-
1
-
-
0004605984
-
"Risk analysis for information systems"
-
Birch, D.G.W. and McEvoy, N.A. (1992), "Risk analysis for information systems", Journal of Information Technology, Vol. 7, pp. 44-53.
-
(1992)
Journal of Information Technology
, vol.7
, pp. 44-53
-
-
Birch, D.G.W.1
McEvoy, N.A.2
-
6
-
-
84993043242
-
"The Ernst & Young international information security survey 1995"
-
Ernst & Young (1996), "The Ernst & Young international information security survey 1995", Information Management & Computer Security, Vol. 4 No. 4, pp. 26-33.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.4
, pp. 26-33
-
-
Ernst1
Young2
-
9
-
-
0042363355
-
"The application of information security policies in large UK-based organizations: An exploratory investigation"
-
Fulford, H. and Doherty, N.F. (2003), "The application of information security policies in large UK-based organizations: An exploratory investigation", Information Management & Computer Security, Vol. 11 No. 3, pp. 106-14.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
10
-
-
4243121902
-
"A framework for using insurance for cyber risk management"
-
Gordon, L.A., Gordon, M.P.L. and Sohail, T. (2003), "A framework for using insurance for cyber risk management", Communciations of the ACM, March, pp. 81-5.
-
(2003)
Communciations of the ACM
, pp. 81-85
-
-
Gordon, L.A.1
Gordon, M.P.L.2
Sohail, T.3
-
11
-
-
0001823869
-
"Security concerns of system users: A study of perceptions of the adequacy of security"
-
Goodhue, D.L. and Straub, D.W. (1991), "Security concerns of system users: A study of perceptions of the adequacy of security", Information & Management, Vol. 20, pp. 13-22.
-
(1991)
Information & Management
, vol.20
, pp. 13-22
-
-
Goodhue, D.L.1
Straub, D.W.2
-
12
-
-
24144453387
-
"Information systems security issues and decisions for small business"
-
Gupta, A. and Hammond, R. (2005), "Information systems security issues and decisions for small business", Information Management & Computer Security, Vol. 13 No. 4, pp. 297-310.
-
(2005)
Information Management & Computer Security
, vol.13
, Issue.4
, pp. 297-310
-
-
Gupta, A.1
Hammond, R.2
-
13
-
-
0037228072
-
"The law, cybercrime, risk assessment and cyber protection"
-
Hinde, S. (2003), "The law, cybercrime, risk assessment and cyber protection", Computers and Security, Vol. 22 No. 2, pp. 90-5.
-
(2003)
Computers and Security
, vol.22
, Issue.2
, pp. 90-95
-
-
Hinde, S.1
-
14
-
-
0004265173
-
-
O'Reilly & Associates, Inc. Sebastopol, CA
-
Icove, D., Seger, K. and Vonstorch, W. (1999), Computer Crime - A Crimefighter's Handbook, O'Reilly & Associates, Inc., Sebastopol, CA.
-
(1999)
Computer Crime - A Crimefighter's Handbook
-
-
Icove, D.1
Seger, K.2
Vonstorch, W.3
-
15
-
-
0001366346
-
"Information technology and corporate strategy: A view from the top"
-
Jarvenpaa, S.L. and Ives, B. (1990), "Information technology and corporate strategy: A view from the top", Information Systems Research, Vol. 1 No. 4, pp. 351-75.
-
(1990)
Information Systems Research
, vol.1
, Issue.4
, pp. 351-375
-
-
Jarvenpaa, S.L.1
Ives, B.2
-
16
-
-
0035479209
-
"Securtity threats to internet: A Korean multi-industry investigation"
-
Jung, B., Han, I. and Lee, S. (2001), "Securtity threats to internet: A Korean multi-industry investigation", Information & Management, Vol. 38, pp. 487-98.
-
(2001)
Information & Management
, vol.38
, pp. 487-498
-
-
Jung, B.1
Han, I.2
Lee, S.3
-
17
-
-
0037400028
-
"An integrative study of information systems security effectiveness"
-
Kankanhalli, A., Teo, H.-H., Tan, B.C.Y. and Wei, K.-K. (2003), "An integrative study of information systems security effectiveness", International Journal of Information Management, Vol. 23, pp. 139-54.
-
(2003)
International Journal of Information Management
, vol.23
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.-H.2
Tan, B.C.Y.3
Wei, K.-K.4
-
18
-
-
15844405077
-
"Information security threats and practices in small businesses"
-
Spring
-
Keller, S., Powell, A., Horstmann, B., Predmore, C. and Crawford, M. (2005), "Information security threats and practices in small businesses", Information Systems Management, Spring, pp. 7-19.
-
(2005)
Information Systems Management
-
-
Keller, S.1
Powell, A.2
Horstmann, B.3
Predmore, C.4
Crawford, M.5
-
19
-
-
0002904380
-
"Organizational characteristics and information systems planning: An empirical study"
-
King, W.R. (1994), "Organizational characteristics and information systems planning: An empirical study", Information Systems Research, Vol. 5 No. 2, pp. 75-109.
-
(1994)
Information Systems Research
, vol.5
, Issue.2
, pp. 75-109
-
-
King, W.R.1
-
20
-
-
0000133760
-
"Threats to information systems: Today's reality, yesterday's understanding"
-
Loch, K.D., Carr, H.H. and Warkentin, M.E. (1992), "Threats to information systems: Today's reality, yesterday's understanding", MIS Quarterly, Vol. 16 No. 2, pp. 173-86.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
21
-
-
0018012506
-
"Management policies and procedures needed for effective computer security"
-
Fall
-
Madnick, E.S. (1978), "Management policies and procedures needed for effective computer security", Sloan Management Review, Fall, pp. 61-74.
