-
1
-
-
0242621900
-
Securing the U.S. defense information infrastructure
-
Rand Washington, DC
-
R.H. Anderson, P.M. Feldman, S. Gerwehr, B. Houghton, R. Mesic, and J.D. Pinder Securing the U.S. defense information infrastructure A proposed approach 1999 Rand Washington, DC
-
(1999)
A Proposed Approach
-
-
Anderson, R.H.1
Feldman, P.M.2
Gerwehr, S.3
Houghton, B.4
Mesic, R.5
Pinder, J.D.6
-
3
-
-
0035063716
-
Violation of safeguards by trusted personnel and understanding related information security concerns
-
G. Dhillon Violation of safeguards by trusted personnel and understanding related information security concerns Computers and Security 20 2001 165 172
-
(2001)
Computers and Security
, vol.20
, pp. 165-172
-
-
Dhillon, G.1
-
4
-
-
0002698747
-
Information system security management in the new millennium
-
G. Dhillon, and J. Backhouse Information system security management in the new millennium Communications of the ACM 43 2000 125 128
-
(2000)
Communications of the ACM
, vol.43
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
7
-
-
0030194196
-
Evaluating ethical decision-making and computer use
-
K.D. Loch, and S. Conger Evaluating ethical decision-making and computer use Communications of the ACM 39 7 1996 74 83
-
(1996)
Communications of the ACM
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Conger, S.2
-
8
-
-
0033896875
-
Incidence and correlates of pathological Internet use among college students
-
J. Morahan-Martin, and P. Schumacher Incidence and correlates of pathological Internet use among college students Computers in Human Behavior 16 1 2000 13 29
-
(2000)
Computers in Human Behavior
, vol.16
, Issue.1
, pp. 13-29
-
-
Morahan-Martin, J.1
Schumacher, P.2
-
9
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
E.E. Schultz A framework for understanding and predicting insider attacks Computers and Security 21 6 2002 526 531
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
13
-
-
85001555189
-
On the role of human morality in information systems security
-
M.T. Siponen On the role of human morality in information systems security Information Resources Management Journal 14 4 2001 15 23
-
(2001)
Information Resources Management Journal
, vol.14
, Issue.4
, pp. 15-23
-
-
Siponen, M.T.1
-
16
-
-
0242537133
-
Company profile of the frequent Internet user: Web addict or happy employee?
-
J.M. Stanton Company profile of the frequent Internet user: Web addict or happy employee? Communications of the Association for Computing Machinery 45 1 2002 55 59
-
(2002)
Communications of the Association for Computing Machinery
, vol.45
, Issue.1
, pp. 55-59
-
-
Stanton, J.M.1
-
17
-
-
0000280419
-
Effective IS security: An empirical study
-
D.W. Straub Effective IS security: an empirical study Information System Research 1 2 1990 255 277
-
(1990)
Information System Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
19
-
-
0034926180
-
A framework for the implementation of socio-ethical controls in information security
-
C.M. Trompeters, and J.H.P. Eloff A framework for the implementation of socio-ethical controls in information security Computers and Security 20 2001 384 391
-
(2001)
Computers and Security
, vol.20
, pp. 384-391
-
-
Trompeters, C.M.1
Eloff, J.H.P.2
-
20
-
-
2342475711
-
Towards information security behavioural compliance
-
C. Vroom, and R. von Solms Towards information security behavioural compliance Computers and Security 23 3 2004 191 198
-
(2004)
Computers and Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
21
-
-
3042869109
-
Internet addition: The emergence of a new clinical disorder
-
K.S. Young Internet addition: the emergence of a new clinical disorder CyberPsychology and Behavior 1 3 1998 237 244
-
(1998)
CyberPsychology and Behavior
, vol.1
, Issue.3
, pp. 237-244
-
-
Young, K.S.1
|