-
1
-
-
71549159679
-
Six top information systems issues
-
Anon. Six top information systems issues EDP Analyzer 23 1 Jan 1985 1 12
-
(1985)
EDP Analyzer
, vol.23
, Issue.1
, pp. 1-12
-
-
-
2
-
-
0024717026
-
Framework of a methodology for the life cycle of computer security in an organization
-
K.P. Badenhorst, and J.H.P. Eloff Framework of a methodology for the life cycle of computer security in an organization Computers and Security 8 5 August 1989 433 442
-
(1989)
Computers and Security
, vol.8
, Issue.5
, pp. 433-442
-
-
Badenhorst, K.P.1
Eloff, J.H.P.2
-
3
-
-
0002122064
-
SMIS member: A membership analysis
-
L. Ball, and R. Harris SMIS member: a membership analysis MIS Quarterly 6 1 March 1982 19 38
-
(1982)
MIS Quarterly
, vol.6
, Issue.1
, pp. 19-38
-
-
Ball, L.1
Harris, R.2
-
7
-
-
55249089317
-
Key issues in information systems: 1986
-
J. Brancheau, and J.C. Wetherbe Key issues in information systems: 1986 MIS Quarterly 11 1 March 1987 23 45
-
(1987)
MIS Quarterly
, vol.11
, Issue.1
, pp. 23-45
-
-
Brancheau, J.1
Wetherbe, J.C.2
-
8
-
-
9744281201
-
Key issues in information systems management: 1994-95 SIM Delphi results
-
J.C. Brancheau, B.D. Janz, and J.C. Wetherbe Key issues in information systems management: 1994-95 SIM Delphi results MIS Quarterly 20 2 June 1996 225 242
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 225-242
-
-
Brancheau, J.C.1
Janz, B.D.2
Wetherbe, J.C.3
-
10
-
-
0344212319
-
Governments find information pays
-
R. Chandrasekaran Governments find information pays Washington Post March 9, 1998 A1, A12
-
(1998)
Washington Post
-
-
Chandrasekaran, R.1
-
12
-
-
24644478393
-
How to keep prying eyes off your medical records
-
Carol Marie Cropper How to keep prying eyes off your medical records Business Week November 19, 2001 130 132
-
(2001)
Business Week
, pp. 130-132
-
-
Carol Marie, C.1
-
13
-
-
0029547159
-
A methodology for the design of security plans
-
W.F. De Koning A methodology for the design of security plans Computers and Security 14 7 1995 633 643
-
(1995)
Computers and Security
, vol.14
, Issue.7
, pp. 633-643
-
-
De Koning, W.F.1
-
14
-
-
0003387607
-
Key information systems issues for the 80's
-
G.W. Dickeson, R.L. Leitheiser, J.C. Wetherbe, and M. Nechis Key information systems issues for the 80's MIS Quarterly 8 3 September 1984 135 159
-
(1984)
MIS Quarterly
, vol.8
, Issue.3
, pp. 135-159
-
-
Dickeson, G.W.1
Leitheiser, R.L.2
Wetherbe, J.C.3
Nechis, M.4
-
17
-
-
24644511484
-
Keeping the lid on secrets
-
Lance J. Ewing Keeping the lid on secrets Risk Management 39 November 1992 18
-
(1992)
Risk Management
, vol.39
, pp. 18
-
-
Ewing Lance, J.1
-
18
-
-
24644439523
-
Information security: More than money alone
-
Jack W. Farrell Information security: more than money alone Traffic Management 17 8 Aug. 1978 42 44
-
(1978)
Traffic Management
, vol.17
, Issue.8
, pp. 42-44
-
-
Farrell Jack, W.1
-
19
-
-
0030417096
-
The information security chain in a company
-
Thomas Finne The information security chain in a company Computers and Security 15 1996 297
-
(1996)
Computers and Security
, vol.15
, pp. 297
-
-
Thomas, F.1
-
22
-
-
84989598473
-
The right of privacy in the age of computer data and processing
-
R. Freedman The right of privacy in the age of computer data and processing Texas Tech Law Review 13 1982 1361 1363
-
(1982)
Texas Tech Law Review
, vol.13
, pp. 1361-1363
-
-
Freedman, R.1
-
26
-
-
15744391114
-
-
NIST special publication 800-61. National Institute of Standards and Technology; January
-
Grance Tim, Kent Karen, Kim Brian. Computer security incident handling guide, NIST special publication 800-61. National Institute of Standards and Technology; January 2004.
