-
1
-
-
33749469503
-
-
Software Engineering Institute Carnegie Mellon
-
Allen, J., Gabbard, D. and May, C. (2003), Outsourcing Managed Security Services Authors, Software Engineering Institute, Carnegie Mellon.
-
(2003)
Outsourcing Managed Security Services Authors
-
-
Allen, J.1
Gabbard, D.2
May, C.3
-
3
-
-
33749473070
-
-
EG-Datenschutzrichtlinie-Kommentar
-
Dammann, U. and Simitis, S. (1997), EG-Datenschutzrichtlinie-Kommentar.
-
(1997)
-
-
Dammann, U.1
Simitis, S.2
-
6
-
-
0002698747
-
"Information system security management in the new millennium"
-
Dhillon, G. and Backhouse, J. (2000), "Information system security management in the new millennium", Communications of the ACM, Vol. 43 No. 7, pp. 125-8.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
7
-
-
3142720692
-
-
DTI Technical Report, Department of Trade and Industry, London
-
DTI (2004), Information Security Breaches Survey 2004, Technical Report, Department of Trade and Industry, London.
-
(2004)
Information Security Breaches Survey 2004
-
-
-
8
-
-
0003187764
-
"Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data"
-
EUDP November 23
-
EUDP (1995), "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data", Official Journal L 281, November 23 1995, pp. 31-50.
-
(1995)
Official Journal L 281
, pp. 31-50
-
-
-
9
-
-
33749499781
-
"Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services"
-
EUEC in particular electronic commerce, in the internal market (Directive on electronic commerce)
-
EUEC (2000), "Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services", in particular electronic commerce, in the internal market (Directive on electronic commerce).
-
(2000)
-
-
-
11
-
-
85138687950
-
"A content-analytic longitudinal study of the drivers for information technology and systems sourcing"
-
Goo, J., Kishore, R. and Rao, H. (2000), "A content-analytic longitudinal study of the drivers for information technology and systems sourcing", Proceedings of the 21st International Conference on Information Systems, Brisbane, Queensland, Australia, December 10-13, pp. 601-11.
-
(2000)
Proceedings of the 21st International Conference on Information Systems, Brisbane, Queensland, Australia, December 10-13
, pp. 601-611
-
-
Goo, J.1
Kishore, R.2
Rao, H.3
-
12
-
-
33749480819
-
"Companies are at risk from staff ignorance"
-
00104787, January
-
Goodwin, B. (2004), "Companies are at risk from staff ignorance", Computer Weekly, 00104787, January 27.
-
(2004)
Computer Weekly
-
-
Goodwin, B.1
-
13
-
-
33749466714
-
-
Kluwer Law International Holvast, J. Looseleaf (Eds) Kluwer Law International, Looseleaf
-
Holvast, J., Madsen, W. and Roth, P. (Eds) (2000), The Global Encyclopaedia of Data Protection Regulation, Kluwer Law International, Looseleaf.
-
(2000)
The Global Encyclopaedia of Data Protection Regulation
-
-
-
14
-
-
0010020108
-
-
Prentice-Hall New York, NY
-
Kern, T., Lacity, M. and Willcocks, L. (2002), Netsourcing: Renting Business Applications and Services over a Network, Prentice-Hall, New York, NY.
-
(2002)
Netsourcing: Renting Business Applications and Services over a Network
-
-
Kern, T.1
Lacity, M.2
Willcocks, L.3
-
15
-
-
1242265180
-
"Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors"
-
Khalfan, A. (2004), "Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors", International Journal of Information Management, Vol. 24, pp. 29-42.
-
(2004)
International Journal of Information Management
, vol.24
, pp. 29-42
-
-
Khalfan, A.1
-
16
-
-
0042699893
-
"Critical success factors for IS outsourcing implementation from an interorganizational relationship perspective"
-
Kim, S. and Chung, Y. (2003), "Critical success factors for IS outsourcing implementation from an interorganizational relationship perspective", Journal of Computing Information Systems, Vol. 43 No. 4, pp. 81-90.