-
(1978)
Sloan Management Review
, pp. 61-74
-
-
Madnick, E.S.1
-
23
-
-
0028713556
-
"Development of security policies"
-
Ølnes, J. (1994), "Development of security policies", Computers & Security, Vol. 13, pp. 628-36.
-
(1994)
Computers & Security
, vol.13
, pp. 628-636
-
-
Ølnes, J.1
-
26
-
-
10644289334
-
-
Posthumus, S. and von Solms, R. (2004), "A framework for the governance of information security", Computer & Security, Vol. 23, pp. 638-46.
-
(2004)
Computer & Security
, vol.23
, pp. 638-646
-
-
Posthumus, S.1
von Solms, R.2
-
27
-
-
85038760958
-
"Risk analysis for information technology"
-
Summer
-
Rainer, R.K. Jr, Snyderr, C.A. and Carr, H.H. 1991, "Risk analysis for information technology", Journal of Management Information Systems, Summer, pp. 192-7.
-
(1991)
Journal of Management Information Systems
, pp. 192-197
-
-
Rainer Jr., R.K.1
Snyderr, C.A.2
Carr, H.H.3
-
28
-
-
84947221464
-
"Cyber-risk management: Technical and insurance controls for enterprise-level security"
-
Siegel, C.A., Sagalow, T.R. and Serritella, P. (2002), "Cyber-risk management: Technical and insurance controls for enterprise-level security", Security Management Practices, September/October, pp. 33-49.
-
(2002)
Security Management Practices
, pp. 33-49
-
-
Siegel, C.A.1
Sagalow, T.R.2
Serritella, P.3
-
29
-
-
0013417738
-
"Computer abuse and computer security: Update on an empirical study"
-
Straub, D.W. (1986), "Computer abuse and computer security: Update on an empirical study", Security, Audit, and Control Review, Vol. 4 No. 2, pp. 21-31.
-
(1986)
Security, Audit, and Control Review
, vol.4
, Issue.2
, pp. 21-31
-
-
Straub, D.W.1
-
30
-
-
0000280419
-
" Effective IS security: An empirical study"
-
Straub, D.W. (1990), " Effective IS security: An empirical study", Information Systems Research, Vol. 1 No. 3, pp. 255-76.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
31
-
-
0002699431
-
"Discovering and disciplining computer abuse in organization: A field study"
-
Straub, D.W. and Nance, W.D. (1990), "Discovering and disciplining computer abuse in organization: A field study", MIS Quarterly, March, pp. 45-55.
-
(1990)
MIS Quarterly
, pp. 45-55
-
-
Straub, D.W.1
Nance, W.D.2
-
32
-
-
0001133137
-
"Coping with systems risk: Security planning models for management decision making"
-
Straub, D.W. and Welke, R.J. (1998), "Coping with systems risk: security planning models for management decision making", MIS Quarterly, December, pp. 441-69.
-
(1998)
MIS Quarterly
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
33
-
-
0242517401
-
"Information security awareness: Educating your users effectively"
-
Thomson, M.E. and von Solms, R. (1998), "Information security awareness: Educating your users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
von Solms, R.2
-
34
-
-
0030377647
-
"Information security management: The second generation"
-
Von Solms, R. (1996), "Information security management: The second generation", Computers & Security, Vol. 15 No. 4, pp. 281-8.
-
(1996)
Computers & Security
, vol.15
, Issue.4
, pp. 281-288
-
-
Von Solms, R.1
-
35
-
-
3042812983
-
"The 10 deadly sins of information security management"
-
Von Solms, B. and von Solms, R. (2004), "The 10 deadly sins of information security management", Computer & Security, Vol. 23, pp. 371-6.
-
(2004)
Computer & Security
, vol.23
, pp. 371-376
-
-
Von Solms, B.1
von Solms, R.2
-
36
-
-
0141917862
-
"A framework for information security evaluation"
-
Von Solms, R., van de Haar, H., von Solms, S.H. and Caelli, W.J. (1994), "A framework for information security evaluation", Information & Management, Vol. 26, pp. 143-53.
-
(1994)
Information & Management
, vol.26
, pp. 143-153
-
-
Von Solms, R.1
van de Haar, H.2
von Solms, S.H.3
Caelli, W.J.4
-
37
-
-
2342475711
-
"Towards information security behavioural compliance"
-
Vroom, C. and von Solms, R. (2004), "Towards information security behavioural compliance", Computers & Security, Vol. 23, pp. 191-8.
-
(2004)
Computers & Security
, vol.23
, pp. 191-198
-
-
Vroom, C.1
von Solms, R.2
-
38
-
-
85127993111
-
-
CRC Press Boca Raton, FL
-
White, G.B., Fisch, E.A. and Pooch, U.W. (1996), Computer System and Network Security, CRC Press, Boca Raton, FL.
-
(1996)
Computer System and Network Security
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
39
-
-
1242265154
-
"In defense of the realm: Understanding the threats to information security"
-
Whitman, M.E. (2004), "In defense of the realm: Understanding the threats to information security", International Journal of Information Management, Vol. 24, pp. 43-57.
-
(2004)
International Journal of Information Management
, vol.24
, pp. 43-57
-
-
Whitman, M.E.1
|