-
1
-
-
0041983747
-
Strategy paper
-
February
-
Arnott, S. (2002, February). Strategy paper. Computing.
-
(2002)
Computing
-
-
Arnott, S.1
-
3
-
-
0041482690
-
The evaluation and certification of information security against BS 7799
-
Barnard, L. & von Solms, R. (1998). The evaluation and certification of information security against BS 7799. Information Management and Computer Security, 6(2), 72-77.
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.2
, pp. 72-77
-
-
Barnard, L.1
Von Solms, R.2
-
4
-
-
84861241029
-
An information security policy development guide for large companies
-
Canavan, S. (2003). An information security policy development guide for large companies. SANS Institute. Retrieved from http://www.SANS.org
-
(2003)
SANS Institute
-
-
Canavan, S.1
-
5
-
-
0036398120
-
Policy enforcement in the workplace
-
David, J. (2002). Policy enforcement in the workplace. Computers and Security, 27(6), 506-513.
-
(2002)
Computers and Security
, vol.27
, Issue.6
, pp. 506-513
-
-
David, J.1
-
6
-
-
25144521712
-
Taking responsibility for worms and viruses
-
De Campeaux, D. (2002). Taking responsibility for worms and viruses. Communications of the ACM, 45(4), 15-16.
-
(2002)
Communications of the ACM
, vol.45
, Issue.4
, pp. 15-16
-
-
De Campeaux, D.1
-
11
-
-
25144519631
-
Information security policies in large organisations: Developing a conceptual framework to explore their impact
-
M. Khosrow-Pour (Ed.), Philadelphia, Pennsylvania, May 18-21. Hershey, PA: Idea Group Publishing
-
Doherty, N.F. & Fulford, H. (2003). Information security policies in large organisations: Developing a conceptual framework to explore their impact. In M. Khosrow-Pour (Ed.), Information Technology & Organizations: Trends, Issues, Challenges & Solutions, 2003 Information Resources Management Association International Conference, Philadelphia, Pennsylvania, May 18-21 (pp. 1052-1053). Hershey, PA: Idea Group Publishing.
-
(2003)
Information Technology & Organizations: Trends, Issues, Challenges & Solutions, 2003 Information Resources Management Association International Conference
, pp. 1052-1053
-
-
Doherty, N.F.1
Fulford, H.2
-
12
-
-
0042363355
-
The application of information security policies in large UK-based organizations
-
Fulford, H. & Doherty, N.F. (2003). The application of information security policies in large UK-based organizations. Information Management and Computer Security, 11(3), 106-114.
-
(2003)
Information Management and Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
13
-
-
0042363394
-
Quantifying the financial impact of information security breaches
-
Garg, A., Curtis, J., & Halper, H. (2003). Quantifying the financial impact of information security breaches. Information Management and Computer Security, 11(2), 74-83.
-
(2003)
Information Management and Computer Security
, vol.11
, Issue.2
, pp. 74-83
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
15
-
-
0027853605
-
Measuring the value of information: The information intensive organization
-
Glazer, R. (1993). Measuring the value of information: The information intensive organization. IBM Systems Journal., 32(1), 99-110.
-
(1993)
IBM Systems Journal
, vol.32
, Issue.1
, pp. 99-110
-
-
Glazer, R.1
-
16
-
-
0041482688
-
Corporate system security: Towards an integrated management approach
-
Higgins, H.N. (1999). Corporate system security: Towards an integrated management approach. Information Management and Computer Security, 7(5), 217-222.
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.5
, pp. 217-222
-
-
Higgins, H.N.1
-
17
-
-
0036299585
-
Security surveys spring crop
-
Hinde, S. (2002). Security surveys spring crop. Computers and Security, 21(4), 310-321.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 310-321
-
-
Hinde, S.1
-
18
-
-
0037565614
-
Cyber-terrorism in context
-
Hinde, S. (2003). Cyber-terrorism in context. Computers and Security, 22(3), 188-192.
-
(2003)
Computers and Security
, vol.22
, Issue.3
, pp. 188-192
-
-
Hinde, S.1
-
19
-
-
0036330173
-
Information security policy: What do international security standards say
-
Hone, K. & Eloff, J.H.P. (2002a). Information security policy: What do international security standards say. Computers & Security, 21(5), 402-409.
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Hone, K.1
Eloff, J.H.P.2
-
20
-
-
0036613095
-
What makes an effective information security policy
-
Hone, K. & Eloff, J.H.P. (2002b). What makes an effective information security policy. Network Security, 20(6), 14-16.