-
(2003)
Journal of Computing Information Systems
, vol.43
, Issue.4
, pp. 81-90
-
-
Kim, S.1
Chung, Y.2
-
17
-
-
0001544691
-
"An empirical investigation of information technology sourcing practices: Lessons from experience"
-
Lacity, M.C. and Willcocks, L. (1998), "An empirical investigation of information technology sourcing practices: Lessons from experience", Management Information Systems Quarterly, Vol. 22 No. 3, pp. 363-408.
-
(1998)
Management Information Systems Quarterly
, vol.22
, Issue.3
, pp. 363-408
-
-
Lacity, M.C.1
Willcocks, L.2
-
18
-
-
0033745439
-
"Implementing Information Security in the 21st century - Do you have the balancing factors?"
-
Nosworthy, J. (2000), "Implementing Information Security in the 21st century - do you have the balancing factors?", Computers and Security, Vol. 19, pp. 337-47.
-
(2000)
Computers and Security
, vol.19
, pp. 337-347
-
-
Nosworthy, J.1
-
19
-
-
33749503454
-
"Information security policy framework: Best practices for security policy in the e-commerce age"
-
May/June
-
Palmer, M. (2001), "Information security policy framework: Best practices for security policy in the e-commerce age", Information Systems Security, May/June, pp. 13-27.
-
(2001)
Information Systems Security
, pp. 13-27
-
-
Palmer, M.1
-
20
-
-
10444277377
-
"IS/IT outsourcing practices of small- and medium-sized manufacturers"
-
Rohde, F. (2004), "IS/IT outsourcing practices of small- and medium-sized manufacturers", International Journal of Accounting Information Systems, Vol. 5, pp. 429-51.
-
(2004)
International Journal of Accounting Information Systems
, vol.5
, pp. 429-451
-
-
Rohde, F.1
-
21
-
-
33749481190
-
-
Sarbanes Oxley Act H. R.3763
-
Sarbanes Oxley Act (2002), H. R.3763.
-
(2002)
-
-
-
22
-
-
33749454104
-
Kommentar zum Bundesdatenschutzgesetz
-
Simitis, S. (Ed.) Baden-Baden
-
Simitis, S. (Ed.) (2003), Kommentar zum Bundesdatenschutzgesetz, Baden-Baden.
-
(2003)
-
-
-
23
-
-
0033683516
-
"A conceptual foundation for organizational information security awareness"
-
Siponen, M. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
24
-
-
0034989368
-
"Corporate governance and information security"
-
Von Solms, B. (2001), "Corporate governance and information security", Computers and Security, Vol. 20, pp. 215-8.
-
(2001)
Computers and Security
, vol.20
, pp. 215-258
-
-
Von Solms, B.1
-
25
-
-
27644470057
-
"Outsourced security - The benefits and risks"
-
October
-
Whitworth, M. (2005), "Outsourced security - the benefits and risks", Network Security, October, pp. 16-19.
-
(2005)
Network Security
, pp. 16-19
-
-
Whitworth, M.1
-
26
-
-
0033737739
-
"A decision model for IS outsourcing"
-
Yang, C. and Huang, J. (2000), "A decision model for IS outsourcing", International Journal of Information Management, Vol. 20 No. 3, pp. 225-39.
-
(2000)
International Journal of Information Management
, vol.20
, Issue.3
, pp. 225-239
-
-
Yang, C.1
Huang, J.2
-
28
-
-
21644454941
-
"Popular concepts and the business management press"
-
Rüling, C. (2005), "Popular concepts and the business management press", Scandinavian Journal of Managament, Vol. 21, pp. 177-95.
-
(2005)
Scandinavian Journal of Managament
, vol.21
, pp. 177-195
-
-
Rüling, C.1
|