-
1
-
-
18844427282
-
A benchmarking framework for information systems management issues in Kuwait
-
Alshawaf, A.H., Ali, J.M.H. and Hasan, M.H. (2005), "A benchmarking framework for information systems management issues in Kuwait", Benchmarking: An International Journal, Vol. 12 No. 1, pp. 30-44.
-
(2005)
Benchmarking: An International Journal
, vol.12
, Issue.1
, pp. 30-44
-
-
Alshawaf, A.H.1
Ali, J.M.H.2
Hasan, M.H.3
-
2
-
-
0942268246
-
The influence of business managers' IT competence on championing IT
-
Bassellier, G., Benbasat, I. and Reich, B.H. (2003), "The influence of business managers' IT competence on championing IT", Information Systems Research, Vol. 14 No. 4, pp. 317-36.
-
(2003)
Information Systems Research
, vol.14
, Issue.4
, pp. 317-336
-
-
Bassellier, G.1
Benbasat, I.2
Reich, B.H.3
-
3
-
-
0034900328
-
Information technology competence of business managers: A definition and research model
-
Bassellier, G., Reich, B.H. and Benbasat, I. (2001), "Information technology competence of business managers: a definition and research model", Journal of Management Information Systems, Vol. 17 No. 4, pp. 159-82.
-
(2001)
Journal of Management Information Systems
, vol.17
, Issue.4
, pp. 159-182
-
-
Bassellier, G.1
Reich, B.H.2
Benbasat, I.3
-
4
-
-
3042782049
-
What is computer security?
-
Bishop, M. (2003), "What is computer security?", IEEE Security and Privacy, Vol. 1 No. 1, pp. 67-9.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 67-69
-
-
Bishop, M.1
-
5
-
-
9744281201
-
Key issues in information systems management: 1994-95 SIM Delphi results
-
Brancheau, J.C., Janz, B.D. and Wetherbe, J.C. (1996), "Key issues in information systems management: 1994-95 SIM Delphi results", MIS Quarterly, Vol. 20 No. 2, pp. 225-42.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 225-242
-
-
Brancheau, J.C.1
Janz, B.D.2
Wetherbe, J.C.3
-
8
-
-
2442654928
-
Perceived information security, financial liability and consumer trust in electronic commerce transactions
-
Chellappa, R.K. and Pavlou, P.A. (2002), "Perceived information security, financial liability and consumer trust in electronic commerce transactions", Logistics Information Management, Vol. 15 Nos 5/6, pp. 358-68.
-
(2002)
Logistics Information Management
, vol.15
, Issue.56
, pp. 358-368
-
-
Chellappa, R.K.1
Pavlou, P.A.2
-
9
-
-
20444475693
-
A generic service model for secure data interchange
-
Chiu, R-K. and Chen, J.C.H. (2005), "A generic service model for secure data interchange", Industrial Management & Data Systems, Vol. 105 No. 5, pp. 662-81.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.5
, pp. 662-681
-
-
Chiu, R.-K.1
Chen, J.C.H.2
-
10
-
-
0033204243
-
MIS key issues in Taiwan's enterprises
-
Chou, H-W. and Jou, S-B. (1999), "MIS key issues in Taiwan's enterprises", International Journal of Information Management, Vol. 19 No. 5, pp. 369-87.
-
(1999)
International Journal of Information Management
, vol.19
, Issue.5
, pp. 369-387
-
-
Chou, H.-W.1
Jou, S.-B.2
-
11
-
-
0032620196
-
Cyberspace security management
-
Chou, D.C., Yen, D.C., Lin, B. and Cheng, P.H-L. (1999), "Cyberspace security management", Industrial Management & Data Systems, Vol. 99 No. 8, pp. 353-61.
-
(1999)
Industrial Management & Data Systems
, vol.99
, Issue.8
, pp. 353-361
-
-
Chou, D.C.1
Yen, D.C.2
Lin, B.3
Cheng, P.H.-L.4
-
12
-
-
7444270789
-
Performance outcomes of strategic and IT competencies alignment
-
Croteau, A-M. and Raymond, L. (2004), "Performance outcomes of strategic and IT competencies alignment", Journal of Information Technology, Vol. 19, pp. 178-90.
