-
1
-
-
6244245533
-
Virtual defense
-
Adams, J. (2001). Virtual Defense. Foreign Affairs, 80(3), 98-112.
-
(2001)
Foreign Affairs
, vol.80
, Issue.3
, pp. 98-112
-
-
Adams, J.1
-
3
-
-
33645142767
-
Millennium project calls for declaration of global information warfare against transnational organized crime; corruption, money laundering, terrorism funding by organized crime should be treated as national security threat
-
February 10
-
Ascribe. (2003). Millennium Project Calls for Declaration of Global Information Warfare against Transnational Organized Crime; Corruption, Money Laundering, Terrorism Funding by Organized Crime Should Be Treated as National Security Threat Ascribe Newswire, February 10.
-
(2003)
Ascribe Newswire
-
-
-
4
-
-
33645154463
-
China boosts information warfare development with vast research centers
-
September 27
-
Associated Press. (2002). China Boosts Information Warfare Development with Vast Research Centers. Associated Press Worldstream, September 27.
-
(2002)
Associated Press Worldstream
-
-
-
5
-
-
1642303881
-
The myth of secure computing
-
Austin, R. D., and Darby, C. A. R. (2003). The Myth of Secure Computing. Harvard Business Review, 81(6), 120-126.
-
(2003)
Harvard Business Review
, vol.81
, Issue.6
, pp. 120-126
-
-
Austin, R.D.1
Darby, C.A.R.2
-
6
-
-
33645148966
-
Officials break up russian extortion ring
-
Aug 3
-
The Australian. (2004). Officials Break up Russian Extortion Ring The Australian, Aug 3, p. C03.
-
(2004)
The Australian
-
-
-
7
-
-
30744434347
-
An analysis of the growth of computer and internet security breaches
-
Bagchi, K., and Udo, G. (2003). An Analysis of the Growth of Computer and Internet Security Breaches. Communications of the Association for Information Systems, 12(46), 1-29.
-
(2003)
Communications of the Association for Information Systems
, vol.12
, Issue.46
, pp. 1-29
-
-
Bagchi, K.1
Udo, G.2
-
8
-
-
1242343843
-
Information warfare across the Taiwan strait
-
Bolt, P. J., and Brenner, C. (2004). Information Warfare across the Taiwan Strait. Journal of Contemporary China, 13(38), 129.
-
(2004)
Journal of Contemporary China
, vol.13
, Issue.38
, pp. 129
-
-
Bolt, P.J.1
Brenner, C.2
-
10
-
-
85023834401
-
China's use of perception management
-
Callamari, P., and Reveron, D. (2003). China's Use of Perception Management. International Journal of Intelligence and Counter Intelligence, 16(1), 1-15.
-
(2003)
International Journal of Intelligence and Counter Intelligence
, vol.16
, Issue.1
, pp. 1-15
-
-
Callamari, P.1
Reveron, D.2
-
12
-
-
84876662553
-
-
CSI, San Francisco. Retrieved April, 2003
-
Computer Security Institute. (2002). Cyber-Crime Bleeds U.S. Corporations, Survey Shows; Financial Losses from Attacks Climb for Third Year in a Row (Press Release, April 7, 2002). CSI, San Francisco. Retrieved April, 2003, from http://www.gocsi.com/press
-
(2002)
Cyber-Crime Bleeds U.S. Corporations, Survey Shows; Financial Losses from Attacks Climb for Third Year in A Row (Press Release, April 7, 2002)
-
-
-
13
-
-
0036662690
-
Information warfare
-
Cronin, B. (2002a). Information Warfare. Library Journal, 127(12), p. 54.
-
(2002)
Library Journal
, vol.127
, Issue.12
, pp. 54
-
-
Cronin, B.1
-
14
-
-
85032070768
-
Information warfare: Peering inside pandora's postmodern box
-
Cronin, B. (2002b). Information Warfare: Peering inside Pandora's Postmodern Box. Library Journal, 50(6), 279-294.
