-
2
-
-
0028532579
-
Why cryptosystems fall
-
ANDERSON R (1993) Why cryptosystems fall. Communication of the ACM 37(11), 32-44.
-
(1993)
Communication of the ACM
, vol.37
, Issue.11
, pp. 32-44
-
-
Anderson, R.1
-
3
-
-
30744434347
-
An analysis of the growth of computer and Internet security breaches
-
BAGCHI K and UDO G (2003) An analysis of the growth of computer and Internet security breaches. Communications of AIS 12, 684-700.
-
(2003)
Communications of AIS
, vol.12
, pp. 684-700
-
-
Bagchi, K.1
Udo, G.2
-
4
-
-
85008030889
-
Computer security research: A British perspective
-
BARNES BH (1998) Computer security research: a British perspective. IEEE Software 15(5), 30-33.
-
(1998)
IEEE Software
, vol.15
, Issue.5
, pp. 30-33
-
-
Barnes, B.H.1
-
6
-
-
0013324190
-
Risk analysis: An interpretative feasibility tool in justifying information systems security
-
BASKERVILLE R (1991) Risk analysis: an interpretative feasibility tool in justifying information systems security. European Journal of Information Systems 1(2), 121-130.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 121-130
-
-
Baskerville, R.1
-
7
-
-
0002082632
-
The developmental duality of information systems security
-
BASKERVILLE R (1992) The developmental duality of information systems security, Journal of Management Systems 4(1), 1-12.
-
(1992)
Journal of Management Systems
, vol.4
, Issue.1
, pp. 1-12
-
-
Baskerville, R.1
-
8
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
BASKERVILLE R (1993) Information systems security design methods: implications for information systems development. Computing Surveys 25(4), 375-414.
-
(1993)
Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
9
-
-
30744465298
-
Code of practice for information security management
-
BS7799 British Standard Institution, London, UK
-
BS7799 (1993) Code of practice for information security management, Department of Trade and Industry, DISC PD003. British Standard Institution, London, UK.
-
(1993)
Department of Trade and Industry, DISC PD003
-
-
-
12
-
-
0000130004
-
Radical developments in accounting thought
-
CHUA WF (1986) Radical Developments in Accounting Thought. Accounting Review 61(5), 583-598.
-
(1986)
Accounting Review
, vol.61
, Issue.5
, pp. 583-598
-
-
Chua, W.F.1
-
13
-
-
0003889222
-
-
NY: Penguin Books, New York, NY
-
CROSBY P (1979) Quality Is Free, NY: Penguin Books, New York, NY.
-
(1979)
Quality Is Free
-
-
Crosby, P.1
-
14
-
-
23044525969
-
Current directions in IS security research: Toward socio-organizational perspectives
-
DHILLON G and BACKHOUSE J (2001) Current directions in IS security research: toward socio-organizational perspectives. Information Systems Journal 11 (2), 129-156.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 129-156
-
-
Dhillon, G.1
Backhouse, J.2
-
15
-
-
0034158883
-
Information security management: A hierarchical framework for various approaches
-
ELOFF MM and VON SOLMS SH (2000a) Information security management: a hierarchical framework for various approaches. Computers and Security 19, 243-256.
-
(2000)
Computers and Security
, vol.19
, pp. 243-256
-
-
Eloff, M.M.1
Von Solms, S.H.2
-
20
-
-
30744467132
-
Generally Accepted System Security Principles (CASSP). Version 2.0
-
June
-
GASSP (1999) Generally Accepted System Security Principles (CASSP). Version 2.0. Information Systems Security. June, vol. 8, no. 3.
-
(1999)
Information Systems Security
, vol.8
, Issue.3
-
-
-
21
-
-
30744472925
-
Principles and procedures of the LRAM approach to information systems risk analysis and management
-
GUARRO SB (1987) Principles and procedures of the LRAM approach to information systems risk analysis and management. Computer and Security 6(6), 493-504.
-
(1987)
Computer and Security
, vol.6
, Issue.6
, pp. 493-504
-
-
Guarro, S.B.1
-
22
-
-
12444341803
-
-
Beacon Press, Boston, MA, USA
-
HABERMAS J (1984) The Theory of Communicative Action-Reason and the Rationalisation of Society, Vol I, Beacon Press, Boston, MA, USA.
-
(1984)
The Theory of Communicative Action-reason and the Rationalisation of Society
, vol.1
-
-
Habermas, J.1
-
23
-
-
0003651494
-
-
Beacon Press, Boston, MA, USA
-
HABERMAS J (1987) The Theory of Communicative Action-The Critique of Functionalist Reason, Vol II, Beacon Press, Boston, MA, USA.