-
(2004)
Journal of Information Technology
, vol.19
, pp. 178-190
-
-
Croteau, A.-M.1
Raymond, L.2
-
13
-
-
3242808612
-
-
Computer Security Institute San Francisco, CA available at: www.gocsi.com/
-
CSI/FBI (2004), 2004 CSI/FBI Computer Crime and Security Survey, Computer Security Institute, San Francisco, CA, available at: www.gocsi.com/.
-
(2004)
2004 CSI/FBI Computer Crime and Security Survey
-
-
-
14
-
-
84989104427
-
Chief executive scanning, environmental characteristics, and company performance: An empirical study
-
Daft, R., Sormunem, J. and Parks, D. (1988), "Chief executive scanning, environmental characteristics, and company performance: an empirical study", Strategic Management Journal, Vol. 9 No. 2, pp. 123-39.
-
(1988)
Strategic Management Journal
, vol.9
, Issue.2
, pp. 123-139
-
-
Daft, R.1
Sormunem, J.2
Parks, D.3
-
15
-
-
0036398120
-
Policy enforcement in the workplace
-
David, J. (2002), "Policy enforcement in the workplace", Computers & Security, Vol. 21 No. 6, pp. 506-13.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 506-513
-
-
David, J.1
-
17
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon, G. and Backhouse, J. (2000), "Information system security management in the new millennium", Communications of the ACM, Vol. 43 No. 7, pp. 125-8.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
18
-
-
84953510404
-
Environment as an influence on managerial autonomy
-
Dill, W.R. (1958), "Environment as an influence on managerial autonomy", Administrative Science Quarterly, Vol. 2 No. 4, pp. 409-43.
-
(1958)
Administrative Science Quarterly
, vol.2
, Issue.4
, pp. 409-443
-
-
Dill, W.R.1
-
19
-
-
0347308731
-
Information security and the internet
-
Doddrell, G.R. (1996), "Information security and the internet", Internet Research, Vol. 6 No. 1, pp. 5-9.
-
(1996)
Internet Research
, vol.6
, Issue.1
, pp. 5-9
-
-
Doddrell, G.R.1
-
20
-
-
0001380781
-
Characteristics of organizational environments and perceived environmental uncertainties
-
Duncan, R. (1972), "Characteristics of organizational environments and perceived environmental uncertainties", Administrative Science Quarterly, Vol. 17 No. 3, pp. 313-27.
-
(1972)
Administrative Science Quarterly
, vol.17
, Issue.3
, pp. 313-327
-
-
Duncan, R.1
-
21
-
-
0036765493
-
Management's role in information security in a cyber economy
-
Dutta, A. and McCrohan, K. (2002), "Management's role in information security in a cyber economy", California Management Review, Vol. 45 No. 1, pp. 67-87.
-
(2002)
California Management Review
, vol.45
, Issue.1
, pp. 67-87
-
-
Dutta, A.1
McCrohan, K.2
-
22
-
-
0034516080
-
Information security management: An approach to combine process certification and product evaluation
-
Eloff, M.M. and von Solms, S.H. (2000), "Information security management: an approach to combine process certification and product evaluation", Computers & Security, Vol. 19 No. 3, pp. 698-709.
-
(2000)
Computers & Security
, vol.19
, Issue.3
, pp. 698-709
-
-
Eloff, M.M.1
Von Solms, S.H.2
-
23
-
-
0030684254
-
A management view of internet electronic commerce security
-
Farmer, D. and Warburg, S.G. (1997), "A management view of internet electronic commerce security", Computers & Security, Vol. 16 No. 4, pp. 316-20.
-
(1997)
Computers & Security
, vol.16
, Issue.4
, pp. 316-320
-
-
Farmer, D.1
Warburg, S.G.2
-
24
-
-
18844456006
-
Have you met your organization's computer usage policy?
-
Foltz, C.B., Cronan, T.P. and Jones, T.W. (2005), "Have you met your organization's computer usage policy?", Industrial Management & Data Systems, Vol. 105 No. 2, pp. 137-46.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.2
, pp. 137-146
-
-
Foltz, C.B.1
Cronan, T.P.2
Jones, T.W.3
-
25
-
-
0002819636
-
Trust online
-
Friedman, B., Kahn, P. Jr and Howe, D. (2000), "Trust online", Communications of the ACM, Vol. 43 No. 12, pp. 34-40.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 34-40
-
-
Friedman, B.1
Jr, K.P.2
Howe, D.3
-
26
-
-
0042468094
-
Paper: A study on the certification of the information security management systems
-
Fung, A.R-W., Farn, K-J. and Lin, A.C. (2003), "Paper: a study on the certification of the information security management systems", Computer Standards & Interfaces, Vol. 25 No. 5, pp. 447-61.