-
(2002)
Library Journal
, vol.50
, Issue.6
, pp. 279-294
-
-
Cronin, B.1
-
15
-
-
0033212218
-
Information warfare: Its applications in military and civilian contexts
-
Cronin, B., and Crawford, H. (1999). Information Warfare: Its Applications in Military and Civilian Contexts. Information Society, 15(4), 257-264.
-
(1999)
Information Society
, vol.15
, Issue.4
, pp. 257-264
-
-
Cronin, B.1
Crawford, H.2
-
16
-
-
33645143482
-
Imperatives of information operations and information warfare
-
A. D. Campen and D. H. Dearth (Eds.), Fairfax, VA: AFCEA International Press
-
Dearth, D. H. (1998). Imperatives of Information Operations and Information Warfare. In A. D. Campen and D. H. Dearth (Eds.), Cyberwar 2.0: Myths, Mysteries, and Reality. Fairfax, VA: AFCEA International Press.
-
(1998)
Cyberwar 2.0: Myths, Mysteries, and Reality
-
-
Dearth, D.H.1
-
17
-
-
33645162701
-
Operationalizing software
-
A. D. Campen and D. H. Dearth (Eds.), Fairfax, VA: AFCEA International Press
-
deCaro, C. (1998). Operationalizing Software. In A. D. Campen and D. H. Dearth (Eds.), Cyberware 2.0: Myths, Mysteries, and Reality. Fairfax, VA: AFCEA International Press.
-
(1998)
Cyberware 2.0: Myths, Mysteries, and Reality
-
-
Decaro, C.1
-
18
-
-
84898362929
-
Identity-theft on the rise, FTC warns
-
September 4
-
DeMarrais, K. (2003). Identity-Theft on the Rise, FTC Warns. Knight Ridder Business News, September 4, pp. 1-4.
-
(2003)
Knight Ridder Business News
, pp. 1-4
-
-
DeMarrais, K.1
-
20
-
-
33847063484
-
-
Retrieved Aug 10, 2005, May 2003
-
Department of Homeland Security. (2005). Information Sharing and Analysis Centers. Retrieved Aug 10, 2005, from www.dhs.gov/dhspublic/display?theme= 73&content=1375; original content from www.caio.gov, May 2003.
-
(2005)
Information Sharing and Analysis Centers
-
-
-
22
-
-
0036765493
-
Management's role in information security in a cyber-economy
-
Dutta, A., and McCrohan, K. (2002). Management's Role in Information Security in a Cyber-Economy. California Management Review, 45(1), 67-87.
-
(2002)
California Management Review
, vol.45
, Issue.1
, pp. 67-87
-
-
Dutta, A.1
McCrohan, K.2
-
23
-
-
84898136943
-
Press conference with attorney general john ashcroft; FBI director robert mueller; and FTC chairman timothy J. Muris
-
May 16
-
Federal News Service. (2003). Press Conference with Attorney General John Ashcroft; FBI Director Robert Mueller; and FTC Chairman Timothy J. Muris. Federal News Service Inc., May 16.
-
(2003)
Federal News Service Inc.
-
-
-
24
-
-
84886764674
-
A systems view of information warfare
-
Friman, H. (2001). A Systems View of Information Warfare. Journal of Information Warfare, 7(1), 25-32.
-
(2001)
Journal of Information Warfare
, vol.7
, Issue.1
, pp. 25-32
-
-
Friman, H.1
-
25
-
-
0037412283
-
A new webmaster's guide to firewalls and security
-
Frolick, M. N. (2003). A New Webmaster's Guide to Firewalls and Security. Information Systems Management, 20(1, Winter), 29-34.
-
(2003)
Information Systems Management
, vol.20
, Issue.1 WINTER
, pp. 29-34
-
-
Frolick, M.N.1
-
26
-
-
85013136025
-
The financial impact of IT security breaches: What do investors think?
-
Garg, A., Curtis, J., and Halper, H. (2003). The Financial Impact of IT Security Breaches: What Do Investors Think? Information Systems Security, 12(1), 22-34.
