-
1
-
-
1642303881
-
The myth of secure computing
-
Austin, R.D. and Darby, C. (2003), "The myth of secure computing", Harvard Business Review, Vol. 81 No. 6, pp. 120-6.
-
(2003)
Harvard Business Review
, vol.81
, Issue.6
, pp. 120-126
-
-
Austin, R.D.1
Darby, C.2
-
2
-
-
33644542600
-
A usability study of internet privacy policies for state and commercial websites
-
Becker, S.A. (2004), "A usability study of internet privacy policies for state and commercial websites", International Journal of Services and Standards, Vol. 1 No. 1, pp. 52-68.
-
(2004)
International Journal of Services and Standards
, vol.1
, Issue.1
, pp. 52-68
-
-
Becker, S.A.1
-
5
-
-
33644585480
-
Exploring prevention and perpetrator aspects concerning employee fraud in organisations
-
Bryan, L.D. and Smith, A.D. (2005), "Exploring prevention and perpetrator aspects concerning employee fraud in organisations", International Journal of Management and Enterprise Development, Vol. 2 Nos 3/4, pp. 257-87.
-
(2005)
International Journal of Management and Enterprise Development
, vol.2
, Issue.34
, pp. 257-287
-
-
Bryan, L.D.1
Smith, A.D.2
-
6
-
-
33644610628
-
-
paper presented at Workshop on Economics and Information Security University of California Berkeley, CA
-
Carini, B. and Morel, B. (2002), "Dynamics and equilibria of information security investment", paper presented at Workshop on Economics and Information Security, University of California, Berkeley, CA.
-
(2002)
Dynamics and Equilibria of Information Security Investment
-
-
Carini, B.1
Morel, B.2
-
7
-
-
3242808612
-
-
Computer Security Institute Publications Washington, DC available at: http://i.cmpnet.com/gocsi/dbarea/pdfs/fbi/FBI2004.pdf
-
Computer Security Institute - CSI (2005), "2004 CSI/FBI Computer Crime and Security Survey", Computer Security Institute Publications, Washington, DC, available at: http://i.cmpnet.com/gocsi/dbarea/pdfs/fbi/FBI2004. pdf.
-
(2005)
2004 CSI/FBI Computer Crime and Security Survey
-
-
-
8
-
-
0034516080
-
Information security management: An approach to combine process certification and product evaluation
-
Eloff, M.M. and Von Solms, S.H. (2000), "Information security management: an approach to combine process certification and product evaluation", Computers & Security, Vol. 19 No. 8, pp. 698-709.
-
(2000)
Computers & Security
, vol.19
, Issue.8
, pp. 698-709
-
-
Eloff, M.M.1
Von Solms, S.H.2
-
9
-
-
33644591749
-
-
European Software Institute Zamudio available at: www.esi.es/en/ Technologies/iBITS.html
-
European Software Institute - ESI (2004), Balanced IT Scorecard (BITS), European Software Institute, Zamudio, available at: www.esi.es/en/Technologies/ iBITS.html.
-
(2004)
Balanced IT Scorecard (BITS)
-
-
-
10
-
-
18844456006
-
Have you met your organization's computer usage policy?
-
Foltz, C.B., Cronan, T.P. and Jones, T.W. (2005), "Have you met your organization's computer usage policy?", Industrial Management & Data Systems, Vol. 105 No. 2, pp. 137-46.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.2
, pp. 137-146
-
-
Foltz, C.B.1
Cronan, T.P.2
Jones, T.W.3
-
11
-
-
0042363394
-
Quantifying the financial impact of IT security breaches
-
Garg, A., Curtis, J. and Halper, H. (2003), "Quantifying the financial impact of IT security breaches", Information Management & Computer Security, Vol. 11 No. 2, pp. 74-83.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.2
, pp. 74-83
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
12
-
-
33644607902
-
-
Accounting and Information Management Division, United States General Accounting Office Washington, DC available at: www.gao.gov/special.pubs/ai00033. pdf
-
General Accounting Office - GAO (2004), Information Security Risk Assessment: Practices of Leading Organizations, Accounting and Information Management Division, United States General Accounting Office, Washington, DC, available at: www.gao.gov/special.pubs/ai00033.pdf.