-
(2004)
Computer Security Incident Handling Guide
-
-
Tim, G.1
Karen, K.2
Brian, K.3
-
27
-
-
55249121963
-
1985 Opinion survey of MIS managers: Key issues
-
C. Hartlog, and M. Herbert 1985 Opinion survey of MIS managers: key issues MIS Quarterly 10 4 December 1986 351 361
-
(1986)
MIS Quarterly
, vol.10
, Issue.4
, pp. 351-361
-
-
Hartlog, C.1
Herbert, M.2
-
28
-
-
0011418384
-
Integrating data security into the systems development life cycle
-
Avraham Hayam, and Effy Oz Integrating data security into the systems development life cycle Journal of Systems Management August 1993 16
-
(1993)
Journal of Systems Management
, pp. 16
-
-
Avraham, H.1
Effy, O.2
-
29
-
-
84982723008
-
Information security: An overview and resource guide for information managers
-
Lisa B. Hill, and Michael Pemberton Information security: an overview and resource guide for information managers Records Management Quarterly January 1995 14
-
(1995)
Records Management Quarterly
, pp. 14
-
-
Hill Lisa, B.1
Michael, P.2
-
30
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Jeffrey A. Hoffer, and Detmar W. Straub The 9 to 5 underground: are you policing computer crimes? Sloan Management Review 30 4 Summer 1989 35
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35
-
-
Hoffer Jeffrey, A.1
Straub Detmar, W.2
-
32
-
-
85021329238
-
Some minimum requirements for legal sanctioning systems with special emphasis on detection
-
Alfred Blumstein Jacqueline Cohen Daniel Nagin National Academy of Sciences Washington, D.C.
-
Hans Kletee Some minimum requirements for legal sanctioning systems with special emphasis on detection Alfred Blumstein Jacqueline Cohen Daniel Nagin Deterrence and incapacitation: estimating the effects of criminal sanctions on crime rates 1975 National Academy of Sciences Washington, D.C.
-
(1975)
Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
-
-
Hans, K.1
-
33
-
-
0030671775
-
Information warfare and the information systems security professional
-
Gerald L. Kovacich Information warfare and the information systems security professional Computers and Security 16 1997 19
-
(1997)
Computers and Security
, vol.16
, pp. 19
-
-
Kovacich Gerald, L.1
-
35
-
-
0034418444
-
Information privacy: Corporate management and national regulation
-
Sandra J. Milberg, H. Jeff Smith, and Sandra J. Burke Information privacy: corporate management and national regulation Organization Science 11 1 January-February 2000 35 57
-
(2000)
Organization Science
, vol.11
, Issue.1
, pp. 35-57
-
-
Milberg Sandra, J.1
Jeff, S.H.2
Burke Sandra, J.3
-
36
-
-
24044502721
-
Information systems management issues for the 1990's
-
F. Niederman, J.C. Brancheau, and J.C. Wetherbe Information systems management issues for the 1990's MISS Quarterly 15 4 December 1991 475 495
-
(1991)
MISS Quarterly
, vol.15
, Issue.4
, pp. 475-495
-
-
Niederman, F.1
Brancheau, J.C.2
Wetherbe, J.C.3
-
37
-
-
0007172591
-
Drug plans keep tabs on patients' medication
-
R. O'Harrow Drug plans keep tabs on patients' medication Washington Post September 27, 1998 A1, A26
-
(1998)
Washington Post
-
-
O'Harrow, R.1
-
40
-
-
0021425587
-
The many faces of data vulnerability
-
Donn B. Parker The many faces of data vulnerability IEEE Spectrum 21 5 May 1984 46 49
-
(1984)
IEEE Spectrum
, vol.21
, Issue.5
, pp. 46-49
-
-
Parker Donn, B.1
-
41
-
-
0022301472
-
Toward an integration of criminological theories
-
F.S. Pearson, and N.A. Weiner Toward an integration of criminological theories Journal of Crime and Criminology 76 1 Winter 1985 116 150
-
(1985)
Journal of Crime and Criminology
, vol.76
, Issue.1
, pp. 116-150
-
-
Pearson, F.S.1
Weiner, N.A.2
-
44
-
-
24644523158
-
Holistic approach needed for healthy security program
-
Ralph Spencer Poore Holistic approach needed for healthy security program Computing Canada 6 25 Dec 9, 1980 7
-
(1980)
Computing Canada
, vol.6
, Issue.25
, pp. 7
-
-
Ralph Spencer, P.1
-
45
-
-
0002779304
-
Privacy, information technology, and health care
-
Thomas Rindfleisch Privacy, information technology, and health care Communications of the ACM 40 8 1997 92 100
-
(1997)
Communications of the ACM
, vol.40
, Issue.8
, pp. 92-100
-
-
Thomas, R.1
-
46
-
-
24644444077
-
Computing security risk analysis: Is it worth it?