-
(2003)
Information Systems Security
, vol.12
, Issue.1
, pp. 22-34
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
27
-
-
84876635785
-
-
Retrieved Aug. 10, 2005
-
Garrick, J. B., and Powers, D. A. (2000). Use of Defense in Depth in Risk-Information Nmss Activities (Letter to Richard A. Meserve Dated May 25, 2000, Chairman, U.S. Nuclear Regulatory Commission). Retrieved Aug. 10, 2005, from http://www.nrc.gov/reading-rm/doc-collections/acrs/letters/2000/4721893. html
-
(2000)
Use of Defense in Depth in Risk-Information Nmss Activities (Letter to Richard A. Meserve Dated May 25, 2000, Chairman, U.S. Nuclear Regulatory Commission)
-
-
Garrick, J.B.1
Powers, D.A.2
-
28
-
-
84876643897
-
-
February 14. Retrieved Aug. 10, 2005
-
Geralds, J. (2003). Hacker Insurance Set to Rocket, February 14. Retrieved Aug. 10, 2005, from http://www.vnunet.com/news/1138789
-
(2003)
Hacker Insurance Set to Rocket
-
-
Geralds, J.1
-
29
-
-
84886764038
-
What your firm should know about identity theft
-
Gerard, G., Hillison, W., and Pacini, C. (2004). What Your Firm Should Know About Identity Theft. The Journal of Corporate Accounting and Finance, May/June, 3-11.
-
(2004)
The Journal of Corporate Accounting and Finance, May/June
, pp. 3-11
-
-
Gerard, G.1
Hillison, W.2
Pacini, C.3
-
30
-
-
3242808612
-
-
San Francisco, CA Computer Security Institute
-
Gordon, L. A., Loeb, M. P., Lucyshyn, W., and Richardson, R. (2005). Tenth Annual, 2005 CSI/FBI Computer Crime and Security Survey. San Francisco, CA (www.gocsi.com): Computer Security Institute.
-
(2005)
Tenth Annual, 2005 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
31
-
-
33645151025
-
Net attacks down but sophistication is up
-
January 30
-
Gross, G. (2003). Net Attacks Down but Sophistication Is Up. IDG News Service, January 30.
-
(2003)
IDG News Service
-
-
Gross, G.1
-
32
-
-
33645138595
-
U.S. tally in online-crime sweep: 150 charged
-
August 26
-
Hansell, S. (2004). U.S. Tally in Online-Crime Sweep: 150 Charged. New York Times, August 26.
-
(2004)
New York Times
-
-
Hansell, S.1
-
33
-
-
33645133742
-
Concepts in information warfare
-
Hutchinson, W. (2002). Concepts in Information Warfare. Logistics Information Management, 15(5/6), 410-413.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 410-413
-
-
Hutchinson, W.1
-
34
-
-
73849132370
-
-
Retrieved Aug. 10, 2005
-
Information Systems Audit and Control Association (ISACA). (2005). Overview and History. Retrieved Aug. 10, 2005, from http://www.isaca.org/ template.cfm?section=Overview_and_History
-
(2005)
Overview and History
-
-
-
35
-
-
33947174540
-
-
Oct. 31. Retrieved Aug. 10, 2005
-
International Information Systems Security Certification Consortium [ISC]2®. (2005). Press Releases, Oct. 31. Retrieved Aug. 10, 2005, from https://www.isc2.org/cgi/content.cgi?page=13
-
(2005)
Press Releases
-
-
-
36
-
-
0012213034
-
-
(No. ISO/IEC 17799:2000(E)): The International Standards Organization/The International Electrotechnical Commission
-
ISO/IEC. (2000). Information Technology - Code of Practice for Information Security Management (No. ISO/IEC 17799:2000(E)): The International Standards Organization/The International Electrotechnical Commission.
-
(2000)
Information Technology - Code of Practice for Information Security Management
-
-
-
38
-
-
33645142942
-
-
New York: Auerbach Publications
-
Jones, A., Kovacich, G. L., and Luzwick, P. G. (2002). Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages. New York: Auerbach Publications.