-
(2004)
Information Security Risk Assessment: Practices of Leading Organizations
-
-
-
13
-
-
0038223766
-
Using information security as a response to competitor analysis systems
-
Gordon, L.A. and Loeb, M.P. (2001), "Using information security as a response to competitor analysis systems", Communications of the ACM, Vol. 44 No. 9, pp. 70-5.
-
(2001)
Communications of the ACM
, vol.44
, Issue.9
, pp. 70-75
-
-
Gordon, L.A.1
Loeb, M.P.2
-
14
-
-
0003506109
-
-
5th ed. Prentice-Hall Englewood Cliffs, NJ
-
Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1998), Multivariate Data Analysis, 5th ed., Prentice-Hall, Englewood Cliffs, NJ.
-
(1998)
Multivariate Data Analysis
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
15
-
-
33644586451
-
-
Information Systems Audit and Control Association Chicago, IL available at: www.isaca.org
-
Information Systems Audit and Control Association - ISACA (2004), Control Objectives for Information and Related Technology (COBIT), Information Systems Audit and Control Association, Chicago, IL, available at: www.isaca.org.
-
(2004)
Control Objectives for Information and Related Technology (COBIT)
-
-
-
16
-
-
2942625232
-
Coming up short on nonfinancial performance measurement
-
Ittner, C.D. and Larcker, D.F. (2003), "Coming up short on nonfinancial performance measurement", Harvard Business Review, Vol. 81 No. 11, pp. 88-95.
-
(2003)
Harvard Business Review
, vol.81
, Issue.11
, pp. 88-95
-
-
Ittner, C.D.1
Larcker, D.F.2
-
17
-
-
0041862581
-
Key obstacles to EDI success: From the US small manufacturing companies' perspective
-
Jun, M. and Cai, S. (2003), "Key obstacles to EDI success: from the US small manufacturing companies' perspective", Industrial Management & Data Systems, Vol. 103 No. 3, pp. 192-203.
-
(2003)
Industrial Management & Data Systems
, vol.103
, Issue.3
, pp. 192-203
-
-
Jun, M.1
Cai, S.2
-
18
-
-
54349116635
-
Transforming the balanced scorecard from performance measurement to strategic management: Part i
-
Kaplan, R.S. and Norton, D.P. (2001), "Transforming the balanced scorecard from performance measurement to strategic management: Part I", Accounting Horizons, Vol. 15 No. 1, pp. 87-104.
-
(2001)
Accounting Horizons
, vol.15
, Issue.1
, pp. 87-104
-
-
Kaplan, R.S.1
Norton, D.P.2
-
19
-
-
8444221418
-
-
1st ed. Harvard Business School Publishing Corp. Boston, MA
-
Kaplan, R.S. and Norton, D.P. (2004), Strategy Maps: Converting Intangible Assets into Tangible Outcomes, 1st ed., Harvard Business School Publishing Corp., Boston, MA.
-
(2004)
Strategy Maps: Converting Intangible Assets into Tangible Outcomes
-
-
Kaplan, R.S.1
Norton, D.P.2
-
21
-
-
13844275774
-
Assessing & quantifying the loss of network intrusion
-
Kros, J.R., Foltz, C.B. and Metcalf, C.L. (2004), "Assessing & quantifying the loss of network intrusion", Journal of Computer Information Systems, Vol. 45 No. 2, pp. 36-43.
-
(2004)
Journal of Computer Information Systems
, vol.45
, Issue.2
, pp. 36-43
-
-
Kros, J.R.1
Foltz, C.B.2
Metcalf, C.L.3
-
22
-
-
2342418367
-
Impact of computer disasters on information management: A study
-
Kundu, S.C. (2004), "Impact of computer disasters on information management: a study", Industrial Management & Data System, Vol. 104 No. 2, pp. 136-43.
-
(2004)
Industrial Management & Data System
, vol.104
, Issue.2
, pp. 136-143
-
-
Kundu, S.C.1
-
23
-
-
84986938722
-
A quantitative approach to content validity
-
Lawshe, C.H. (1975), "A quantitative approach to content validity", Personnel Psychology, Vol. 28, pp. 564-75.
