-
1
-
-
33744826696
-
-
Unpublished PhD thesis, School of Public Health, Curtin University, Perth, Australia
-
Armstrong, H. (1999) A soft approach to management of information security. Unpublished PhD thesis, School of Public Health, Curtin University, Perth, Australia.
-
(1999)
A Soft Approach to Management of Information Security
-
-
Armstrong, H.1
-
2
-
-
31344472779
-
Signalling intentions and obliging behaviour online: An application of semiotic and legal modeling in E-commerce
-
Backhouse, J. & Cheng, E. (2000) Signalling intentions and obliging behaviour online: an application of semiotic and legal modeling in E-commerce. Journal of End User Computing, 12, 33-42.
-
(2000)
Journal of End User Computing
, vol.12
, pp. 33-42
-
-
Backhouse, J.1
Cheng, E.2
-
4
-
-
0033462687
-
Electronic trading and work transformation in the London Insurance Market
-
Barrett, M. & Walsham, G. (1999) Electronic trading and work transformation in the London Insurance Market. Information Systems Research, 10, 1-22.
-
(1999)
Information Systems Research
, vol.10
, pp. 1-22
-
-
Barrett, M.1
Walsham, G.2
-
5
-
-
6744247045
-
Logical controls specification: An approach to information systems security
-
Klein, H.K. & Kumar, K. (eds), Elsevier Science Publishers, Amsterdam, the Netherlands
-
Baskerville, R.L. (1989) Logical controls specification: an approach to information systems security. In: Systems Development for Human Progress, Klein, H.K. & Kumar, K. (eds), pp. 241-255. Elsevier Science Publishers, Amsterdam, the Netherlands.
-
(1989)
Systems Development for Human Progress
, pp. 241-255
-
-
Baskerville, R.L.1
-
6
-
-
0013324190
-
Risk analysis: An interpretive feasibility tool in justifying information systems security
-
Baskerville, R. (1991) Risk analysis: an interpretive feasibility tool in justifying information systems security. European Journal of Information Systems, 1, 121-130.
-
(1991)
European Journal of Information Systems
, vol.1
, pp. 121-130
-
-
Baskerville, R.1
-
7
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. (1993) Information systems security design methods: implications for information systems development. ACM Computing Surveys, 25, 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, pp. 375-414
-
-
Baskerville, R.1
-
10
-
-
0002114777
-
French and British top managers' understanding of the structure and the dynamics of their industries: A cognitive analysis and comparison
-
Calori, R., Johnson, G. & Sarnin, P. (1992) French and British top managers' understanding of the structure and the dynamics of their industries: a cognitive analysis and comparison. British Journal of Management, 3, 61-92.
-
(1992)
British Journal of Management
, vol.3
, pp. 61-92
-
-
Calori, R.1
Johnson, G.2
Sarnin, P.3
-
13
-
-
0013383661
-
-
Unpublished PhD thesis, University of California, Berkeley, CA, USA
-
Clements, D.P. (1977) Fuzzy ratings for computer security evaluation. Unpublished PhD thesis, University of California, Berkeley, CA, USA.
-
(1977)
Fuzzy Ratings for Computer Security Evaluation
-
-
Clements, D.P.1
-
14
-
-
0141903338
-
Operationalizing IT risk management
-
Coles, R.S. & Moulton, R. (2003) Operationalizing IT risk management. Computers and Security, 22, 487-493.
-
(2003)
Computers and Security
, vol.22
, pp. 487-493
-
-
Coles, R.S.1
Moulton, R.2
-
15
-
-
84973740945
-
Validating a method for mapping manager's mental models of competitive industry structures
-
Daniels, K., de Chernatony, L. & Johnson, G. (1995) Validating a method for mapping manager's mental models of competitive industry structures. Human Relations, 48, 975-991.
-
(1995)
Human Relations
, vol.48
, pp. 975-991
-
-
Daniels, K.1
De Chernatony, L.2
Johnson, G.3
-
17
-
-
0035063716
-
Violation of safeguards by trusted personnel and understanding related information security concerns
-
Dhillon, G. (2001) Violation of safeguards by trusted personnel and understanding related information security concerns. Computers and Security, 20, 165-172.
