-
1
-
-
0035995871
-
Security in the information systems curriculum: Identification and status of relevant issues
-
J.E. Anderson P.H. Schwager Security in the information systems curriculum: Identification and status of relevant issues Journal of Computer Information Systems 42 3 2002 16
-
(2002)
Journal of Computer Information Systems
, vol.42
, Issue.3
, pp. 16
-
-
Anderson, J.E.1
Schwager, P.H.2
-
3
-
-
31644437675
-
Projected 2004 IT spending growth: Inching upward
-
Cambridge, MA: Forrester Research
-
A. Bartels Projected 2004 IT spending growth: Inching upward 2004 Forrester Research Cambridge, MA
-
(2004)
-
-
Bartels, A.1
-
4
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
R. Baskerville Information systems security design methods: Implications for information systems development ACM Computing Surveys 25 4 1993 375-414
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
5
-
-
34848836808
-
The state of information security 2003
-
S. Berinato L.C. Ware The state of information security 2003 CIO 17 2 2003 1
-
(2003)
CIO
, vol.17
, Issue.2
, pp. 1
-
-
Berinato, S.1
Ware, L.C.2
-
6
-
-
77956536069
-
Global security survey '04
-
S. Berinato L.C. Ware Global security survey '04 CIO 17 23 2004 1
-
(2004)
CIO
, vol.17
, Issue.23
, pp. 1
-
-
Berinato, S.1
Ware, L.C.2
-
8
-
-
31644440907
-
The year 2000 problem (No. 111)
-
CSC Index Research and Advisory Services CSC Index Research and Advisory Services London
-
CSC Index Research and Advisory Services The year 2000 problem (No. 111) 1997 CSC Index Research and Advisory Services London
-
(1997)
-
-
-
9
-
-
31644446432
-
For e-projects, do it right and deliver on time
-
Cutter Consortium (2001, May 17) Retrieved May 31 from
-
Cutter Consortium For e-projects, do it right and deliver on time (2001, May 17) Retrieved May 31, 2002, from http://www.cutter.com/press/ 010517.html.
-
(2002)
-
-
-
10
-
-
31644443525
-
2004 global security survey 2004
-
Deloitte Global Financial Services Industry Retrieved from
-
Deloitte Global Financial Services Industry 2004 global security survey 2004 Retrieved from http://www.deloitte.com/dtt/cda/doc/content/ dtt_financialservices_SecuritySurvey2004_051704.pdf
-
-
-
-
11
-
-
0036765493
-
Management's role in information security in a cyber economy
-
A. Dutta K. McCrohan Management's role in information security in a cyber economy California Management Review 45 1 2002 67-87
-
(2002)
California Management Review
, vol.45
, Issue.1
, pp. 67-87
-
-
Dutta, A.1
McCrohan, K.2
-
12
-
-
31644450571
-
-
Ernst Young Global information security survey 2004 Retrieved from
-
Ernst Young Global information security survey 2004 2004 Retrieved from http://www.ey.com/global/download.nsf/International/ 2004_Global_Information_Security_Survey/$file/ 2004_Global_Information_Security_Survey_2004.pdf
-
(2004)
-
-
-
13
-
-
13844320608
-
More on management's role in IT project failures
-
J. Glaser More on management's role in IT project failures Healthcare Financial Management 59 1 2005 82-84
-
(2005)
Healthcare Financial Management
, vol.59
, Issue.1
, pp. 82-84
-
-
Glaser, J.1
-
14
-
-
4944232725
-
2004 CSI/FBI computer crime and security survey
-
Computer security institute
-
L.A. Gordon M.P. Loeb W. Lucyshyn R. Richardson 2004 CSI/FBI computer crime and security survey. Computer security institute 2004 Retrieved from http://www.reddshell.com/docs/csi_fbi_2004.pdf
-
(2004)
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
15
-
-
10244240442
-
Why today's security technologies are so inadequate: History, implications and new approaches
-
S. Hofmeyr Why today's security technologies are so inadequate: History, implications and new approaches Information Systems Security 12 1 2003 17-21
-
(2003)
Information Systems Security
, vol.12
, Issue.1
, pp. 17-21
-
-
Hofmeyr, S.1
-
16
-
-
14644398319
-
Report of the ITAA blue ribbon panel on IT diversity
-
Information Technology Association of America Information Technology Association of America Arlington, VA
