-
1
-
-
15844377478
-
Auditing E-Business: New Challenges for External Auditors
-
Abu-Musa, Ahmad. 2004. Auditing E-Business:New Challenges for External Auditors. Journal of American Academy of Business, 4 (1):28–41.
-
(2004)
Journal of American Academy of Business
, vol.4
, Issue.1
, pp. 28-41
-
-
Abu-Musa, A.1
-
2
-
-
85023805301
-
-
Accessed 23 July 2004
-
American Express. 22 October 2002. OPEN Small Business Network Semi-Annual Monitor, Accessed 23 July 2004 http://home3.americanexpress.com/corp/latestnews/osbnm2002.asp
-
(2002)
OPEN Small Business Network Semi-Annual Monitor
-
-
-
3
-
-
85023843531
-
By-passing JavaScript Filters—The Flash! Attack
-
Anonymous Accessed 27 July 2004
-
25 August 2002. By-passing JavaScript Filters—The Flash! Attack. Eye on Security, Anonymous Accessed 27 July 2004 http://eyeonsecurity.org/papers/flash-xss.pdf
-
(2002)
Eye on Security
-
-
-
5
-
-
2342598277
-
Computer Security Impaired by Legitimate Users
-
Besnard, Denis, and Budi, Arief. 2004. Computer Security Impaired by Legitimate Users. Computers & Security, 23:253–264.
-
(2004)
Computers & Security
, vol.23
, pp. 253-264
-
-
Besnard, D.1
Budi, A.2
-
8
-
-
84876641036
-
All-Out Blitz against Web App Attacks
-
Accessed 1 June 2004
-
Desmond, Paul. 17 May 2004. All-Out Blitz against Web App Attacks. Network World Fusion, Accessed 1 June 2004 http://www.nwfusion. com/techinsider/2004/0517techinsidermain. html
-
(2004)
Network World Fusion
-
-
Desmond, P.1
-
9
-
-
84876594147
-
Symantec CEO Warns of New Threats
-
Accessed 25 July 2004
-
Dubie, Denise. 25 November 2003. Symantec CEO Warns of New Threats. Network World Fusion, Accessed 25 July 2004 http://www. nwfusion.com/newsletters/ecomm/2003/1124ecom1.html
-
(2003)
Network World Fusion
-
-
Dubie, D.1
-
10
-
-
84876605594
-
Top Five Myths about Safe Surfing
-
December 9
-
Erlanger, Leon. 2003. Top Five Myths about Safe Surfing. PC Magazine,:84 December 9
-
(2003)
PC Magazine
, pp. 84
-
-
Erlanger, L.1
-
11
-
-
33744996371
-
-
Accessed 24 July 2004
-
Ernst and Young. 9 July 2003. 2003 Global Information Security Survey, Accessed 24 July 2004 http://www.ey.com/global/Content.nsf/US/Issues_Perspectives_-_Library_-_Overview
-
(2003)
2003 Global Information Security Survey
-
-
Ernst1
Young2
-
12
-
-
33744996371
-
-
Accessed 18 October 2004
-
Ernst and Young. September 2004. 2004 Global Information Security Survey, Accessed 18 October 2004 http://www.ey.com/global/content.nsf/us/issues_perspectives_-Library_-_Overview
-
(2004)
2004 Global Information Security Survey
-
-
Ernst1
Young2
-
13
-
-
4444337196
-
Firewall Follies
-
Garfinkel, Simson. 2002. Firewall Follies. Technology Review, 105 (7):33
-
(2002)
Technology Review
, vol.105
, Issue.7
, pp. 33
-
-
Garfinkel, S.1
-
14
-
-
3242808612
-
-
Computer Security Institute, Accessed 20 July 2004
-
Gordon, Lawrence A., Loeb, Martin P., Lucyshyn, William, and Richardson, Robert. 2004. 2004 CSI/FBI Computer Crime and Security Survey, Computer Security Institute. Accessed 20 July 2004 http://www.gocsi.com/forms/fbi/pdf.html
-
(2004)
2004 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
16
-
-
85023877607
-
-
Compsec Online, Accessed 25 July 2004
-
Hilley, Sarah. 2 October 2003. Virus Writers Faster to the Kill, Compsec Online. Accessed 25 July 2004 http://www.compseconline.com/analysis/031002.nesesymantecthreat.html
-
(2003)
Virus Writers Faster to the Kill
-
-
Hilley, S.1
-
17
-
-
0037400028
-
An Integrative Study of Information Systems Security Effectiveness
-
Kankanhalli, Atreyi, Teo, Hock-Hai, Tan, Bernard C.Y., and Wei, Kwok-Kee. 2003. An Integrative Study of Information Systems Security Effectiveness. International Journal of Information Management, 23:139–154.
