-
1
-
-
2142832387
-
"The perceived threats to the security of computerized accounting information systems"
-
Abu-Musa, A.A. (2003), "The perceived threats to the security of computerized accounting information systems", Journal of American Academy of Business, Vol. 1 No. 2, pp. 9-20.
-
(2003)
Journal of American Academy of Business
, vol.1
, Issue.2
, pp. 9-20
-
-
Abu-Musa, A.A.1
-
2
-
-
0000357545
-
"Estimating non-response bias in mail surveys"
-
Armstrong, S.J. and Overton, T.S. (1977), "Estimating non-response bias in mail surveys", Journal of Marketing Research, Vol. 14, pp. 396-402.
-
(1977)
Journal of Marketing Research
, vol.14
, pp. 396-402
-
-
Armstrong, S.J.1
Overton, T.S.2
-
3
-
-
84994184536
-
"Computer security issues in small and medium-sized enterprises"
-
Ban, L. and Heng, G. (1995), "Computer security issues in small and medium-sized enterprises", Singapore Management Review, Vol. 17 No. 1, pp. 15-30.
-
(1995)
Singapore Management Review
, vol.17
, Issue.1
, pp. 15-30
-
-
Ban, L.1
Heng, G.2
-
4
-
-
22244470742
-
"The impact of IT on SMEs in the United States"
-
Beheshti, H.M. (2004), "The impact of IT on SMEs in the United States", Information Management & Computer Security, Vol. 12 No. 4, pp. 318-27.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.4
, pp. 318-327
-
-
Beheshti, H.M.1
-
5
-
-
24144445527
-
"A security evaluation criteria"
-
Brooks, W.J., Warren, M.J. and Hutchinson, W. (2002), "A security evaluation criteria", Logistics Information Management, Vol. 15 Nos 5/6, pp. 377-84.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 377-384
-
-
Brooks, W.J.1
Warren, M.J.2
Hutchinson, W.3
-
6
-
-
33645589662
-
"A prototype tool for information security awareness and training"
-
Furnell, S.M., Gennatou, M. and Dowland, P.S. (2002), "A prototype tool for information security awareness and training", Logistics Information Management, Vol. 15 Nos 5/6, pp. 352-7.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 352-357
-
-
Furnell, S.M.1
Gennatou, M.2
Dowland, P.S.3
-
7
-
-
0042363394
-
"Quantifying the financial impact of IT security breaches"
-
Garg, A., Curtis, J. and Halper, H. (2003), "Quantifying the financial impact of IT security breaches", Information Management & Computer Security, Vol. 11 No. 2, pp. 74-83.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.2
, pp. 74-83
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
8
-
-
21144459480
-
"Expert systems development in small business: A managerial perspective"
-
Hebert, F. and Bradley, J. (1993), "Expert systems development in small business: A managerial perspective", Journal of Small Business Management, Vol. 31 No. 3, pp. 23-35.
-
(1993)
Journal of Small Business Management
, vol.31
, Issue.3
, pp. 23-35
-
-
Hebert, F.1
Bradley, J.2
-
9
-
-
0037400028
-
"An integrative study of information systems security effectiveness"
-
Kankanhalli, A., Teo, H., Tan, B. and Wei, K. (2003), "An integrative study of information systems security effectiveness", International Journal of Information Management, Vol. 23 No. 2, p. 139.
-
(2003)
International Journal of Information Management
, vol.23
, Issue.2
, pp. 139
-
-
Kankanhalli, A.1
Teo, H.2
Tan, B.3
Wei, K.4
-
10
-
-
0005692985
-
"Computer security: Who's minding the store?"
-
Knotts, R. and Richards, T. (1989), "Computer security: Who's minding the store?", The Academy of Management Executive, Vol. 3 No. 1, pp. 63-6.
-
(1989)
The Academy of Management Executive
, vol.3
, Issue.1
, pp. 63-66
-
-
Knotts, R.1
Richards, T.2
-
11
-
-
0038035157
-
"Guarding the cyberfort"
-
Krause, J. (2003), "Guarding the cyberfort", ABA Journal, Vol. 89, pp. 42-6.
-
(2003)
ABA Journal
, vol.89
, pp. 42-46
-
-
Krause, J.1
-
12
-
-
33645589941
-
"Developing sound security policies"
-
30 June
-
Lei, T.A. (2003), "Developing sound security policies", Asia Computer Weekly, 30 June, p. 1.
-
(2003)
Asia Computer Weekly
, pp. 1
-
-
Lei, T.A.1
-
13
-
-
1642501482
-
"Information security practices and experiences in small businesses"
-
Unpublished Dissertation, George Washington University
-
Ryan, J.J.C. (2000), "Information security practices and experiences in small businesses", Unpublished Dissertation, George Washington University.
-
(2000)
-
-
Ryan, J.J.C.1
-
14
-
-
33645599051
-
"Betting students will be drawn to ethical hacking"
-
Sisk, M. (2003), "Betting students will be drawn to ethical hacking", US Banker, Vol. 113 No. 6, p. 12.
-
(2003)
US Banker
, vol.113
, Issue.6
, pp. 12
-
-
Sisk, M.1
-
15
-
-
0036036094
-
"Issues in cybersecurity; understanding the potential risks associated with hackers/crackers"
-
Smith, A.D. and Rupp, W.T. (2002), "Issues in cybersecurity; understanding the potential risks associated with hackers/crackers", Information Management & Computer Security, Vol. 10 No. 4, pp. 178-83.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.4
, pp. 178-183
-
-
Smith, A.D.1
Rupp, W.T.2
-
16
-
-
84993070579
-
"Information technology in the small business: Establishing the basis for a management information system"
-
Smith, J. (1999), "Information technology in the small business: establishing the basis for a management information system", Journal of Small Business and Enterprise Development, Vol. 6 No. 4, pp. 326-40.
-
(1999)
Journal of Small Business and Enterprise Development
, vol.6
, Issue.4
, pp. 326-340
-
-
Smith, J.1
-
17
-
-
0003168891
-
"Security requirements, risks and recommendations for small enterprise and home-office environments"
-
Spinellis, D., Kokolakis, S. and Gritzalis, S. (1999), "Security requirements, risks and recommendations for small enterprise and home-office environments", Information Management & Computer Security, Vol. 7 No. 3, pp. 121-8.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.3
, pp. 121-128
-
-
Spinellis, D.1
Kokolakis, S.2
Gritzalis, S.3
-
18
-
-
33645584432
-
"IT security issues"
-
Wakefield, R. (2002), "IT security issues", The CPA Journal, Vol. 72 No. 11, pp. 55-6.
-
(2002)
The CPA Journal
, vol.72
, Issue.11
, pp. 55-56
-
-
Wakefield, R.1
-
19
-
-
18844449069
-
"Security practice: Survey evidence from three countries"
-
Warren, M.J. (2002), "Security practice: Survey evidence from three countries", Logistics Information Management, Vol. 15 Nos 5/6, pp. 347-51.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 347-351
-
-
Warren, M.J.1
-
20
-
-
33645601173
-
"Preparing your business for secure e-commerce"
-
Williams, K. (2000), "Preparing your business for secure e-commerce", Strategic Finance, Vol. 82 No. 3, p. 21.
-
(2000)
Strategic Finance
, vol.82
, Issue.3
, pp. 21
-
-
Williams, K.1
|