-
2
-
-
0036888888
-
Toward a political theory of leadership
-
A. Ammeter, C. Douglas, W. Gardner, W. Hochwarter, and G. Ferris Toward a political theory of leadership The Leadership Quarterly 13 2002 751 796
-
(2002)
The Leadership Quarterly
, vol.13
, pp. 751-796
-
-
Ammeter, A.1
Douglas, C.2
Gardner, W.3
Hochwarter, W.4
Ferris, G.5
-
5
-
-
55249084997
-
The case research strategy in studies in information systems
-
I. Benbasat, D. Goldstein, and M. Mead The case research strategy in studies in information systems MIS Quarterly 1987 369 386
-
(1987)
MIS Quarterly
, pp. 369-386
-
-
Benbasat, I.1
Goldstein, D.2
Mead, M.3
-
8
-
-
0001073758
-
Building theories from case study research
-
K. Eisenhardt Building theories from case study research Academy of Management Review 14 4 1989 532 550
-
(1989)
Academy of Management Review
, vol.14
, Issue.4
, pp. 532-550
-
-
Eisenhardt, K.1
-
9
-
-
0034158883
-
Information security management: A hierarchical framework for various approaches
-
M. Eloff, and S. von Solms Information security management: a hierarchical framework for various approaches Computers and Security 19 3 2000 243 256
-
(2000)
Computers and Security
, vol.19
, Issue.3
, pp. 243-256
-
-
Eloff, M.1
Von Solms, S.2
-
10
-
-
0031373349
-
A baseline security policy for distributed healthcare information systems
-
D. Gritzalis A baseline security policy for distributed healthcare information systems Computers and Security 16 8 1997 709 719
-
(1997)
Computers and Security
, vol.16
, Issue.8
, pp. 709-719
-
-
Gritzalis, D.1
-
11
-
-
0036330173
-
Information security policy - What do international information security standards say?
-
K. Höne, and J. Eloff Information security policy - what do international information security standards say? Computers and Security 21 5 2002 402 409
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Höne, K.1
Eloff, J.2
-
12
-
-
0036613095
-
What makes an effective security policy?
-
K. Höne, and J. Eloff What makes an effective security policy? Network Security 6 1 2002 14 16
-
(2002)
Network Security
, vol.6
, Issue.1
, pp. 14-16
-
-
Höne, K.1
Eloff, J.2
-
13
-
-
24644436684
-
Research questions guiding selection of an appropriate research method
-
H.R. Hansen M. Bichler H. Maher Vienna University of Economics and Business Administration
-
P. Jarvinen Research questions guiding selection of an appropriate research method H.R. Hansen M. Bichler H. Maher Proceedings of the eighth European conference on information systems 2000 Vienna University of Economics and Business Administration
-
(2000)
Proceedings of the Eighth European Conference on Information Systems
-
-
Jarvinen, P.1
-
15
-
-
84904363825
-
Content, context, process analysis of IS security policy formation
-
D. Gritzalis Kluwer Academic Publishers*et al.
-
M. Karyda, S. Kokolakis, and E. Kiountouzis Content, context, process analysis of IS security policy formation D. Gritzalis Security and privacy in the age of uncertainty, Proceedings of the 18th IFIP international conference on information security 2003 Kluwer Academic Publishers
-
(2003)
Security and Privacy in the Age of Uncertainty, Proceedings of the 18th IFIP International Conference on Information Security
-
-
Karyda, M.1
Kokolakis, S.2
Kiountouzis, E.3
-
16
-
-
84980243161
-
The organization as political arena
-
H. Mintzberg The organization as political arena Journal of Management Studies 22 1985 133 154
-
(1985)
Journal of Management Studies
, vol.22
, pp. 133-154
-
-
Mintzberg, H.1
-
18
-
-
84980310861
-
Context and action in the transformation of the firm
-
A. Pettigrew Context and action in the transformation of the firm Journal of Management Studies 24 6 1987 649 670
-
(1987)
Journal of Management Studies
, vol.24
, Issue.6
, pp. 649-670
-
-
Pettigrew, A.1
-
21
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
M. Siponen A conceptual foundation for organizational information security awareness Information Management and Computer Security 8 1 2000 31 41
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
22
-
-
18844398752
-
Policies for construction of information systems' security guidelines
-
S. Qing J.H.P. Eloff Kluwer Academic Publishers
-
M. Siponen Policies for construction of information systems' security guidelines S. Qing J.H.P. Eloff Information security for global information infrastructures 2000 Kluwer Academic Publishers 112 120
-
(2000)
Information Security for Global Information Infrastructures
, pp. 112-120
-
-
Siponen, M.1
-
24
-
-
0001403574
-
A review of information systems evaluation: Content, context and process
-
V. Symons A review of information systems evaluation: content, context and process Journal of Information Systems 1 3 1991 205 212
-
(1991)
Journal of Information Systems
, vol.1
, Issue.3
, pp. 205-212
-
-
Symons, V.1
-
25
-
-
0034926180
-
A framework for the implementation of socio-ethical controls in information security
-
C. Trompeter, and J. Eloff A framework for the implementation of socio-ethical controls in information security Computers and Security 20 5 2001 384 391
-
(2001)
Computers and Security
, vol.20
, Issue.5
, pp. 384-391
-
-
Trompeter, C.1
Eloff, J.2
-
26
-
-
18844415452
-
-
UK Central Computer and Telecommunications Agency HMSO London
-
UK Central Computer and Telecommunications Agency CCTA risk analysis and management method: user manual 2002 HMSO London Version 5.0
-
(2002)
CCTA Risk Analysis and Management Method: User Manual
-
-
-
27
-
-
84974872728
-
Interpretive case studies in IS research: Nature and method
-
G. Walsham Interpretive case studies in IS research: nature and method European Journal of Information Systems 4 1995 74 81
-
(1995)
European Journal of Information Systems
, vol.4
, pp. 74-81
-
-
Walsham, G.1
-
28
-
-
0028408489
-
Information systems strategy and implementation: A case study of a building society
-
G. Walsham, and T. Waema Information systems strategy and implementation: a case study of a building society ACM Transactions on Information Systems 12 2 1994 150 173
-
(1994)
ACM Transactions on Information Systems
, vol.12
, Issue.2
, pp. 150-173
-
-
Walsham, G.1
Waema, T.2
-
29
-
-
18844449069
-
Security practice: Survey evidence from three countries
-
M. Warren Security practice: survey evidence from three countries Logistics Information Management 15 5/6 2002 347 351
-
(2002)
Logistics Information Management
, vol.15
, Issue.56
, pp. 347-351
-
-
Warren, M.1
-
32
-
-
18844458431
-
An unappreciated reason why security policies fail
-
C. Wood An unappreciated reason why security policies fail Computer Fraud and Security 10 2000 13 14
-
(2000)
Computer Fraud and Security
, vol.10
, pp. 13-14
-
-
Wood, C.1
|