-
1
-
-
33644528527
-
"Danger ahead! Safeguard your computer"
-
November/December
-
Allen, B. (1968), "Danger ahead! Safeguard your computer", Harvard Business Review, pp. 97-101, November/December.
-
(1968)
Harvard Business Review
, pp. 97-101
-
-
Allen, B.1
-
2
-
-
30744434347
-
"An analysis of the growth of computer and internet security breaches"
-
Bagchi, K. and Udo, G. (2003), "An analysis of the growth of computer and internet security breaches", Communications of the Association for Information Systems, Vol. 12 No. 46, pp. 1-29.
-
(2003)
Communications of the Association for Information Systems
, vol.12
, Issue.46
, pp. 1-29
-
-
Bagchi, K.1
Udo, G.2
-
3
-
-
9744281201
-
"Key issues in information systems management: 1994-95 SIM results"
-
Brancheau, J.C., Janz, B.D. and Wetherbe, J.C. (1996), "Key issues in information systems management: 1994-95 SIM results", Management Information Systems Quarterly, Vol. 20 No. 2, pp. 225-42.
-
(1996)
Management Information Systems Quarterly
, vol.20
, Issue.2
, pp. 225-242
-
-
Brancheau, J.C.1
Janz, B.D.2
Wetherbe, J.C.3
-
5
-
-
33644519719
-
"CERT statistics"
-
Computer Emergency Response Team (CERT) available at: www.cert.org/stats/ cert_stats.html#incidents (accessed May 2004)
-
Computer Emergency Response Team (CERT) (2004), "CERT statistics", available at: www.cert.org/stats/ certa_stats.html#incidents (accessed May 2004).
-
(2004)
-
-
-
6
-
-
0034335593
-
"A framework for linking culture and improvement in organizations"
-
Detert, J.R., Schroeder, R.G. and Mauriel, J.J. (2000), "A framework for linking culture and improvement in organizations", Academy of Management Review, Vol. 25 No. 4, pp. 850-63.
-
(2000)
Academy of Management Review
, vol.25
, Issue.4
, pp. 850-863
-
-
Detert, J.R.1
Schroeder, R.G.2
Mauriel, J.J.3
-
7
-
-
0003424727
-
-
2nd ed., Sage Thousand Oaks, CA
-
DeVellis, R.F. (2003), Scale Development. Theory and Applications, 2nd ed.,Vol. 26, Sage, Thousand Oaks, CA.
-
(2003)
Scale Development. Theory and Applications
, vol.26
-
-
DeVellis, R.F.1
-
8
-
-
0036765493
-
"Management's role in information security in a cyber economy"
-
Dutta, A. and McCrohan, K. (2002), "Management's role in information security in a cyber economy", California Management Review, Vol. 45 No. 1, pp. 67-87.
-
(2002)
California Management Review
, vol.45
, Issue.1
, pp. 67-87
-
-
Dutta, A.1
McCrohan, K.2
-
9
-
-
0042363394
-
"Quantifying the financial impact of IT security breaches"
-
Garg, A., Curtis, J. and Halper, H. (2004), "Quantifying the financial impact of IT security breaches", Information Management & Computer Security, Vol. 11 No. 2, pp. 74-83.
-
(2004)
Information Management & Computer Security
, vol.11
, Issue.2
, pp. 74-83
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
10
-
-
0003424343
-
-
Aldine Publishing, New York, NY
-
Glaser, B.G. and Strauss, A.L. (1967), The Discovery of Grounded Theory: Strategies for Qualitative Research, Aldine Publishing, New York, NY.
-
(1967)
The Discovery of Grounded Theory: Strategies for Qualitative Research
-
-
Glaser, B.G.1
Strauss, A.L.2
-
11
-
-
3242808612
-
-
Computer Security Institute San Francisco, CA
-
Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Richardson, R. (2004), 2004 CSI/FBI Computer Crime and Security Survey, Computer Security Institute, San Francisco, CA.
-
(2004)
2004 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
12
-
-
0003607082
-
-
5th ed., Pearson Education, Delhi
-
Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1998), Multivariate Analysis, 5th ed., Pearson Education, Delhi.
-
(1998)
Multivariate Analysis
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
13
-
-
0003054486
-
"A brief tutorial on the development of measures for use in survey questionnaires"
-
Hinkin, T.R. (1998), "A brief tutorial on the development of measures for use in survey questionnaires", Organizational Research Methods, Vol. 1 No. 1, pp. 104-121.