-
(2003)
Computer Standards & Interfaces
, vol.25
, Issue.5
, pp. 447-461
-
-
Fung, A.R.-W.1
Farn, K.-J.2
Lin, A.C.3
-
27
-
-
10444233507
-
U-commerce: Emerging trends and research issues
-
Galanxhi-Janaqi, H. and Nah, F.F-H. (2004), "U-commerce: emerging trends and research issues", Industrial Management & Data Systems, Vol. 104 No. 9, pp. 744-55.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.9
, pp. 744-755
-
-
Galanxhi-Janaqi, H.1
Nah, F.F.-H.2
-
28
-
-
3543075155
-
TQM and organization size
-
Ghobadian, A. and Gallear, D. (1997), "TQM and organization size", International Journal of Operations & Production Management, Vol. 17 No. 2, pp. 121-63.
-
(1997)
International Journal of Operations & Production Management
, vol.17
, Issue.2
, pp. 121-163
-
-
Ghobadian, A.1
Gallear, D.2
-
29
-
-
0039270128
-
Interorganizational links and innovation: The case of hospital services
-
Goes, J.B. and Park, S.H. (1997), "Interorganizational links and innovation: the case of hospital services", Academy of Management Journal, Vol. 40 No. 3, pp. 673-96.
-
(1997)
Academy of Management Journal
, vol.40
, Issue.3
, pp. 673-696
-
-
Goes, J.B.1
Park, S.H.2
-
30
-
-
0001823869
-
Security concerns of system users: A study of perceptions of the adequacy of security
-
Goodhue, D.L. and Straub, D.W. (1991), "Security concerns of system users: a study of perceptions of the adequacy of security", Information & Management, Vol. 20 No. 1, pp. 13-27.
-
(1991)
Information & Management
, vol.20
, Issue.1
, pp. 13-27
-
-
Goodhue, D.L.1
Straub, D.W.2
-
32
-
-
9444231685
-
Managing agility and productivity in the electronics industry
-
Helo, P. (2004), "Managing agility and productivity in the electronics industry", Industrial Management & Data Systems, Vol. 104 No. 7, pp. 567-77.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.7
, pp. 567-577
-
-
Helo, P.1
-
33
-
-
0001900351
-
Plugging into strategic partnerships: The critical IS connection
-
Henderson, J.C. (1990), "Plugging into strategic partnerships: the critical IS connection", Sloan Management Review, Vol. 31 No. 3, pp. 7-18.
-
(1990)
Sloan Management Review
, vol.31
, Issue.3
, pp. 7-18
-
-
Henderson, J.C.1
-
34
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Hoffer, J.A. and Straub, D.W. (1989), "The 9 to 5 underground: are you policing computer crimes?", Sloan Management Review, Vol. 30 No. 4, pp. 35-43.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-43
-
-
Hoffer, J.A.1
Straub, D.W.2
-
35
-
-
33645025276
-
Information security management and assurance
-
Holzinger, A. (2000), "Information security management and assurance", Information Systems Security, Vol. 9 No. 2, pp. 32-9.
