-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
ADAM NR and WORTMANN JC (1989) Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 21(4), 515-556.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
5
-
-
0001156375
-
Managing computer crime: A research outlook
-
BACKHOUSE J and DHILLON G (1995) Managing computer crime: a research outlook. Computers & Security 14(7), 645-651.
-
(1995)
Computers & Security
, vol.14
, Issue.7
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
7
-
-
0013324190
-
Risk analysis: An interpretive feasibility tool in justifying information systems security
-
BASKERVILLE R (1991) Risk analysis: an interpretive feasibility tool in justifying information systems security. European Journal of Information Systems 1(2), 121-130.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 121-130
-
-
Baskerville, R.1
-
12
-
-
0023397555
-
Security and integrity controls for microcomputers: A summary analysis
-
BOOCKHOLDT JL (1987) Security and integrity controls for microcomputers: a summary analysis. Information and Management 13(1), 33-41.
-
(1987)
Information and Management
, vol.13
, Issue.1
, pp. 33-41
-
-
Boockholdt, J.L.1
-
14
-
-
0011588485
-
Trusted products evaluation
-
CHOKHANI S (1992) Trusted products evaluation. Communications of ACM 35(7), 66-76.
-
(1992)
Communications of ACM
, vol.35
, Issue.7
, pp. 66-76
-
-
Chokhani, S.1
-
16
-
-
0017677616
-
Security risk analysis in electronic data processing
-
AFIPS Press, Arlington Va
-
COURTNEY R (1977) Security risk analysis in electronic data processing. In AFIPS Conference Proceedings NCC. pp 97-104. AFIPS Press, Arlington Va.
-
(1977)
AFIPS Conference Proceedings NCC
, pp. 97-104
-
-
Courtney, R.1
-
18
-
-
1842709019
-
A methodology for analysing human and computer- related issues in secure systems
-
(K DITTRICH, S RAUTAKIVI and J SAARI, Ed), IFIP/Sec ’90, Espoo (Helsinki), Finland: North-Holland
-
DOBSON J (1990) A methodology for analysing human and computer- related issues in secure systems. In Sixth IFIP International Conference on Computer Security and Information Integrity. (K DITTRICH, S RAUTAKIVI and J SAARI, Ed), IFIP/Sec ’90. pp 151-170. Espoo (Helsinki), Finland: North-Holland.
-
(1990)
Sixth IFIP International Conference on Computer Security and Information Integrity.
, pp. 151-170
-
-
Dobson, J.1
-
21
-
-
27244456909
-
-
R SHAW and J BRANSFORD (Eds), Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ
-
GIBSON JJ (1977) The theory of affordances: In Perceiving, acting and knowing. R SHAW and J BRANSFORD (Eds), Lawrence Erlbaum Associates, Publishers, Hillsdale, NJ.
-
(1977)
The Theory of Affordances: In Perceiving, Acting and Knowing
-
-
Gibson, J.J.1
-
22
-
-
0022083988
-
Microcomputer security: Data protection techniques
-
HIGHLAND H (1985) Microcomputer security: data protection techniques. Computers and Security 4 (June), 517-531.
-
(1985)
Computers and Security
, vol.4
, pp. 517-531
-
-
Highland, H.1
-
23
-
-
0018058216
-
SECURATE - Security evaluation and analysis using fuzzy metrics
-
HOFFMAN J (1978) SECURATE - Security evaluation and analysis using fuzzy metrics. AFIPS National Conference Proceedings 47 531-540.
-
(1978)
AFIPS National Conference Proceedings
, vol.47
, pp. 531-540
-
-
Hoffman, J.1
-
27
-
-
0000133760
-
Threats to information systems: Today’s reality, yesterday’s understanding
-
LOCH KD (1992) Threats to information systems: today’s reality, yesterday’s understanding. MIS Quarterly 16(2), 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
-
28
-
-
24044486211
-
Formal methods of secure systems
-
W CAELLI, D LONGLEY and M SHAIN, Stockton Press, New York
-
LONGLEY D (1991) Formal methods of secure systems. In Information security handbook. (W CAELLI, D LONGLEY and M SHAIN, Eds), pp 707-798. Stockton Press, New York.
-
(1991)
Information Security Handbook
, pp. 707-798
-
-
Longley, D.1
-
30
-
-
0025211594
-
Specification and modelling of computer security
-
MCLEEN J (1990) Specification and modelling of computer security. Computer 23(1), 9-16.
-
(1990)
Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLeen, J.1
-
31
-
-
84984737787
-
Putting information assets on a balance sheet
-
MERTEN A (1982) Putting information assets on a balance sheet. Risk Management 29(1), 12-14, 16.
-
(1982)
Risk Management
, vol.29
, Issue.1
, pp. 12-14
-
-
Merten, A.1
-
35
-
-
0040964323
-
Data processing - risk assessment
-
M WOFSEY, John Wiley & Sons, Chichester
-
SALTMARSH T and BROWNE P (1983) Data processing - risk assessment. In Advances in computer security management (M WOFSEY, Eds), pp 93-116. John Wiley & Sons, Chichester.
-
(1983)
Advances in Computer Security Management
, pp. 93-116
-
-
Saltmarsh, T.1
Browne, P.2
-
39
-
-
84984736790
-
-
IEEE Symposium in Security and Privacy. AFIPS Press, Silver Srings, MD
-
TURN R (1982) Privacy protection in the 80s. In IEEE Symposium in Security and Privacy. AFIPS Press, Silver Srings, MD.
-
(1982)
Privacy Protection in The
, pp. 80s
-
-
Turn, R.1
-
40
-
-
0003066147
-
Organisational metaphors and information systems research
-
WALSHAM G (1991) Organisational metaphors and information systems research. European Journal of Information Systems 1(2), 83-94.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 83-94
-
-
Walsham, G.1
-
44
-
-
24044474338
-
Coping with computer proliferation
-
WITHINGTON FG (1980) Coping with computer proliferation. Harvard Business Review (May/June), 152-164.
-
(1980)
Harvard Business Review
, pp. 152-164
-
-
Withington, F.G.1
-
45
-
-
24044468969
-
-
National Computing Centre, Manchester
-
WONG K (1977) Risk analysis and control. National Computing Centre, Manchester.
-
(1977)
Risk Analysis and Control
-
-
Wong, K.1
|