메뉴 건너뛰기




Volumn 5, Issue 1, 1996, Pages 2-9

Structures of responsibility and security of information systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 21344459955     PISSN: 0960085X     EISSN: 14769344     Source Type: Journal    
DOI: 10.1057/ejis.1996.7     Document Type: Article
Times cited : (96)

References (45)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • ADAM NR and WORTMANN JC (1989) Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 21(4), 515-556.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 5
    • 0001156375 scopus 로고
    • Managing computer crime: A research outlook
    • BACKHOUSE J and DHILLON G (1995) Managing computer crime: a research outlook. Computers & Security 14(7), 645-651.
    • (1995) Computers & Security , vol.14 , Issue.7 , pp. 645-651
    • Backhouse, J.1    Dhillon, G.2
  • 7
    • 0013324190 scopus 로고
    • Risk analysis: An interpretive feasibility tool in justifying information systems security
    • BASKERVILLE R (1991) Risk analysis: an interpretive feasibility tool in justifying information systems security. European Journal of Information Systems 1(2), 121-130.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 11
  • 12
    • 0023397555 scopus 로고
    • Security and integrity controls for microcomputers: A summary analysis
    • BOOCKHOLDT JL (1987) Security and integrity controls for microcomputers: a summary analysis. Information and Management 13(1), 33-41.
    • (1987) Information and Management , vol.13 , Issue.1 , pp. 33-41
    • Boockholdt, J.L.1
  • 14
    • 0011588485 scopus 로고
    • Trusted products evaluation
    • CHOKHANI S (1992) Trusted products evaluation. Communications of ACM 35(7), 66-76.
    • (1992) Communications of ACM , vol.35 , Issue.7 , pp. 66-76
    • Chokhani, S.1
  • 16
    • 0017677616 scopus 로고
    • Security risk analysis in electronic data processing
    • AFIPS Press, Arlington Va
    • COURTNEY R (1977) Security risk analysis in electronic data processing. In AFIPS Conference Proceedings NCC. pp 97-104. AFIPS Press, Arlington Va.
    • (1977) AFIPS Conference Proceedings NCC , pp. 97-104
    • Courtney, R.1
  • 18
    • 1842709019 scopus 로고
    • A methodology for analysing human and computer- related issues in secure systems
    • (K DITTRICH, S RAUTAKIVI and J SAARI, Ed), IFIP/Sec ’90, Espoo (Helsinki), Finland: North-Holland
    • DOBSON J (1990) A methodology for analysing human and computer- related issues in secure systems. In Sixth IFIP International Conference on Computer Security and Information Integrity. (K DITTRICH, S RAUTAKIVI and J SAARI, Ed), IFIP/Sec ’90. pp 151-170. Espoo (Helsinki), Finland: North-Holland.
    • (1990) Sixth IFIP International Conference on Computer Security and Information Integrity. , pp. 151-170
    • Dobson, J.1
  • 22
    • 0022083988 scopus 로고
    • Microcomputer security: Data protection techniques
    • HIGHLAND H (1985) Microcomputer security: data protection techniques. Computers and Security 4 (June), 517-531.
    • (1985) Computers and Security , vol.4 , pp. 517-531
    • Highland, H.1
  • 23
    • 0018058216 scopus 로고
    • SECURATE - Security evaluation and analysis using fuzzy metrics
    • HOFFMAN J (1978) SECURATE - Security evaluation and analysis using fuzzy metrics. AFIPS National Conference Proceedings 47 531-540.
    • (1978) AFIPS National Conference Proceedings , vol.47 , pp. 531-540
    • Hoffman, J.1
  • 27
    • 0000133760 scopus 로고
    • Threats to information systems: Today’s reality, yesterday’s understanding
    • LOCH KD (1992) Threats to information systems: today’s reality, yesterday’s understanding. MIS Quarterly 16(2), 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1
  • 28
    • 24044486211 scopus 로고
    • Formal methods of secure systems
    • W CAELLI, D LONGLEY and M SHAIN, Stockton Press, New York
    • LONGLEY D (1991) Formal methods of secure systems. In Information security handbook. (W CAELLI, D LONGLEY and M SHAIN, Eds), pp 707-798. Stockton Press, New York.
    • (1991) Information Security Handbook , pp. 707-798
    • Longley, D.1
  • 30
    • 0025211594 scopus 로고
    • Specification and modelling of computer security
    • MCLEEN J (1990) Specification and modelling of computer security. Computer 23(1), 9-16.
    • (1990) Computer , vol.23 , Issue.1 , pp. 9-16
    • McLeen, J.1
  • 31
    • 84984737787 scopus 로고
    • Putting information assets on a balance sheet
    • MERTEN A (1982) Putting information assets on a balance sheet. Risk Management 29(1), 12-14, 16.
    • (1982) Risk Management , vol.29 , Issue.1 , pp. 12-14
    • Merten, A.1
  • 35
    • 0040964323 scopus 로고
    • Data processing - risk assessment
    • M WOFSEY, John Wiley & Sons, Chichester
    • SALTMARSH T and BROWNE P (1983) Data processing - risk assessment. In Advances in computer security management (M WOFSEY, Eds), pp 93-116. John Wiley & Sons, Chichester.
    • (1983) Advances in Computer Security Management , pp. 93-116
    • Saltmarsh, T.1    Browne, P.2
  • 39
    • 84984736790 scopus 로고
    • IEEE Symposium in Security and Privacy. AFIPS Press, Silver Srings, MD
    • TURN R (1982) Privacy protection in the 80s. In IEEE Symposium in Security and Privacy. AFIPS Press, Silver Srings, MD.
    • (1982) Privacy Protection in The , pp. 80s
    • Turn, R.1
  • 40
    • 0003066147 scopus 로고
    • Organisational metaphors and information systems research
    • WALSHAM G (1991) Organisational metaphors and information systems research. European Journal of Information Systems 1(2), 83-94.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 83-94
    • Walsham, G.1
  • 44
    • 24044474338 scopus 로고
    • Coping with computer proliferation
    • WITHINGTON FG (1980) Coping with computer proliferation. Harvard Business Review (May/June), 152-164.
    • (1980) Harvard Business Review , pp. 152-164
    • Withington, F.G.1
  • 45


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.