-
(2001)
Computers and Security
, vol.20
, pp. 165-172
-
-
Dhillon, G.1
-
18
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon, G. & Backhouse, J. (2001) Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal, 11, 127-153.
-
(2001)
Information Systems Journal
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
19
-
-
84904253615
-
Interpreting computer-related crime at the Malaria Research Center: A case study
-
Eloff, J.H.P., Labuschagne, L., Solms, R.V. & Dhillon, G. (eds), Kluwer Academic Publishers, Boston, MA, USA
-
Dhillon, G. & Silva (2001) Interpreting computer-related crime at the Malaria Research Center: a case study. In: Advances in Information Security Management & Small Systems Security, Eloff, J.H.P., Labuschagne, L., Solms, R.V. & Dhillon, G. (eds), pp. 167-182. Kluwer Academic Publishers, Boston, MA, USA.
-
(2001)
Advances in Information Security Management & Small Systems Security
, pp. 167-182
-
-
Dhillon, G.1
Silva2
-
20
-
-
0003834662
-
-
Irwin, Boston, MA, USA
-
Emory, C.W. & Cooper, D.R. (1991) Business Research Methods. Irwin, Boston, MA, USA.
-
(1991)
Business Research Methods
-
-
Emory, C.W.1
Cooper, D.R.2
-
24
-
-
7744232178
-
A practical solution to the complex human issues of information security design
-
Katsikas, S.K. & Gritzalis, D. (eds), Chapman & Hall, London, UK
-
Hitchings, J. (1996) A practical solution to the complex human issues of information security design. In: Information Systems Security: Facing the Information Society of the 21st Century, Katsikas, S.K. & Gritzalis, D. (eds), pp. 3-12. Chapman & Hall, London, UK.
-
(1996)
Information Systems Security: Facing the Information Society of the 21st Century
, pp. 3-12
-
-
Hitchings, J.1
-
25
-
-
0348139677
-
The use of RepGrids to gather data about information systems analysts
-
Hunter, M.G. (1997) The use of RepGrids to gather data about information systems analysts. Information Systems Journal, 7, 67-81.
-
(1997)
Information Systems Journal
, vol.7
, pp. 67-81
-
-
Hunter, M.G.1
-
26
-
-
84904363825
-
Content, context, process analysis of IS security policy formulation
-
Gritzalis, D., Vimercati, S.D.C., Samarati, P. & Katsikas, S. (eds), Kluwer Academic Publishers, Boston, MA, USA
-
Karyda, M., Kokolakis, S. & Kiountouzis, E. (2003) Content, context, process analysis of IS security policy formulation. In: Security and Privacy in the Age of Uncertainty, Gritzalis, D., Vimercati, S.D.C., Samarati, P. & Katsikas, S. (eds), pp. 145-156. Kluwer Academic Publishers, Boston, MA, USA.
-
(2003)
Security and Privacy in the Age of Uncertainty
, pp. 145-156
-
-
Karyda, M.1
Kokolakis, S.2
Kiountouzis, E.3
-
27
-
-
0003721855
-
-
Harvard University Press, Cambridge, MA, USA
-
Keeney, R.L. (1992) Value-Focused Thinking. Harvard University Press, Cambridge, MA, USA.
-
(1992)
Value-focused Thinking
-
-
Keeney, R.L.1
-
28
-
-
0001889434
-
Creativity in decision making with value-focused thinking
-
Keeney, R.L. (1994) Creativity in decision making with value-focused thinking. Sloan Management Review, 35, 33-41.
-
(1994)
Sloan Management Review
, vol.35
, pp. 33-41
-
-
Keeney, R.L.1
-
29
-
-
0032678626
-
The value of internet commerce to the customer
-
Keeney, R.L. (1999) The value of internet commerce to the customer. Management Science, 45, 533-542.
-
(1999)
Management Science
, vol.45
, pp. 533-542
-
-
Keeney, R.L.1
-
30
-
-
0024079032
-
Decision problem structuring: Generating options
-
Keller, L.R. & Ho, J.L. (1988) Decision problem structuring: Generating options. IEEE Transactions on Systems, Man, and Cybernetics, 18, 715-728.