-
(2000)
Information Systems Security
, vol.9
, Issue.2
, pp. 32-39
-
-
Holzinger, A.1
-
36
-
-
0345327795
-
An integrated system theory of information security management
-
Hong, K-S., Chi, Y-P., Chao, L.R. and Tang, J-H. (2003), "An integrated system theory of information security management", Information Management & Computer Security, Vol. 11 No. 5, pp. 243-8.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.5
, pp. 243-248
-
-
Hong, K.-S.1
Chi, Y.-P.2
Chao, L.R.3
Tang, J.-H.4
-
37
-
-
9144256179
-
Assessing risk in ERP projects: Identify and prioritize the factors
-
Huang, S-M., Chang, I-C., Li, S-H. and Lin, M-T. (2004), "Assessing risk in ERP projects: identify and prioritize the factors", Industrial Management & Data Systems, Vol. 104 No. 8, pp. 681-8.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.8
, pp. 681-688
-
-
Huang, S.-M.1
Chang, I.-C.2
Li, S.-H.3
Lin, M.-T.4
-
38
-
-
18844363640
-
Critical factors in adopting a knowledge management system for the pharmaceutical industry
-
Hung, Y-C., Huang, S-M., Lin, Q-P. and Tsai, M-L. (2005), "Critical factors in adopting a knowledge management system for the pharmaceutical industry", Industrial Management & Data Systems, Vol. 105 No. 2, pp. 164-83.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.2
, pp. 164-183
-
-
Hung, Y.-C.1
Huang, S.-M.2
Lin, Q.-P.3
Tsai, M.-L.4
-
39
-
-
33645034874
-
2002 ISM survey: Does size matter?
-
September, available at: http://infosecuritymag.techtarget.com/2002/sep/ 2002survey.pdf
-
Information Security Magazine (2002), "2002 ISM survey: does size matter?", Information Security, September, available at: http://infosecuritymag.techtarget.com/2002/sep/2002survey.pdf.
-
(2002)
Information Security
-
-
Security Magazine, I.1
-
40
-
-
20444454027
-
A strategic contingency model for technology alliance
-
Ju, T., Chen, S-H., Li, C-Y. and Lee, T-S. (2005), "A strategic contingency model for technology alliance", Industrial Management & Data Systems, Vol. 105 No. 5, pp. 623-44.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.5
, pp. 623-644
-
-
Ju, T.1
Chen, S.-H.2
Li, C.-Y.3
Lee, T.-S.4
-
41
-
-
34250421484
-
An index of factorial simplicity
-
Kaiser, H. (1974), "An index of factorial simplicity", Psychometrika, Vol. 39, pp. 31-6.
-
(1974)
Psychometrika
, vol.39
, pp. 31-36
-
-
Kaiser, H.1
-
42
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
Kankanhalli, A., Teo, H-H., Tan, B.C.Y. and Wei, K.K. (2003), "An integrative study of information systems security effectiveness", International Journal of Information Management, Vol. 23 No. 2, pp. 139-54.
-
(2003)
International Journal of Information Management
, vol.23
, Issue.2
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.-H.2
Tan, B.C.Y.3
Wei, K.K.4
-
43
-
-
2342649504
-
The impact of industry contextual factors on IT focus and the use of IT for competitive advantage
-
Kearns, G.S. and Lederer, A.L. (2004), "The impact of industry contextual factors on IT focus and the use of IT for competitive advantage", Information & Management, Vol. 41 No. 7, pp. 899-919.
-
(2004)
Information & Management
, vol.41
, Issue.7
, pp. 899-919
-
-
Kearns, G.S.1
Lederer, A.L.2
-
44
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic, A.G. and Clark, J.G. (2004), "Why there aren't more information security research studies", Information & Management, Vol. 41 No. 5, pp. 597-607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
45
-
-
3242727463
-
Assessing responsiveness of the food industry in Thailand
-
Kritchanchai, D. (2004), "Assessing responsiveness of the food industry in Thailand", Industrial Management & Data Systems, Vol. 104 No. 5, pp. 384-95.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.5
, pp. 384-395
-
-
Kritchanchai, D.1
-
47
-
-
3242801473
-
Technochange management: Using IT to drive organizational change
-
Markus, M.L. (2004), "Technochange management: using IT to drive organizational change", Journal of Information Technology, Vol. 19, pp. 4-20.
-
(2004)
Journal of Information Technology
, vol.19
, pp. 4-20
-
-
Markus, M.L.1
-
48
-
-
0003528130
-
-
2nd ed. McGraw-Hill New York, NY
-
Nunnally, J. (1978), Psychometric Theory, 2nd ed., McGraw-Hill, New York, NY.
-
(1978)
Psychometric Theory
-
-
Nunnally, J.1
-
49
-
-
0028713556
-
Development of security policies
-
Olnes, J. (1994), "Development of security policies", Computers & Security, Vol. 13 No. 8, pp. 628-36.