-
(2002)
Network Security
, vol.20
, Issue.6
, pp. 14-16
-
-
Hone, K.1
Eloff, J.H.P.2
-
21
-
-
0345327795
-
An integrated system theory of information security management
-
Hong, K., Chi, Y., Chao, L., & Tang, J. (2003). An integrated system theory of information security management. Information Management and Computer Security, 11(5), 243-248.
-
(2003)
Information Management and Computer Security
, vol.11
, Issue.5
, pp. 243-248
-
-
Hong, K.1
Chi, Y.2
Chao, L.3
Tang, J.4
-
23
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic, A.G. & Clark, J.G. (2004). Why there aren't more information security research studies. Information & Management, 41, 5907-607.
-
(2004)
Information & Management
, vol.41
, pp. 5907-6607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
25
-
-
1942460393
-
Handling non-response in social science research
-
Lindner, J.R., Murphy, T.H., & Briers, G.E. (2001). Handling non-response in social science research. Journal of Agricultural Education, 42(4), 43-53.
-
(2001)
Journal of Agricultural Education
, vol.42
, Issue.4
, pp. 43-53
-
-
Lindner, J.R.1
Murphy, T.H.2
Briers, G.E.3
-
26
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K.D., Carr, H.H., & Warkentin, M.E. (1992). Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly, 16(2), 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
27
-
-
25144472614
-
Information systems security
-
J. Peppard (Ed.). London: Pitman Publishing
-
Menzies, R. (1993). Information systems security. In J. Peppard (Ed.), IT strategy for business. London: Pitman Publishing.
-
(1993)
IT Strategy for Business
-
-
Menzies, R.1
-
28
-
-
84986133689
-
Corporate information security
-
Mitchell, R.C., Marcella, R., & Baxter, G. (1999). Corporate information security. New Library World, 100 1150), 213-277.
-
(1999)
New Library World
, vol.100
, Issue.1150
, pp. 213-277
-
-
Mitchell, R.C.1
Marcella, R.2
Baxter, G.3
-
29
-
-
0003724905
-
Information systems security: Scope, state of the art and evaluation of techniques
-
Pernul, G. (1995). Information systems security: Scope, state of the art and evaluation of techniques. International Journal of Information Management, 75(3), 165-180.
-
(1995)
International Journal of Information Management
, vol.75
, Issue.3
, pp. 165-180
-
-
Pernul, G.1
-
31
-
-
0001775054
-
An empirical assessment of information systems planning and the role of information systems in organizations
-
Premkumar, G. & King, W.R. (1992). An empirical assessment of information systems planning and the role of information systems in organizations. Journal of Management Information Systems, 19(2), 99-125.
-
(1992)
Journal of Management Information Systems
, vol.19
, Issue.2
, pp. 99-125
-
-
Premkumar, G.1
King, W.R.2
-
32
-
-
1142273446
-
PFIRES: A policy framework for information security
-
Rees, J., Bandyopadhyay, S., & Spafford, E.H. (2003). PFIRES: A policy framework for information security. Communications of the ACM, 46(1), 101-106.
-
(2003)
Communications of the ACM
, vol.46
, Issue.1
, pp. 101-106
-
-
Rees, J.1
Bandyopadhyay, S.2
Spafford, E.H.3
-
34
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W. & Welke, R.J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-470.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-470
-
-
Straub, D.W.1
Welke, R.J.2
-
35
-
-
3042812983
-
The ten deadly sins of information security management
-
von Solms, B. & von Solms, R. (2004). The ten deadly sins of information security management. Computers & Security, 23, 371-376.
-
(2004)
Computers & Security
, vol.23
, pp. 371-376
-
-
Von Solms, B.1
Von Solms, R.2
-
37
-
-
1242265154
-
In defense of the realm: Understanding threats to information security
-
Whitman. (2004). In defense of the realm: Understanding threats to information security. International Journal of Information Management, 24, 3-4.
-
(2004)
International Journal of Information Management
, vol.24
, pp. 3-4
-
-
Whitman1
-
38
-
-
0000613590
-
Writing infosec policies
-
Wood, C.C. (1996). Writing infosec policies. Computers & Security, 14(8), 667-674.
-
(1996)
Computers & Security
, vol.14
, Issue.8
, pp. 667-674
-
-
Wood, C.C.1
-
39
-
-
18844458431
-
An unappreciated reason why information security policies fail
-
Wood, C.C. (2000). An unappreciated reason why information security policies fail. Computer Fraud & Security, 10, 13-14.
-
(2000)
Computer Fraud & Security
, vol.10
, pp. 13-14
-
-
Wood, C.C.1
|