-
(1988)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.18
, pp. 715-728
-
-
Keller, L.R.1
Ho, J.L.2
-
31
-
-
0001946339
-
A set of principles for conducting and evaluating interpretive field studies in information systems
-
Klein, H.K. & Myers, M.D. (1999) A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23, 67-94.
-
(1999)
MIS Quarterly
, vol.23
, pp. 67-94
-
-
Klein, H.K.1
Myers, M.D.2
-
32
-
-
0000518067
-
Electronic mail as a medium for rich communication: An empirical investigation using hermeneutic interpretation
-
Lee, A.S. (1994) Electronic mail as a medium for rich communication: an empirical investigation using hermeneutic interpretation. MIS Quarterly, 18, 143-157.
-
(1994)
MIS Quarterly
, vol.18
, pp. 143-157
-
-
Lee, A.S.1
-
33
-
-
0242552856
-
Applying double loop learning to interpret implications for information systems security design
-
Washington DC, October 5-8
-
Mattia, A. & Dhillon, G. (2003) Applying double loop learning to interpret implications for information systems security design. IEEE Systems, Man & Cybernetics Conference, Washington DC, October 5-8.
-
(2003)
IEEE Systems, Man & Cybernetics Conference
-
-
Mattia, A.1
Dhillon, G.2
-
34
-
-
1542493643
-
CASE tools as organizational change: Investigating incremental and radical changes in systems development
-
Orlikowski, W.J. (1993) CASE tools as organizational change: investigating incremental and radical changes in systems development. MIS Quarterly, 17, 309-340.
-
(1993)
MIS Quarterly
, vol.17
, pp. 309-340
-
-
Orlikowski, W.J.1
-
35
-
-
0028409472
-
Technological frames: Making sense of information technology in organisations
-
Orlikowski, W.J. & Gash, D.C. (1994) Technological frames: making sense of information technology in organisations. ACM Transactions on Information Systems, 12, 174-207.
-
(1994)
ACM Transactions on Information Systems
, vol.12
, pp. 174-207
-
-
Orlikowski, W.J.1
Gash, D.C.2
-
36
-
-
0001229464
-
Information technology and structuring of organizations
-
Orlikowski, W.J. & Robey, D. (1991) Information technology and structuring of organizations. Information Systems Research, 2, 143-169.
-
(1991)
Information Systems Research
, vol.2
, pp. 143-169
-
-
Orlikowski, W.J.1
Robey, D.2
-
37
-
-
0026715302
-
Developing an Expert System for tender enquiry evaluation: A case study
-
Phythian, G.J. & King, M. (1992) Developing an Expert System for tender enquiry evaluation: a case study. European Journal of Operational Research, 56, 15-29.
-
(1992)
European Journal of Operational Research
, vol.56
, pp. 15-29
-
-
Phythian, G.J.1
King, M.2
-
38
-
-
0346457562
-
Internet security and the case of Bank of America
-
Segev, A., Porra, J. & Roldan, M. (1998) Internet security and the case of Bank of America. Communications of the ACM, 41, 81-87.
-
(1998)
Communications of the ACM
, vol.41
, pp. 81-87
-
-
Segev, A.1
Porra, J.2
Roldan, M.3
-
41
-
-
0011644488
-
An analysis of the recent IS security development approaches: Descriptive and prescriptive implications
-
Dhillon, G. (ed.), Idea Group Publishing, Hershey, PA, USA
-
Siponen, M.T. (2001) An analysis of the recent IS security development approaches: descriptive and prescriptive implications. In: Information Security Management: Global Challenges in the New Millennium, Dhillon, G. (ed.), pp. 101-124. Idea Group Publishing, Hershey, PA, USA.
-
(2001)
Information Security Management: Global Challenges in the New Millennium
, pp. 101-124
-
-
Siponen, M.T.1
-
42
-
-
30744438863
-
An analysis of the traditional IS security approaches: Implications for research and practice
-
Siponen, M.T. (2005) An analysis of the traditional IS security approaches: implications for research and practice. European Journal of Information Systems, 14, 303-315.