-
(1998)
Organizational Research Methods
, vol.1
, Issue.1
, pp. 104-121
-
-
Hinkin, T.R.1
-
14
-
-
62949227625
-
"The use of structural equation modeling in IS research: Review and recommendations"
-
Whitman, M.E. Hershey, PA Whitman, M.E. and Woszczynski, A.B. (Eds), Idea Group Publishing, Hershey, PA
-
Im, K.S. and Grover, V. (2004), "The use of structural equation modeling in IS research: Review and recommendations", in Whitman, M.E. and Woszczynski, A.B. (Eds), The Handbook of Information Systems Research, Idea Group Publishing, Hershey, PA.
-
(2004)
The Handbook of Information Systems Research
-
-
Im, K.S.1
Grover, V.2
-
15
-
-
0037400028
-
"An integrative study of information systems security effectiveness"
-
Kankanhalli, A., Hock-Hai, T., Bernard, C.Y.T. and Kwok-Kee, W. (2003), "An integrative study of information systems security effectiveness", International Journal of Information Management, Vol. 23, pp. 139-54.
-
(2003)
International Journal of Information Management
, vol.23
, pp. 139-154
-
-
Kankanhalli, A.1
Hock-Hai, T.2
Bernard, C.Y.T.3
Kwok-Kee, W.4
-
16
-
-
55249113766
-
"Combining qualitative and quantitative methods in information systems research: A case study"
-
Kaplan, B. and Duchon, D. (1988), "Combining qualitative and quantitative methods in information systems research: A case study", Management Information Systems Quarterly, Vol. 12 No. 4, pp. 571-87.
-
(1988)
Management Information Systems Quarterly
, vol.12
, Issue.4
, pp. 571-587
-
-
Kaplan, B.1
Duchon, D.2
-
17
-
-
84973709223
-
"Organization culture, distribution, and amount of control and perceptions of quality"
-
Klein, A.S., Masi, R.J. and Weidner, C.K. (1995), "Organization culture, distribution, and amount of control and perceptions of quality", Group & Organization Management, Vol. 20 No. 2, pp. 122-48.
-
(1995)
Group & Organization Management
, vol.20
, Issue.2
, pp. 122-148
-
-
Klein, A.S.1
Masi, R.J.2
Weidner, C.K.3
-
19
-
-
1242263532
-
"Why there aren't more information security research studies?"
-
Kotulic, A.G. and Clark, J.G. (2004), "Why there aren't more information security research studies?", Information & Management, Vol. 41 No. 5, pp. 597-607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
23
-
-
0344559509
-
"National strategy to secure cyberspace"
-
President available at: www.whitehouse.gov/pcipb (accessed May 2004)
-
President (2003), "National strategy to secure cyberspace", available at: www.whitehouse.gov/pcipb (accessed May 2004).
-
(2003)
-
-
-
24
-
-
9744262493
-
"Strategic information systems planning success: An investigation of the construct and its measurement"
-
Segars, A.H. (1998), "Strategic information systems planning success: An investigation of the construct and its measurement", Management Information Systems Quarterly, Vol. 22 No. 2, pp. 139-63.
-
(1998)
Management Information Systems Quarterly
, vol.22
, Issue.2
, pp. 139-163
-
-
Segars, A.H.1
-
25
-
-
0000280419
-
"Effective IS security: An empirical study"
-
Straub, D.W. (1990), "Effective IS security: An empirical study", Information Systems Research, Vol. 1 No. 3, pp. 255-76.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
26
-
-
0001133137
-
"Coping with systems risk: Security planning models for management decision making"
-
Straub, D.W. and Welke, R.J. (1998), "Coping with systems risk: security planning models for management decision making", Management Information Systems Quarterly, Vol. 22 No. 4, pp. 441-69.
-
(1998)
Management Information Systems Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
27
-
-
0037941821
-
-
2nd ed., Sage Thousand Oaks, CA
-
Strauss, A. and Corbin, J. (1998), Basics of Qualitative Research. Techniques and Procedures for Developing Grounded Theory, 2nd ed., Sage, Thousand Oaks, CA.
-
(1998)
Basics of Qualitative Research. Techniques and Procedures for Developing Grounded Theory
-
-
Strauss, A.1
Corbin, J.2
-
29
-
-
20944446348
-
"The problem of common method variance in IS research"
-
Whitman, M.E. and Woszczynski, A.B. (Eds) Idea Group Publishing Whitman, M.E. Hershey, PA
-
Whitman, M.E. and Woszczynski, A.B. (2004), "The problem of common method variance in IS research", in Whitman, M.E. and Woszczynski, A.B. (Eds), The Handbook of Information Systems Research, Idea Group Publishing, Hershey, PA.
-
(2004)
The Handbook of Information Systems Research
-
-
Whitman, M.E.1
Woszczynski, A.B.2
|