-
(1994)
Computers & Security
, vol.13
, Issue.8
, pp. 628-636
-
-
Olnes, J.1
-
50
-
-
67649718927
-
Preparing for ISO17799
-
Peltier, T.R. (2003), "Preparing for ISO17799", Information Systems Security, Vol. 11 No. 6, pp. 21-8.
-
(2003)
Information Systems Security
, vol.11
, Issue.6
, pp. 21-28
-
-
Peltier, T.R.1
-
51
-
-
70449781351
-
Organizational context and information systems success: A contingency approach
-
Raymond, L. (1990), "Organizational context and information systems success: a contingency approach", Journal of Management Information Systems, Vol. 6 No. 4, pp. 5-20.
-
(1990)
Journal of Management Information Systems
, vol.6
, Issue.4
, pp. 5-20
-
-
Raymond, L.1
-
52
-
-
0001940135
-
Factors that influence the social dimension of alignment between business and information technology objectives
-
Reich, B.H. and Benbasat, I. (2000), "Factors that influence the social dimension of alignment between business and information technology objectives", MIS Quarterly, Vol. 24 No. 1, pp. 81-111.
-
(2000)
MIS Quarterly
, vol.24
, Issue.1
, pp. 81-111
-
-
Reich, B.H.1
Benbasat, I.2
-
53
-
-
0002290655
-
Eight imperatives for the new IT organization
-
Rockart, J.F., Earl, M.J. and Ross, J.W. (1996), "Eight imperatives for the new IT organization", Sloan Management Review, Vol. 38 No. 1, pp. 43-55.
-
(1996)
Sloan Management Review
, vol.38
, Issue.1
, pp. 43-55
-
-
Rockart, J.F.1
Earl, M.J.2
Ross, J.W.3
-
54
-
-
0035589929
-
Alignment between business and IS strategies: A study of prospectors, analyzers and defenders
-
Sabherwal, R. and Chan, Y.E. (2001), "Alignment between business and IS strategies: a study of prospectors, analyzers and defenders", Information Systems Research, Vol. 12 No. 1, pp. 11-33.
-
(2001)
Information Systems Research
, vol.12
, Issue.1
, pp. 11-33
-
-
Sabherwal, R.1
Chan, Y.E.2
-
55
-
-
0035780792
-
Perceived security and world wide web purchase intention
-
Salisbury, W.D., Pearson, R.A., Pearson, A.W. and Miller, D.W. (2001), "Perceived security and world wide web purchase intention", Industrial Management & Data Systems, Vol. 101 No. 4, pp. 165-76.
-
(2001)
Industrial Management & Data Systems
, vol.101
, Issue.4
, pp. 165-176
-
-
Salisbury, W.D.1
Pearson, R.A.2
Pearson, A.W.3
Miller, D.W.4
-
56
-
-
84986105989
-
Information security in business environments
-
Sanderson, E. and Forcht, K.A. (1996), "Information security in business environments", Information Management & Computer Security, Vol. 4 No. 1, pp. 32-7.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.1
, pp. 32-37
-
-
Sanderson, E.1
Forcht, K.A.2
-
57
-
-
84998186816
-
Perceived uncertainty and firm performance in SMEs
-
Sawyerr, O.O., McGee, J. and Peterson, M. (2003), "Perceived uncertainty and firm performance in SMEs", International Small Business Journal, Vol. 21 No. 3, pp. 269-88.
-
(2003)
International Small Business Journal
, vol.21
, Issue.3
, pp. 269-288
-
-
Sawyerr, O.O.1
McGee, J.2
Peterson, M.3
-
58
-
-
0342844790
-
Managing the information explosion
-
Sharratt, J. and McMurdo, A. (1992), "Managing the information explosion", Journal of Information Resource Management, Vol. 3 No. 3, pp. 5-64.
-
(1992)
Journal of Information Resource Management
, vol.3
, Issue.3
, pp. 5-64
-
-
Sharratt, J.1
McMurdo, A.2
-
59
-
-
0036955834
-
The role of trust, quality, value and risk in conducting e-business
-
So, M. and Sculli, D. (2002), "The role of trust, quality, value and risk in conducting e-business", Industrial Management & Data Systems, Vol. 102 No. 9, pp. 503-12.
