1986.
-
(1986)
Deterring Computer Abuse: The Effectiveness of Deterrent Countermeasures in the Computer Security Environment
-
-
Straub, D.1
-
37
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. "Effective IS Security: An Empirical Study," Information Systems Research, 1:3, 1990, pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
38
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision-making
-
Straub, D.W. and R.J. Welke. "Coping with Systems Risk: Security Planning Models for Management Decision-making," MIS Quarterly, 22:4, 1998, pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
39
-
-
13844285800
-
Calculating risk
-
March
-
Tippett, P. "Calculating Risk," Information Security, 3, March 2001, pp. 36-38.
-
(2001)
Information Security
, vol.3
, pp. 36-38
-
-
Tippett, P.1
-
41
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
Whitman, M. "Enemy at the Gate: Threats to Information Security," Communications of the ACM, 46:8, 2003, pp. 91-95.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.1
|