-
(1975)
Personnel Psychology
, vol.28
, pp. 564-575
-
-
Lawshe, C.H.1
-
24
-
-
2342427050
-
An integrated evaluation system based on the continuous improvement model of IS performance
-
Leem, C.S. and Kim, I. (2004), "An integrated evaluation system based on the continuous improvement model of IS performance", Industrial Management & Data Systems, Vol. 104 No. 2, pp. 115-28.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.2
, pp. 115-128
-
-
Leem, C.S.1
Kim, I.2
-
25
-
-
14544275961
-
Mobile commerce's impact on today's workforce: Issues, impacts and implications
-
McIntosh, J.C. and Baron, J.P. (2005), "Mobile commerce's impact on today's workforce: issues, impacts and implications", International Journal of Mobile Communications, Vol. 3 No. 2, pp. 99-113.
-
(2005)
International Journal of Mobile Communications
, vol.3
, Issue.2
, pp. 99-113
-
-
McIntosh, J.C.1
Baron, J.P.2
-
26
-
-
0033076569
-
The balanced scorecard: A foundation for the strategic management of information systems
-
Martinsons, M., Davison, R. and Tse, D. (1999), "The balanced scorecard: a foundation for the strategic management of information systems", Decision Support Systems, Vol. 25 No. 1, pp. 71-88.
-
(1999)
Decision Support Systems
, vol.25
, Issue.1
, pp. 71-88
-
-
Martinsons, M.1
Davison, R.2
Tse, D.3
-
27
-
-
0038519807
-
Dynamic corporate culture lies at the heart of effective security strategy
-
May, C. (2003), "Dynamic corporate culture lies at the heart of effective security strategy", Computer Fraud & Security, Vol. 5, pp. 10-13.
-
(2003)
Computer Fraud & Security
, vol.5
, pp. 10-13
-
-
May, C.1
-
28
-
-
0037363908
-
Business performance and dimensions of strategic orientation
-
Morgan, R.E. and Strong, C.A. (2003), "Business performance and dimensions of strategic orientation", Journal of Business Research, Vol. 56 No. 3, pp. 163-76.
-
(2003)
Journal of Business Research
, vol.56
, Issue.3
, pp. 163-176
-
-
Morgan, R.E.1
Strong, C.A.2
-
30
-
-
8444250312
-
Improving the ROI of the security management process
-
Purser, S.A. (2004), "Improving the ROI of the security management process", Computers & Security, Vol. 23, pp. 542-6.
-
(2004)
Computers & Security
, vol.23
, pp. 542-546
-
-
Purser, S.A.1
-
31
-
-
0003158414
-
Develop long-term competitiveness through IT assets
-
Ross, J.W., Beath, C.M. and Goodhue, D.L. (1996), "Develop long-term competitiveness through IT assets", MIT Sloan Management Review, Vol. 38 No. 1, pp. 31-42.
-
(1996)
MIT Sloan Management Review
, vol.38
, Issue.1
, pp. 31-42
-
-
Ross, J.W.1
Beath, C.M.2
Goodhue, D.L.3
-
32
-
-
3142782985
-
Issues in linking information technology capability to firm performance
-
Santhanam, R. and Hartono, E. (2003), "Issues in linking information technology capability to firm performance", MIS Quarterly, Vol. 27 No. 1, pp. 125-53.
-
(2003)
MIS Quarterly
, vol.27
, Issue.1
, pp. 125-153
-
-
Santhanam, R.1
Hartono, E.2
-
33
-
-
0038205942
-
An integral framework for information systems security management
-
Trček, D. (2003), "An integral framework for information systems security management", Computers & Security, Vol. 22 No. 4, pp. 337-60.
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 337-360
-
-
Trček, D.1
-
34
-
-
9744223613
-
Review: The resource-based view and information systems research: Review, extension, and suggestions for future research
-
Wade, M. and Hulland, J. (2004), "Review: the resource-based view and information systems research: review, extension, and suggestions for future research", MIS Quarterly, Vol. 28 No. 1, pp. 107-42.
-
(2004)
MIS Quarterly
, vol.28
, Issue.1
, pp. 107-142
-
-
Wade, M.1
Hulland, J.2
-
35
-
-
0141883323
-
Third generation risk management practices
-
Wright, M. (1999), "Third generation risk management practices", Computer Fraud & Security, Vol. 2, pp. 9-12.
-
(1999)
Computer Fraud & Security
, vol.2
, pp. 9-12
-
-
Wright, M.1
|