-
(2002)
Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages
-
-
Jones, A.1
Kovacich, G.L.2
Luzwick, P.G.3
-
39
-
-
33645167181
-
Hacker insurance market boosted by cyberattacks
-
January 27
-
Keating, G. (2003). Hacker Insurance Market Boosted by Cyberattacks. Reuters, January 27.
-
(2003)
Reuters
-
-
Keating, G.1
-
40
-
-
15844405077
-
Information security threats and practices in small businesses
-
Keller, S., Powell, A., Horstmann, B., Predmore, C., and Crawford, M. (2005). Information Security Threats and Practices in Small Businesses. Information Systems Management, 22(2), 7-19.
-
(2005)
Information Systems Management
, vol.22
, Issue.2
, pp. 7-19
-
-
Keller, S.1
Powell, A.2
Horstmann, B.3
Predmore, C.4
Crawford, M.5
-
41
-
-
84876604296
-
-
SANS. Retrieved Aug. 10, 2005
-
Key, V. (2004). What Is Solar Sunrise? SANS. Retrieved Aug. 10, 2005, from http://www.sans.org/resources/idfaq/solar_sunrise.php
-
(2004)
What Is Solar Sunrise?
-
-
Key, V.1
-
43
-
-
79953274479
-
Cyber-insurance issues: Managing risk by tying network security to business goals
-
Kolodzinski, O. (2002). Cyber-Insurance Issues: Managing Risk by Tying Network Security to Business Goals. CPA Journal., 72(11), 10-11.
-
(2002)
CPA Journal
, vol.72
, Issue.11
, pp. 10-11
-
-
Kolodzinski, O.1
-
44
-
-
84876644736
-
-
May 14. Retrieved Aug. 10, 2005
-
Legard, D. (2003). Fake Bank Web Site Scam Reaches U.S., May 14. Retrieved Aug. 10, 2005, from http://www.itworld.com/Tech/2987/030514fakebank.
-
(2003)
Fake Bank Web Site Scam Reaches U.S.
-
-
Legard, D.1
-
45
-
-
0004053345
-
-
Washington, DC: National Defense University, Institute for National Strategic Studies
-
Libicki, M. C. (1995). What Is Information Warfare? Washington, DC: National Defense University, Institute for National Strategic Studies.
-
(1995)
What Is Information Warfare?
-
-
Libicki, M.C.1
-
46
-
-
20444432182
-
Key issues for IT executives
-
Luftman, J., and McLean, E. R. (2004). Key Issues for IT Executives. MIS Quarterly Executive, 3(2), 89-104.
-
(2004)
MIS Quarterly Executive
, vol.3
, Issue.2
, pp. 89-104
-
-
Luftman, J.1
McLean, E.R.2
-
47
-
-
33645133741
-
Survival of the fittest
-
Meall, L. (1989). Survival of the Fittest.Accountancy (UK), 103(1147), 140-141.
-
(1989)
Accountancy (UK)
, vol.103
, Issue.1147
, pp. 140-141
-
-
Meall, L.1
-
48
-
-
1642410284
-
Are you the weak link?
-
Mitnick, K. (2003). Are You the Weak Link? Harvard Business Review, 81(4), 18-20.
-
(2003)
Harvard Business Review
, vol.81
, Issue.4
, pp. 18-20
-
-
Mitnick, K.1
-
49
-
-
0004184890
-
-
Washington D.C.: National Academy Press
-
National Research Council. (1991). Computers at Risk. Washington D.C.: National Academy Press.
-
(1991)
Computers at Risk
-
-
-
50
-
-
33645158247
-
Identity-related misuse
-
D. E. Denning and P. J. Denning (Eds.), Reading, Massachusetts: ACM Press
-
Neumann, P. G. (1998). Identity-Related Misuse. In D. E. Denning and P. J. Denning (Eds.), Internet Besieged. Reading, Massachusetts: ACM Press.
-
(1998)
Internet Besieged
-
-
Neumann, P.G.1
-
51
-
-
84886767428
-
Cyber-extortion evolves
-
O'Rourke, M. (2004). Cyber-Extortion Evolves. Risk Management, 51(4), 10-12.
