-
1
-
-
21344459955
-
Structures of Responsibility and Security of Information Systems
-
Backhouse, J., and Dhillon, G. “Structures of Responsibility and Security of Information Systems,” European Journal of Information Systems (5:1), 1996, pp. 2-9.
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-9
-
-
Backhouse, J.1
Dhillon, G.2
-
2
-
-
0027804413
-
Information Systems Security Design Methods: Implications for Information Systems Development
-
Baskerville, R. “Information Systems Security Design Methods: Implications for Information Systems Development,” ACM Computing Surveys (25:4), 1993, pp. 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
3
-
-
85053159874
-
Security Risk Analysis in Electronic Data Processing
-
Dallas, Texas, AFIPS Press, Montvale, NJ
-
Courtney, R. “Security Risk Analysis in Electronic Data Processing,” in Proceedings of the AFIPS Conference Proceedings, National Computer Conference, Dallas, Texas, AFIPS Press, Montvale, NJ, 1977, pp. 97-104.
-
(1977)
Proceedings of the AFIPS Conference Proceedings, National Computer Conference
, pp. 97-104
-
-
Courtney, R.1
-
4
-
-
0003335017
-
Challenges in Managing Information Security in the New Millennium
-
G. Dhillon (ed), Idea Group Publishing, Hershey, PA
-
Dhillon, G. “Challenges in Managing Information Security in the New Millennium,” in Information Security Management: Global Challenges in the New Millennium, G. Dhillon (ed.), Idea Group Publishing, Hershey, PA, 2001.
-
(2001)
Information Security Management: Global Challenges in the New Millennium
-
-
Dhillon, G.1
-
5
-
-
23044525969
-
Current Directions in IS Security Research: Towards Socio-organizational Perspectives
-
Dhillon, G., and Backhouse, J. “Current Directions in IS Security Research: Towards Socio-organizational Perspectives,” Information Systems Journal (11:2), 2001.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
-
-
Dhillon, G.1
Backhouse, J.2
-
6
-
-
0001889434
-
Creativity in Decision Making with Value-Focused Thinking
-
Summer
-
Keeney, R. L. “Creativity in Decision Making with Value-Focused Thinking,” Sloan Management Review, Summer, 1994, pp. 33-41.
-
(1994)
Sloan Management Review
, pp. 33-41
-
-
Keeney, R. L.1
-
7
-
-
0003721855
-
-
Harvard University Press, Cambridge, MA
-
Keeney, R. L. Value-Focused Thinking, Harvard University Press, Cambridge, MA, 1992.
-
(1992)
Value-Focused Thinking
-
-
Keeney, R. L.1
-
8
-
-
0032678626
-
The Value of Internet Commerce to the Customer
-
Keeney, R. L. “The Value of Internet Commerce to the Customer,” Management Science (45:4), 1999, pp. 533-542.
-
(1999)
Management Science
, vol.45
, Issue.4
, pp. 533-542
-
-
Keeney, R. L.1
-
9
-
-
85194809422
-
Internal Controls by Objectives: The Functional Control by Objectives
-
Deerhurst, Ontario, Canada
-
Krueger, K. H. “Internal Controls by Objectives: The Functional Control by Objectives,” in Proceedings of the IFIP/Sec '93, Computer Security: Discovering Tomorrow, Deerhurst, Ontario, Canada, 1993, pp. 151-164.
-
(1993)
Proceedings of the IFIP/Sec '93, Computer Security: Discovering Tomorrow
, pp. 151-164
-
-
Krueger, K. H.1
-
10
-
-
0000133760
-
Threats to Information Systems: Today’s Reality, Yesterday’s Understanding
-
June
-
Loch, K. D., Carr, H. H., and Warkentin, M. E. “Threats to Information Systems: Today’s Reality, Yesterday’s Understanding,” MIS Quarterly, June, 1992, pp. 173-186.
-
(1992)
MIS Quarterly
, pp. 173-186
-
-
Loch, K. D.1
Carr, H. H.2
Warkentin, M. E.3
-
11
-
-
0001133137
-
Coping with Systems Risks: Security Planning Models for Management Decision Making
-
Straub, D. W., and Welke, R. J. “Coping with Systems Risks: Security Planning Models for Management Decision Making,” MIS Quarterly (22:4), 1998, pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D. W.1
Welke, R. J.2
-
12
-
-
85026464527
-
How Responsibility Modeling Leads to Security Requirements
-
Baltimore, MD, September 20-23
-
Strens, R., and Dobson, J. “How Responsibility Modeling Leads to Security Requirements,” in Proceedings of the Sixteenth National Computer Security Conference, Baltimore, MD, September 20-23, 1993, pp. 398-408.
-
(1993)
Proceedings of the Sixteenth National Computer Security Conference
, pp. 398-408
-
-
Strens, R.1
Dobson, J.2
-
13
-
-
21344477291
-
Risk Assessment and Information Systems
-
Willcocks, L., and Margetts, H. “Risk Assessment and Information Systems,” European Journal of Information Systems (3:2), 1994, pp. 127-139.
-
(1994)
European Journal of Information Systems
, vol.3
, Issue.2
, pp. 127-139
-
-
Willcocks, L.1
Margetts, H.2
|