-
(1987)
The Theory of Communicative Action - The Critique of Functionalist Reason
, vol.2
-
-
Habermas, J.1
-
28
-
-
84897583836
-
Exploring the intellectual structures of information systems development: A social action theoretic analysis
-
HIRSCHHEIM R, KLEIN H K and LYYTINEN K (1996) Exploring the intellectual structures of information systems development: a social action theoretic analysis. Accounting, Management and Information Technologies 6, 1-64.
-
(1996)
Accounting, Management and Information Technologies
, vol.6
, pp. 1-64
-
-
Hirschheim, R.1
Klein, H.K.2
Lyytinen, K.3
-
30
-
-
0001214077
-
A paradigmatic analysis of contemporary schools of IS development
-
IIVARI J (1991) A paradigmatic analysis of contemporary schools of IS development. European Journal of Information Systems 1(4), 249-272.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.4
, pp. 249-272
-
-
Iivari, J.1
-
31
-
-
0030286609
-
Analyzing information systems development: A comparison and analysis of eight IS development approaches
-
IIVARI J and HIRSCHHEIM R (1996) Analyzing information systems development: A comparison and analysis of eight IS development approaches. Information Systems 21(7), 551-575.
-
(1996)
Information Systems
, vol.21
, Issue.7
, pp. 551-575
-
-
Iivari, J.1
Hirschheim, R.2
-
32
-
-
0002165187
-
A Sociocybernetic framework for the feature analysis of information systems design methodologies
-
OLLE TW, SOL HG, TULLY CJ, Eds, North-Holland: Amsterdam
-
IIVARI J and KEROLA P (1983) A Sociocybernetic framework for the feature analysis of information systems design methodologies. In Information Systems Design Methodologies: A Feature Analysis (OLLE TW, SOL HG, TULLY CJ, Eds), pp 87-139, North-Holland: Amsterdam.
-
(1983)
Information Systems Design Methodologies: A Feature Analysis
, pp. 87-139
-
-
Iivari, J.1
Kerola, P.2
-
33
-
-
0032334755
-
A paradigmatic analysis contrasting information systems development approaches and methodologies
-
IIVARI J, HIRSCHHEIM R and KLEIN HK (1998) A paradigmatic analysis contrasting information systems development approaches and methodologies. Information Systems Research 9, 164-193.
-
(1998)
Information Systems Research
, vol.9
, pp. 164-193
-
-
Iivari, J.1
Hirschheim, R.2
Klein, H.K.3
-
34
-
-
0034434529
-
A dynamic framework for classifying information systems development methodologies and approaches
-
IIVARI J, HIRSCHHEIM R and KLEIN H K (2001) A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches. Journal of Management Information Systems 17(3), 179-218.
-
(2001)
Journal of Management Information Systems
, vol.17
, Issue.3
, pp. 179-218
-
-
Iivari, J.1
Hirschheim, R.2
Klein, H.K.3
-
35
-
-
0011656102
-
Managing security functions using security standards
-
JANCZEWSKI L, Eds, Idea Group Publishing; USA
-
JANCZEWSKI L (2000) Managing Security Functions Using Security Standards. In Internet and Intranet Security Management: Risks and Solutions (JANCZEWSKI L, Eds), pp 81-105, Idea Group Publishing; USA.
-
(2000)
Internet and Intranet Security Management: Risks and Solutions
, pp. 81-105
-
-
Janczewski, L.1
-
36
-
-
0011648740
-
The new classification of research approaches
-
(ZEMANEK H, Ed), IFIP: Laxenburg, Austria
-
JÄRVINEN P (1997) The new classification of research approaches. In The IFIP Pink Summary - 36 years of IFIP (ZEMANEK H, Ed), pp 124-131, IFIP: Laxenburg, Austria.
-
(1997)
The IFIP Pink Summary - 36 Years of IFIP
, pp. 124-131
-
-
Järvinen, P.1
-
38
-
-
0040871337
-
The poverty of scientism in information systems
-
(MUMFORD E et al. Eds), Elsevier Science Publisher: Amsterdam
-
KLEIN H and LYYTINEN K (1985) The poverty of scientism in information systems, In; Research methods in information systems (MUMFORD E et al. Eds), pp 131-161, Elsevier Science Publisher: Amsterdam.
-
(1985)
Research Methods in Information Systems
, pp. 131-161
-
-
Klein, H.1
Lyytinen, K.2
-
39
-
-
0001946339
-
A set of principles for conducting and evaluating interpretive field studies in information systems
-
KLEIN HK and MYERS MD (1999) A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly 23(1), 67-94.