-
(2004)
Risk Management
, vol.51
, Issue.4
, pp. 10-12
-
-
O'Rourke, M.1
-
54
-
-
84858559472
-
-
IDG News Service, November 19. Retrieved Aug. 10, 2005
-
PCWorld. (2001). Timeline: A 40-Year History of Hacking. IDG News Service, November 19. Retrieved Aug. 10, 2005, from http://www.cnn.com/2001/ TECH/internet/11/19/hack.history.idg/
-
(2001)
Timeline: A 40-Year History of Hacking
-
-
-
55
-
-
0030400684
-
Information warfare - Your company needs you!
-
Porter, T. (1996). Information Warfare - Your Company Needs You! Computers & Security, 15, 561-566.
-
(1996)
Computers & Security
, vol.15
, pp. 561-566
-
-
Porter, T.1
-
56
-
-
84876632042
-
-
SecurityFocus, Sept. 27. Retrieved Aug. 10, 2005
-
Poulsen, K. (2004). U.N. Warns of Nuclear Cyber-Attack Risk. SecurityFocus, Sept. 27. Retrieved Aug. 10, 2005, from http://www.securityfocus. com/news/9592
-
(2004)
U.N. Warns of Nuclear Cyber-Attack Risk
-
-
Poulsen, K.1
-
57
-
-
84876607312
-
-
Sept. 21. Retrieved Aug. 10, 2005
-
Pruitt, S. (2004). When Outsourcing, Don't Forget Security, Experts Say. IDG News Service, Sept. 21. Retrieved Aug. 10, 2005, from http://www. computerworld.com/managementtopics/outsourcing/story/0,10801,96074,00.html
-
(2004)
When Outsourcing, Don't Forget Security, Experts Say. IDG News Service
-
-
Pruitt, S.1
-
59
-
-
84876602586
-
-
American Forces Press Service, July 20. Retrieved Aug. 10, 2005
-
Rhem, K.T. (2005). China Investing in Information Warfare Technology, Doctrine. American Forces Press Service, July 20. Retrieved Aug. 10, 2005, from http://www.pentagon.gov/news/jul2005/20050720_2171.html
-
(2005)
China Investing in Information Warfare Technology, Doctrine
-
-
Rhem, K.T.1
-
61
-
-
15744383822
-
Netware associates to attack spyware with new products
-
22 Jan.
-
Richmond, R. (2004, 22 Jan). Netware Associates to Attack Spyware with New Products. Wall Street Journal, p. B5.
-
(2004)
Wall Street Journal
-
-
Richmond, R.1
-
62
-
-
27644542479
-
Safeguarding your critical business information
-
Rosenoer, J. (2002). Safeguarding Your Critical Business Information. Harvard Business Review, 80(2), 20-21.
-
(2002)
Harvard Business Review
, vol.80
, Issue.2
, pp. 20-21
-
-
Rosenoer, J.1
-
63
-
-
0007735836
-
Something other than war
-
A. D. Campen and D. H. Dearth (Eds.), Fairfax, VA: AFCEA International Press
-
Schwartau, W. (1998). Something Other Than War. In A. D. Campen and D. H. Dearth (Eds.), Cyberwar 2.0: Myths, Mysteries, and Reality. Fairfax, VA: AFCEA International Press.
-
(1998)
Cyberwar 2.0: Myths, Mysteries, and Reality
-
-
Schwartau, W.1
-
64
-
-
33645141316
-
Intrusion protection systems: Security's silver bullet?
-
Sequeira, D. (2003). Intrusion Protection Systems: Security's Silver Bullet? Business Communication Review, March, 36-41.
-
(2003)
Business Communication Review, March
, pp. 36-41
-
-
Sequeira, D.1
-
65
-
-
33645164781
-
Security infrastructure: Basics of intrusion detection systems
-
H. F. Tipton and M. Krause (Eds.), New York: Auerbach Publications
-
Shaurette, K. (2003). Security Infrastructure: Basics of Intrusion Detection Systems. In H. F. Tipton and M. Krause (Eds.), Information Security Management Handbook (4th ed., Vol. 4, pp. 683-698). New York: Auerbach Publications.
