-
1
-
-
0026284650
-
A method of analyzing interview transcripts in qualitative research
-
Burnard, P. "A method of analyzing interview transcripts in qualitative research." Nurse Education Today, 1991, 11, 461-466.
-
(1991)
Nurse Education Today
, vol.11
, pp. 461-466
-
-
Burnard, P.1
-
2
-
-
0028411682
-
Searching for meaning: A method of analyzing interview transcripts with a personal computer
-
Burnard, P. "Searching for meaning: a method of analyzing interview transcripts with a personal computer." Nurse Education Today, 1994, 14, 111-117.
-
(1994)
Nurse Education Today
, vol.14
, pp. 111-117
-
-
Burnard, P.1
-
4
-
-
1542366037
-
-
mimeo
-
Chatterjee, K., Morton, S. and Mukherji, A., "Strategic Audit Policies Without Commitment", 1999, mimeo.
-
(1999)
Strategic Audit Policies Without Commitment
-
-
Chatterjee, K.1
Morton, S.2
Mukherji, A.3
-
6
-
-
4243121902
-
A framework for using insurance for cyber-risk management
-
Gordon, L.A., Loeb, M.P. and Sohail, T. "A Framework for Using Insurance For Cyber-Risk Management", Communication of the ACM, 2003, 46(3), 81-85.
-
(2003)
Communication of the ACM
, vol.46
, Issue.3
, pp. 81-85
-
-
Gordon, L.A.1
Loeb, M.P.2
Sohail, T.3
-
8
-
-
28044471695
-
-
Wiley, Hoboken, NJ
-
Hunton, J.E., Bryant, S.M., and Bagranoff, N.A., Core Concepts of Information Technology Auditing, Wiley, Hoboken, NJ, 2004.
-
(2004)
Core Concepts of Information Technology Auditing
-
-
Hunton, J.E.1
Bryant, S.M.2
Bagranoff, N.A.3
-
9
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic A.G. and Clark, G.J., "Why there aren't more information security research studies", Information & Management, 2004, 41, 597-607.
-
(2004)
Information & Management
, vol.41
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, G.J.2
-
11
-
-
0000481870
-
Qualitative research in information systems
-
June
-
Myers, M.D. "Qualitative Research in Information Systems", MISQ Discovery, June 1997.
-
(1997)
MISQ Discovery
-
-
Myers, M.D.1
-
12
-
-
84984735255
-
Exemplifying interpretive research in information systems: An overview
-
December
-
Myers, M.D. & Walsham, G. "Exemplifying interpretive research in information systems: an overview", Journal of Information Technology, December 1998, 13 (4), 233-234.
-
(1998)
Journal of Information Technology
, vol.13
, Issue.4
, pp. 233-234
-
-
Myers, M.D.1
Walsham, G.2
-
16
-
-
33749645248
-
-
Auerbach Publications, Boston, MA
-
Senft, S., Daniel, P., Ph.D. Manson, Gonzales, C., and Gallegos, F., Information Technology Control and Audit, Second Edition, Auerbach Publications, Boston, MA, 2004.
-
(2004)
Information Technology Control and Audit, Second Edition
-
-
Senft, S.1
Daniel, P.2
Manson, Ph.D.3
Gonzales, C.4
Gallegos, F.5
-
17
-
-
33749642956
-
A critical discussion of risk and threat analysis methods and methodologies
-
Vidalis, S., "A Critical Discussion of Risk and Threat Analysis Methods and Methodologies", School of Computing Technical Report CS-04-03, 2004.
-
(2004)
School of Computing Technical Report
, vol.CS-04-03
-
-
Vidalis, S.1
|