-
(2005)
European Journal of Information Systems
, vol.14
, pp. 303-315
-
-
Siponen, M.T.1
-
43
-
-
0012964571
-
The dynamics of individual and organizational knowledge
-
Eden, C. & Spender, J.C. (eds), Sage, London, UK
-
Spender, J.C. (1998) The dynamics of individual and organizational knowledge. In: Managerial and Organizational Cognition. Eden, C. & Spender, J.C. (eds), pp. 13-39. Sage, London, UK.
-
(1998)
Managerial and Organizational Cognition.
, pp. 13-39
-
-
Spender, J.C.1
-
44
-
-
0001133137
-
Coping with systems risks: Security planning models for management decision making
-
Straub, D.W. & Welke, R.J. (1998) Coping with systems risks: security planning models for management decision making. MIS Quarterly, 22, 441-469.
-
(1998)
MIS Quarterly
, vol.22
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
45
-
-
0037707050
-
The repertory grid technique: A method for the study of cognition in information systems
-
Tan, F.B. & Hunter, M.G. (2002) The repertory grid technique: a method for the study of cognition in information systems. MIS Quarterly, 26, 39-57.
-
(2002)
MIS Quarterly
, vol.26
, pp. 39-57
-
-
Tan, F.B.1
Hunter, M.G.2
-
46
-
-
0036015964
-
Measuring factors that influence the success of internet commerce
-
Torkzadeh, G. & Dhillon, G. (2002) Measuring factors that influence the success of internet commerce. Information Systems Research, 13, 187-204.
-
(2002)
Information Systems Research
, vol.13
, pp. 187-204
-
-
Torkzadeh, G.1
Dhillon, G.2
-
47
-
-
0034926180
-
A framework for implementation of socio-ethical controls in information security
-
Trompeter, C.M. & Eloff, J.H.P. (2001) A framework for implementation of socio-ethical controls in information security. Computers and Security, 20, 384-391.
-
(2001)
Computers and Security
, vol.20
, pp. 384-391
-
-
Trompeter, C.M.1
Eloff, J.H.P.2
-
49
-
-
84974872728
-
Interpretive case studies in IS research: Nature and method
-
Walsham, G. (1995) Interpretive case studies in IS research: nature and method. European Journal of Information Systems, 4, 74-81.
-
(1995)
European Journal of Information Systems
, vol.4
, pp. 74-81
-
-
Walsham, G.1
-
50
-
-
0028408489
-
Information systems strategy and implementation: A case study of a building society
-
Walsham, G. & Waema, T. (1994) Information systems strategy and implementation: a case study of a building society. ACM Transactions on Information Systems, 12, 150-173.
-
(1994)
ACM Transactions on Information Systems
, vol.12
, pp. 150-173
-
-
Walsham, G.1
Waema, T.2
-
52
-
-
9744222159
-
Organizations as cognitive maps: Charting ways of success and failure
-
Weick, K.E. (ed.), Blackwell Publishers, Maiden, MA, USA
-
Weick, K.E. & Bougon, M.G. (2001) Organizations as cognitive maps: charting ways of success and failure. In: Making Sense of the Organization, Weick, K.E. (ed.), pp. 308-329. Blackwell Publishers, Maiden, MA, USA.
-
(2001)
Making Sense of the Organization
, pp. 308-329
-
-
Weick, K.E.1
Bougon, M.G.2
-
53
-
-
0036015966
-
NEBIC: A dynamic capabilities theory for assessing net-enablement
-
Wheeler, B.C. (2002) NEBIC: a dynamic capabilities theory for assessing net-enablement. Information Systems Research, 13, 125-146.
-
(2002)
Information Systems Research
, vol.13
, pp. 125-146
-
-
Wheeler, B.C.1
-
57
-
-
0040431304
-
Data mining for network Intrusion Detection: A comparison of alternative methods
-
Zhu, D., Premkumar, G., Zhang, X. & Chu, C. (2001) Data mining for network Intrusion Detection: a comparison of alternative methods. Decision Sciences, 32, 1-26.
-
(2001)
Decision Sciences
, vol.32
, pp. 1-26
-
-
Zhu, D.1
Premkumar, G.2
Zhang, X.3
Chu, C.4
|