-
Information Technology Association of America Report of the ITAA blue ribbon panel on IT diversity 2003 Information Technology Association of America Arlington, VA
-
(2003)
-
-
-
17
-
-
0003750229
-
-
2nd ed. Boston: Houghton Mifflin Company
-
I.L. Janis Groupthink 2nd ed. 1983 Houghton Mifflin Company Boston
-
(1983)
Groupthink
-
-
Janis, I.L.1
-
19
-
-
13544258973
-
Computing time for the crime
-
February 14
-
J. Krause Computing time for the crime ABA Journal 91 2005, February 14
-
(2005)
ABA Journal
, pp. 91
-
-
Krause, J.1
-
21
-
-
15744399299
-
Security and risk management: A fundamental business issue
-
A.C. McAdams Security and risk management: A fundamental business issue Information Management Journal 38 4 2004 36-44
-
(2004)
Information Management Journal
, vol.38
, Issue.4
, pp. 36-44
-
-
McAdams, A.C.1
-
23
-
-
0242706108
-
OECD guidelines for the security of information systems and networks: Towards a culture of security
-
OECD Organisation for Economic Co-Operation and Development Paris
-
OECD OECD guidelines for the security of information systems and networks: Towards a culture of security 2002 Organisation for Economic Co-Operation and Development Paris
-
(2002)
-
-
-
24
-
-
0036648651
-
Post 9-11 security: Few changes, business as usual rules
-
L.D. Paulson Post 9-11 security: Few changes, business as usual rules IT Professional 4 4 2002 10-13
-
(2002)
IT Professional
, vol.4
, Issue.4
, pp. 10-13
-
-
Paulson, L.D.1
-
25
-
-
31644440909
-
An evolving job description
-
October 13
-
W.G. Peck An evolving job description Journal of Commerce 2003, October 13 1
-
(2003)
Journal of Commerce
, pp. 1
-
-
Peck, W.G.1
-
26
-
-
31644451145
-
IT spending continues to focus on security
-
Cambridge, MA: Forrester Research
-
J. Penn IT spending continues to focus on security 2004 Forrester Research Cambridge, MA
-
(2004)
-
-
Penn, J.1
-
27
-
-
15744398163
-
2003 global security survey
-
New York: Deloitte Touche Tohmatsu
-
R. Power 2003 global security survey 2003 Deloitte Touche Tohmatsu New York
-
(2003)
-
-
Power, R.1
-
28
-
-
85008054222
-
What a tangled Web we weave
-
R.S. Pressman What a tangled Web we weave IEEE Software 17 1 2000 18-21
-
(2000)
IEEE Software
, vol.17
, Issue.1
, pp. 18-21
-
-
Pressman, R.S.1
-
29
-
-
85008033766
-
Y2K: Don't play it again, Sam
-
J. Sanders Y2K: Don't play it again, Sam IEEE Software 15 3 1998 100-102
-
(1998)
IEEE Software
, vol.15
, Issue.3
, pp. 100-102
-
-
Sanders, J.1
-
30
-
-
0002513132
-
Three cultures of management: The key to organizational learning
-
E.H. Schein Three cultures of management: The key to organizational learning Sloan Management Review 38 1 1996 9-20
-
(1996)
Sloan Management Review
, vol.38
, Issue.1
, pp. 9-20
-
-
Schein, E.H.1
-
31
-
-
31644449443
-
Test of loyalty
-
CIO March 16 Retrieved from
-
J. Surmacz Test of loyalty. CIO 2004, March 16 Retrieved from http://www2.cio.com/metrics/2004/metric673.html
-
(2004)
-
-
Surmacz, J.1
-
32
-
-
0141863310
-
Technomillennialism: A subcultural response to the technological threat of Y2K
-
A.H. Tapia Technomillennialism: A subcultural response to the technological threat of Y2K Science, Technology, and Human Values 28 4 2003 483-512
-
(2003)
Science, Technology, and Human Values
, vol.28
, Issue.4
, pp. 483-512
-
-
Tapia, A.H.1
-
33
-
-
85008044245
-
The year 2000 bug: A forgotten lesson
-
R. Thomsett The year 2000 bug: A forgotten lesson IEEE Software 15 4 1998 91-95
-
(1998)
IEEE Software
, vol.15
, Issue.4
, pp. 91-95
-
-
Thomsett, R.1
-
34
-
-
31644451144
-
Historical development of the Y2K problem: Challenging the conventional wisdom, part III of III
-
R.D. Williams B.T. Smyth Historical development of the Y2K problem: Challenging the conventional wisdom, part III of III Computer and Internet Lawyer 16 4 1999 10-20
-
(1999)
Computer and Internet Lawyer
, vol.16
, Issue.4
, pp. 10-20
-
-
Williams, R.D.1
Smyth, B.T.2
|