-
2
-
-
33745869216
-
Security starts from within
-
July
-
Connolly, P.J. (2000), “Security starts from within”, Infoworld, July, pp. 39-40.
-
(2000)
Infoworld
, pp. 39-40
-
-
Connolly, P.J.1
-
3
-
-
23044525969
-
Current directions in IS security research: towards socio-organizational perspectives
-
Dhillon, G. and Backhouse, J. (2001), “Current directions in IS security research: towards socio-organizational perspectives”, Information Systems Journal, Vol. 11, pp. 127-53.
-
(2001)
Information Systems Journal
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
5
-
-
0042363355
-
The application of information security policies in large UK-based organizations: an exploratory investigation
-
Fulford, H. and Doherty, N.F. (2003), “The application of information security policies in large UK-based organizations: an exploratory investigation”, Information Management & Computer Security, Vol. 11 No. 3, pp. 106-14.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
6
-
-
35048850098
-
The experimental analysis of information security management issues for online financial services
-
Gupta, M., Chaturvedi, A.R., Mehta, S. and Valeri, L. (2000), “The experimental analysis of information security management issues for online financial services”, Proceedings of the Twenty First International Conference on Information Systems, Brisbane, Australia.
-
(2000)
Proceedings of the Twenty First International Conference on Information Systems, Brisbane, Australia
-
-
Gupta, M.1
Chaturvedi, A.R.2
Mehta, S.3
Valeri, L.4
-
7
-
-
0036299585
-
Security survey spring crop
-
Hinde, S. (2002), “Security survey spring crop”, Computers & Security, Vol. 21 No. 4, pp. 310-21.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 310-321
-
-
Hinde, S.1
-
8
-
-
0036330173
-
Information security policy – what do international information security standards say?
-
Höne, K. and Eloff, J.H.P. (2002a), “Information security policy – what do international information security standards say?”, Computers & Security, Vol. 21 No. 5, pp. 402-9.
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Höne, K.1
Eloff, J.H.P.2
-
9
-
-
0036613095
-
What makes an effective information security policy?
-
Höne, K. and Eloff, J.H.P. (2002b), “What makes an effective information security policy?”, Network Security, Vol. 6, pp. 14-16.
-
(2002)
Network Security
, vol.6
, pp. 14-16
-
-
Höne, K.1
Eloff, J.H.P.2
-
10
-
-
0345327795
-
An integrated system theory of information security management
-
Hong, K.S., Chi, Y.P., Chao, L.R. and Tang, J.H. (2003), “An integrated system theory of information security management”, Information Management & Computer Security, Vol. 11 No. 5, pp. 243-8.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.5
, pp. 243-248
-
-
Hong, K.S.1
Chi, Y.P.2
Chao, L.R.3
Tang, J.H.4
-
12
-
-
0032632869
-
Policy groups
-
Kühnhauser, W.E. (1999), “Policy groups”, Computers & Security, Vol. 18 No. 4, pp. 351-63.
-
(1999)
Computers & Security
, vol.18
, Issue.4
, pp. 351-363
-
-
Kühnhauser, W.E.1
-
13
-
-
0029545652
-
A new model for information security policies
-
Lindup, K.R. (1995), “A new model for information security policies”, Computers & Security, Vol. 14 No. 8, pp. 691-5.
-
(1995)
Computers & Security
, vol.14
, Issue.8
, pp. 691-695
-
-
Lindup, K.R.1
-
14
-
-
0000133760
-
Threats to information systems: today's reality, yesterday's understanding
-
Loch, K.D., Carr, H.H. and Warkentin, M.E. (1992), “Threats to information systems: today's reality, yesterday's understanding”, MIS Quarterly, Vol. 16 No. 2, pp. 173-86.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
15
-
-
0031636915
-
Auditing the IT security function
-
Osborne, K. (1998), “Auditing the IT security function”, Computers & Security, Vol. 17 No. 1, pp. 34-41.
-
(1998)
Computers & Security
, vol.17
, Issue.1
, pp. 34-41
-
-
Osborne, K.1
-
16
-
-
0031095932
-
Evaluating security threats in mainframe and client/server environments
-
Ryan, S.D. and Bordoloi, B. (1997), “Evaluating security threats in mainframe and client/server environments”, Information & Management, Vol. 32 No. 3, pp. 137-46.
-
(1997)
Information & Management
, vol.32
, Issue.3
, pp. 137-146
-
-
Ryan, S.D.1
Bordoloi, B.2
-
17
-
-
0036299647
-
The development of access control policies for information technology systems
-
Ward, P. and Smith, C.L. (2002), “The development of access control policies for information technology systems”, Computers & Security, Vol. 21 No. 4, pp. 356-71.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 356-371
-
-
Ward, P.1
Smith, C.L.2
|