-
James A. Schweitzer Computing security risk analysis: is it worth it? Security Management 25 8 Aug 1981 104 106
-
(1981)
Security Management
, vol.25
, Issue.8
, pp. 104-106
-
-
Schweitzer James, A.1
-
47
-
-
0027805822
-
Privacy policies and practices: Inside the organizational maze
-
H. Jeff Smith Privacy policies and practices: inside the organizational maze Communications of the ACM 36 12 1993 105 122
-
(1993)
Communications of the ACM
, vol.36
, Issue.12
, pp. 105-122
-
-
Jeff Smith, H.1
-
49
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke Information privacy: measuring individuals' concerns about organizational practices MIS Quarterly 20 2 1996 167 196
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Jeff, S.H.1
Milberg Sandra, J.2
Burke Sandra, J.3
-
50
-
-
24644473900
-
Overview of HIPAA: Implementation of the HIPAA laws and regulations, patient rights under HIPAA
-
Medical Educational Services, Inc.
-
Paul English Smith Overview of HIPAA: implementation of the HIPAA laws and regulations, patient rights under HIPAA HIPAA, medical record compliance and the e-revolution 2001 Medical Educational Services, Inc. 2001 Edition, Copyright 2001
-
(2001)
HIPAA, Medical Record Compliance and the E-revolution
-
-
Paul English, S.1
-
52
-
-
0141917862
-
A framework for information security evaluation
-
R. von Solms, H. van de Haar, S.H. von Solms, and W.J. Caelli A framework for information security evaluation Information and Management 26 3 March 1994 143 153
-
(1994)
Information and Management
, vol.26
, Issue.3
, pp. 143-153
-
-
Von Solms, R.1
Van De Haar, H.2
Von Solms, S.H.3
Caelli, W.J.4
-
53
-
-
53349102510
-
Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
-
Detmar W. Straub Jr., and Rosann Webb Collins Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy MIS Quarterly 14 2 Jun 01 1990 143
-
(1990)
MIS Quarterly
, vol.14
, Issue.2
, pp. 143
-
-
Straub Jr., D.W.1
Collins, R.W.2
-
54
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Detmar W. Straub Jr., and William D. Nance Discovering and disciplining computer abuse in organizations: a field study MIS Quarterly 14 1 Mar 01, 1990 45
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45
-
-
Straub Jr., D.W.1
Nance, W.D.2
-
55
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision-making
-
Detmar W. Straub, and Richard J. Welke Coping with systems risk: security planning models for management decision-making MIS Quarterly 22 4 Dec 01, 1998 441
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441
-
-
Straub Detmar, W.1
Welke Richard, J.2
-
57
-
-
55249123249
-
Validating instruments in MIS research
-
Detmar W. Straub Jr. Validating instruments in MIS research MIS Quarterly 13 2 June 1989 147
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147
-
-
Straub Jr., D.W.1
-
58
-
-
0000280419
-
Effective is security: An empirical study
-
Detmar W. Straub Jr. Effective is security: an empirical study Information Systems Research 1 3 Sep 01, 1990 255
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255
-
-
Straub Jr., D.W.1
-
59
-
-
8744241162
-
Deterring highly motivated computer abusers: A field experiment in computer security
-
G.G. Gable W.J. Caelli North-Holland Amsterdam
-
D.W. Straub, P.J. Carlson, and E.H. Jones Deterring highly motivated computer abusers: a field experiment in computer security G.G. Gable W.J. Caelli IT security: the need for international cooperation 1992 North-Holland Amsterdam 309 324
-
(1992)
IT Security: The Need for International Cooperation
, pp. 309-324
-
-
Straub, D.W.1
Carlson, P.J.2
Jones, E.H.3
-
60
-
-
0141463342
-
Deterring cheating by student programmers: A field experiment in computer security
-
D.W. Straub, P.J. Carlson, and E.H. Jones Deterring cheating by student programmers: a field experiment in computer security Journal of Management Systems 5 1 1993 33 48
-
(1993)
Journal of Management Systems
, vol.5
, Issue.1
, pp. 33-48
-
-
Straub, D.W.1
Carlson, P.J.2
Jones, E.H.3
-
61
-
-
24644512031
-
Personnel security policy critical to dispel risk
-
J. Van Duyn Personnel security policy critical to dispel risk Computerworld 17 48 Nov 28, 1983 9 10 Special report
-
(1983)
Computerworld
, vol.17
, Issue.48
, pp. 9-10
-
-
Van Duyn, J.1
|