-
(2002)
Industrial Management & Data Systems
, vol.102
, Issue.9
, pp. 503-512
-
-
So, M.1
Sculli, D.2
-
60
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J.M., Stam, K.R., Mastrangelo, P. and Jolton, J. (2005), "Analysis of end user security behaviors", Computers & Security, Vol. 24 No. 2, pp. 124-33.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
61
-
-
0001771191
-
Organizational differences in ISO 9000 implementation practices
-
Taylor, W.A. (1995), "Organizational differences in ISO 9000 implementation practices", International Journal of Quality & Reliability Management, Vol. 12 No. 7, pp. 10-17.
-
(1995)
International Journal of Quality & Reliability Management
, vol.12
, Issue.7
, pp. 10-17
-
-
Taylor, W.A.1
-
62
-
-
12444320402
-
Succession management practices in Australian organizations
-
Taylor, T. and McGraw, P. (2004), "Succession management practices in Australian organizations", International Journal of Manpower, Vol. 25 No. 8, pp. 741-58.
-
(2004)
International Journal of Manpower
, vol.25
, Issue.8
, pp. 741-758
-
-
Taylor, T.1
McGraw, P.2
-
63
-
-
84890025144
-
Implementation of ISO17799 and BS7799 in picture archiving and communication system: Local experience in implementation of BS7799 standard
-
Tong, C.K.S., Fung, K.H., Huang, H.Y.H. and Chan, K.K. (2003), "Implementation of ISO17799 and BS7799 in picture archiving and communication system: local experience in implementation of BS7799 standard", International Congress Series, Vol. 1256, pp. 311-8.
-
(2003)
International Congress Series
, vol.1256
, pp. 311-318
-
-
Tong, C.K.S.1
Fung, K.H.2
Huang, H.Y.H.3
Chan, K.K.4
-
64
-
-
85023799077
-
Information resource management: Stewards of data
-
van den Hoven, J. (1999), "Information resource management: stewards of data", Information Systems Management, Vol. 16 No. 1, pp. 88-90.
-
(1999)
Information Systems Management
, vol.16
, Issue.1
, pp. 88-90
-
-
Van Den Hoven, J.1
-
65
-
-
0036067283
-
The information security management toolbox - Taking the pain out of security management
-
Vermeulen, C. and von Solms, R. (2002), "The information security management toolbox - taking the pain out of security management", Information Management & Computer Security, Vol. 10 Nos 2/3, pp. 119-25.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.23
, pp. 119-125
-
-
Vermeulen, C.1
Von Solms, R.2
-
66
-
-
0030377647
-
Information security management: The second generation
-
von Solms, R. (1996), "Information security management: the second generation", Computers & Security, Vol. 15 No. 4, pp. 281-8.
-
(1996)
Computers & Security
, vol.15
, Issue.4
, pp. 281-288
-
-
Von Solms, R.1
-
67
-
-
3042812983
-
The 10 deadly sins of information security management
-
von Solms, B. and von Solms, R. (2004), "The 10 deadly sins of information security management", Computers & Security, Vol. 23 No. 5, pp. 371-6.
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 371-376
-
-
Von Solms, B.1
Von Solms, R.2
-
68
-
-
1242265154
-
In defense of the realm: Understanding the threats to information security
-
Whitman, M. (2004), "In defense of the realm: understanding the threats to information security", International Journal of Information Management, Vol. 24 No. 1, pp. 43-57.
-
(2004)
International Journal of Information Management
, vol.24
, Issue.1
, pp. 43-57
-
-
Whitman, M.1
-
69
-
-
18844455453
-
The impacts of establishing enterprise information portals on e-business performance
-
Yang, S-M., Yang, M-H. and Wu, J-T.B. (2005), "The impacts of establishing enterprise information portals on e-business performance", Industrial Management & Data Systems, Vol. 105 No. 3, pp. 349-68.
-
(2005)
Industrial Management & Data Systems
, vol.105
, Issue.3
, pp. 349-368
-
-
Yang, S.-M.1
Yang, M.-H.2
Wu, J.-T.B.3
-
70
-
-
9144222725
-
Management of information technology and business process re-engineering: A case study
-
Zhao, F. (2004), "Management of information technology and business process re-engineering: a case study", Industrial Management & Data Systems, Vol. 104 No. 8, pp. 674-80.
-
(2004)
Industrial Management & Data Systems
, vol.104
, Issue.8
, pp. 674-680
-
-
Zhao, F.1
|