-
(2003)
International Journal of Information Management
, vol.23
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.-H.2
Tan, B.C.Y.3
Wei, K.-K.4
-
18
-
-
1242263532
-
Why There Aren't More Information Security Research Studies
-
Kotulic, Andrew, and Clark, Jan Guynes. May 2004. Why There Aren't More Information Security Research Studies. Information & Management, 41 (5):597–607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.1
Clark, J.G.2
-
19
-
-
0034513874
-
Intrusion Confinement by Isolation in Information Systems
-
Liu, Peng, Jajodia, Sushil, and McCollum, Catherine. 2000. Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security, 8 (4):243–280.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.4
, pp. 243-280
-
-
Liu, P.1
Jajodia, S.2
McCollum, C.3
-
20
-
-
84876647837
-
-
Accessed 12 October 2004
-
Microsoft. 2004. Security Guidance Center for Small Businesses, Accessed 12 October 2004. http://www.microsoft.com/smallbusinesses/gtm/securityguidance/hub.mspx
-
(2004)
Security Guidance Center for Small Businesses
-
-
-
22
-
-
3142628548
-
Privacy versus Cybersecurity
-
Phillips, John. 2002. Privacy versus Cybersecurity. Information Management Journal, 36 (3):46–50.
-
(2002)
Information Management Journal
, vol.36
, Issue.3
, pp. 46-50
-
-
Phillips, J.1
-
23
-
-
84876650185
-
Crime Fighters Cast Wide Net
-
Piazza, Peter. June 2004. Crime Fighters Cast Wide Net. Security Management, 48:119–126.
-
(2004)
Security Management
, vol.48
, pp. 119-126
-
-
Piazza, P.1
-
24
-
-
0041983746
-
Management Tradeoffs in Anti-Virus Strategies
-
Post, Gerald, and Kagan, Albert. 2000. Management Tradeoffs in Anti-Virus Strategies. Information & Management, 37:13–24.
-
(2000)
Information & Management
, vol.37
, pp. 13-24
-
-
Post, G.1
Kagan, A.2
-
25
-
-
15844371952
-
The Virus Wars
-
July 6
-
Robbins, Alexandra. 2004. The Virus Wars. PC Magazine, July 6:114
-
(2004)
PC Magazine
, pp. 114
-
-
Robbins, A.1
-
26
-
-
1242263792
-
Security Training and Awareness—Fitting a Square Peg in a Round Hole
-
Schultz, Eugene. 2004. Security Training and Awareness—Fitting a Square Peg in a Round Hole. Computers & Security, 23:1–2.
-
(2004)
Computers & Security
, vol.23
, pp. 1-2
-
-
Schultz, E.1
-
27
-
-
84876662435
-
Eradicating Spyware in the Enterprise
-
Accessed 22 July 2004
-
Schwartz, Mathew. 21 July 2004. Eradicating Spyware in the Enterprise. Enterprise Systems, Accessed 22 July 2004 http://www.esj.com/News/article.asp?EditorialsID=1050
-
(2004)
Enterprise Systems
-
-
Schwartz, M.1
-
29
-
-
84876641020
-
Overlooked Best Practices
-
August 26
-
Udell, Jon. 2002. Overlooked Best Practices. InfoWorld, 24 August 26:44
-
(2002)
InfoWorld
, vol.24
, pp. 44
-
-
Udell, J.1
-
30
-
-
84876612554
-
Testing Disaster Reocvery Plans
-
Vasaris, A. J., 2004. Testing Disaster Reocvery Plans. Digits, http://www.digits.com/articlss/backup—testing-disaster-recovery-plans.htm
-
(2004)
Digits
-
-
Vasaris, A.J.1
-
31
-
-
2342475711
-
Towards Information Security Behavioural Compliance
-
Vroom, Cheryl, and Rossouw, vonSolms. 2004. Towards Information Security Behavioural Compliance. Computers & Security, 23:191–198.
-
(2004)
Computers & Security
, vol.23
, pp. 191-198
-
-
Vroom, C.1
Rossouw, V.2
-
32
-
-
84876615279
-
Blended Threats
-
Weafer, Vincent. 2002. Blended Threats. T.H.E. Journal, 30 (5):16
-
(2002)
T.H.E. Journal
, vol.30
, Issue.5
, pp. 16
-
-
Weafer, V.1
-
33
-
-
84876603394
-
Sidebar: Security and QoS Lexicon
-
January 19
-
Wexler, Jonie. 2004. Sidebar:Security and QoS Lexicon. Computerworld, 38 January 19:40
-
(2004)
Computerworld
, vol.38
, pp. 40
-
-
Wexler, J.1
-
34
-
-
0035780470
-
Controlling Corporate E-mail, PC Use and Computer Security
-
White, Gayle Webb, and Pearson, Sheila. 2001. Controlling Corporate E-mail, PC Use and Computer Security. Information Management & Computer Security, 9 (2/3):88–92.
-
(2001)
Information Management & Computer Security
, vol.9
, Issue.2-3
, pp. 88-92
-
-
White, G.W.1
Pearson, S.2
-
35
-
-
1242265154
-
In Defense of the Realm: Understanding the Threats to Information Security
-
Whitman, Michael E., 2004. In Defense of the Realm:Understanding the Threats to Information Security. International Journal of Information Management, 24:43–57.
-
(2004)
International Journal of Information Management
, vol.24
, pp. 43-57
-
-
Whitman, M.E.1
|