-
(2003)
Information Security Management Handbook (4th Ed.)
, vol.4
, pp. 683-698
-
-
Shaurette, K.1
-
66
-
-
15744395148
-
The ethical and legal concerns of spyware
-
Sipior, J. C., Ward, B. T., and Roselli, G. R. (2005). The Ethical and Legal Concerns of Spyware. Information Systems Management, 22(2), 39-49.
-
(2005)
Information Systems Management
, vol.22
, Issue.2
, pp. 39-49
-
-
Sipior, J.C.1
Ward, B.T.2
Roselli, G.R.3
-
67
-
-
33645154270
-
Web amplifies message of primitive executions
-
June 30
-
Smith, L. (2004, June 30). Web Amplifies Message of Primitive Executions. Los Angles Times.
-
(2004)
Los Angles Times
-
-
Smith, L.1
-
69
-
-
84876608507
-
The other war on terror
-
August. Retrieved Aug 10, 2005
-
Sterling, B. (2004). The Other War on Terror. Wired, 12(8), August. Retrieved Aug 10, 2005, from http://www.wired.com/wired/archive/12.08/view.html? pg=4
-
(2004)
Wired
, vol.12
, Issue.8
-
-
Sterling, B.1
-
72
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. W. (1990). Effective IS Security:An Empirical Study. Information Systems Research, 1(3), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
73
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., and Welke, R. J. (1998). Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly, 22(4), 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
74
-
-
33645147472
-
Secret DTI inquiry into cyber-terror
-
June 9
-
Sunday Times. (1996). Secret DTI Inquiry into Cyber-Terror The (London) Sunday Times, June 9, pp. 1-8.
-
(1996)
The (London) Sunday Times
, pp. 1-8
-
-
-
75
-
-
33645142575
-
Al-Jazeera site experiences hack attack
-
March 25
-
Svensson, P. (2003).Al-Jazeera Site Experiences Hack Attack. The Associated Press, March 25.
-
(2003)
The Associated Press
-
-
Svensson, P.1
-
76
-
-
3142674062
-
Firms' hacking-related insurance costs soar
-
Feb. 9. Retrieved Aug. 29, 2005
-
Swartz, J. (2003). Firms' hacking-related insurance costs soar. USA Today, Feb. 9. Retrieved Aug. 29, 2005, from http://www.usatoday.com/money/ industries/technology/2003-02-09-hacker_x.htm
-
(2003)
USA Today
-
-
Swartz, J.1
-
78
-
-
33645133005
-
Leveraging protection mechanisms to provide defense in depth
-
M. E. Whitman and H. J. Mattord (Eds.), Boston: Course Technology
-
Tucker, T. E. (2004). Leveraging Protection Mechanisms to Provide Defense in Depth. In M. E. Whitman and H. J. Mattord (Eds.), Management of Information Security. Boston: Course Technology, p. 408.
-
(2004)
Management of Information Security
, pp. 408
-
-
Tucker, T.E.1
-
79
-
-
84882567623
-
Organized crime invades cyberspace
-
August 30. Retrieved Aug. 10, 2005
-
Verton, D. (2004). Organized Crime Invades Cyberspace. ComputerWorld, August 30. Retrieved Aug. 10, 2005, from http://www.computerworld.com/ securitytopics/security/story/0,10801,95501,00.html
-
(2004)
ComputerWorld
-
-
Verton, D.1
-
80
-
-
84886762890
-
E-Bomb
-
Wilson, J. (2001). E-Bomb. Popular Mechanics, 178(9), 50-54.
-
(2001)
Popular Mechanics
, vol.178
, Issue.9
, pp. 50-54
-
-
Wilson, J.1
-
82
-
-
0033277446
-
Password security: An empirical study
-
Zviran, M., and Haga, W. J. (1999). Password Security: An Empirical Study. Journal of Management Information Systems, 15(4), 161-185.
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.J.2
|