-
(1999)
MIS Quarterly
, vol.23
, Issue.1
, pp. 67-94
-
-
Klein, H.K.1
Myers, M.D.2
-
42
-
-
0030386217
-
Electronic communications risk management: A checklist for business managers
-
MOULTON RT and MOULTON ME (1996) Electronic communications risk management: a checklist for business managers. Computer and Security 15(5), 377-386.
-
(1996)
Computer and Security
, vol.15
, Issue.5
, pp. 377-386
-
-
Moulton, R.T.1
Moulton, M.E.2
-
43
-
-
0021535278
-
Measuring computer system security using software security metrics
-
In Computer Security: A global challenge (JH and Dougall EG, Eds), Finch Elsevier Science Publisher, Toronto, Ontario, Canada
-
MURINE GE and CARPENTER CL (1984) Measuring computer system security using software security metrics. In Computer Security: A global challenge (JH and Dougall EG, Eds), Finch Elsevier Science Publisher, Proceedings of the second IFIP International Conference on Computer Security (IFIP/Sec'84), Toronto, Ontario, Canada.
-
(1984)
Proceedings of the Second IFIP International Conference on Computer Security (IFIP/Sec'84)
-
-
Murine, G.E.1
Carpenter, C.L.2
-
44
-
-
0040964323
-
Data processing - Risk assessment
-
(WOFSEY MM, Ed), John Wiley and Sons Ltd: New York
-
SALTMARSH TJ and BROWNE PS (1983) Data processing - risk assessment. In: Advances In Computer Security Management (WOFSEY MM, Ed), Vol 2, pp 93-116, John Wiley and Sons Ltd: New York.
-
(1983)
Advances in Computer Security Management
, vol.2
, pp. 93-116
-
-
Saltmarsh, T.J.1
Browne, P.S.2
-
46
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
in press
-
SIPONEN M (2005) Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods. Information and organization in press.
-
(2005)
Information and Organization
-
-
Siponen, M.1
-
47
-
-
0011524195
-
-
SSE-CMM (1998a) The Model. v2.0. http://www.sse-cmm,org.
-
(1998)
The Model. V2.0
-
-
-
52
-
-
0011587363
-
Information security program maturity grid
-
STACEY TR (1996) Information security program maturity grid. Information Systems Security 5(2), 22-33.
-
(1996)
Information Systems Security
, vol.5
, Issue.2
, pp. 22-33
-
-
Stacey, T.R.1
-
53
-
-
0030377647
-
Information security management: The second generation
-
VON SOLMS R (1996) Information security management: the second generation. Computers and Security 15(4), 281-288.
-
(1996)
Computers and Security
, vol.15
, Issue.4
, pp. 281-288
-
-
Von Solms, R.1
-
55
-
-
0011586156
-
Information security management (3): The code of practice for information security management (BS 7799)
-
VON SOLMS R (1998) Information security management (3): the code of practice for information security management (BS 7799). Information Management & Computer Security 6(5), 224-225.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.5
, pp. 224-225
-
-
Von Solms, R.1
-
56
-
-
0001897127
-
Information security management: Why standards are important
-
VON SOLMS R (1999) Information security management: why standards are important. Information Management and Computer Security 7(1), 50-58.
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.1
, pp. 50-58
-
-
Von Solms, R.1
-
58
-
-
73549100231
-
The emergence of interpretivism in IS research
-
WALSHAM G (1996) The emergence of interpretivism in IS research. Information Systems Research 6(4), 376-394.
-
(1996)
Information Systems Research
, vol.6
, Issue.4
, pp. 376-394
-
-
Walsham, G.1
-
59
-
-
0012903874
-
Analyzing the past to prepare for future: Writing a literature review
-
WEBSTER J and WATSON RT (2002) Analyzing the past to prepare for future: writing a literature review. MIS Quarterly 6(2), xiii-xxii.
-
(2002)
MIS Quarterly
, vol.6
, Issue.2
-
-
Webster, J.1
Watson, R.T.2
-
60
-
-
1142280536
-
-
John Wiley and Sons: New York
-
WOOD CC, BANKS WW, GUARRO SB, GARCIA AA, HAMPEL VE and SARTORIO HP (1987) Computer Security: A Comprehensive controls Checklist. John Wiley and Sons: New York.
-
(1987)
Computer Security: A Comprehensive Controls Checklist
-
-
Wood, C.C.1
Banks, W.W.2
Guarro, S.B.3
Garcia, A.A.4
Hampel, V.E.5
Sartorio, H.P.6
|