-
2
-
-
0002587924
-
Skilled Incompetence
-
Argyris, C. (1986). “Skilled Incompetence,” Harvard Business Review, Vol. 64, No. 5, pp. 74–79.
-
(1986)
Harvard Business Review
, vol.64
, Issue.5
, pp. 74-79
-
-
Argyris, C.1
-
5
-
-
33751175322
-
A Taxonomy for Analyzing Hazards to Information Systems
-
Katsikas, S. and Gritzalis, D. (Eds.), London: Chapman & Hall
-
Baskerville, R. (1996). “A Taxonomy for Analyzing Hazards to Information Systems,” in Katsikas, S. and Gritzalis, D. (Eds.), Information Systems Security: Facing the Information Society, London: Chapman & Hall, pp. 167–176.
-
(1996)
Information Systems Security: Facing the Information Society
, pp. 167-176
-
-
Baskerville, R.1
-
7
-
-
85024255066
-
-
First Workshop on Evaluating and Architecting System Dependability (EASY ‘01), Goteborg, Sweden
-
Brown, A. B. and Patterson, D. A. (2001). “To Err is Human,” First Workshop on Evaluating and Architecting System Dependability (EASY ‘01), Goteborg, Sweden.
-
(2001)
To Err is Human
-
-
Brown, A.B.1
Patterson, D.A.2
-
8
-
-
0030701247
-
Information System Attacks: A Preliminary Classification Scheme
-
Cohen, F. (1997). “Information System Attacks: A Preliminary Classification Scheme,” Computers & Security, Vol. 16, No. 1, pp. 29–46.
-
(1997)
Computers & Security
, vol.16
, Issue.1
, pp. 29-46
-
-
Cohen, F.1
-
11
-
-
0007551808
-
Managing and controlling computer misuse
-
Dhillon, G. (1999). “Managing and controlling computer misuse,” Information Management & Computer Security, Vol. 7, No. 4, pp. 171–175.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.4
, pp. 171-175
-
-
Dhillon, G.1
-
12
-
-
0003335017
-
Challenges in Managing Information Security in the New Millennium
-
Dhillon, G. (Ed.), Hershey, PA: Idea Group Publishing
-
Dhillon, G. (2001a). “Challenges in Managing Information Security in the New Millennium,” in Dhillon, G. (Ed.), Information Security Management: Global Challenges in the New Millennium, Hershey, PA: Idea Group Publishing, pp. 1–8.
-
(2001)
Information Security Management: Global Challenges in the New Millennium
, pp. 1-8
-
-
Dhillon, G.1
-
13
-
-
0003335017
-
Principles for Managing Information Security in the New Millennium
-
Dhillon, G. (Ed.), Hershey, PA: Idea Group Publishing
-
Dhillon, G. (2001b). “Principles for Managing Information Security in the New Millennium,” in Dhillon, G. (Ed.), Information Security Management: Global Challenges in the New Millennium, Hershey, PA: Idea Group Publishing, pp. 173–177.
-
(2001)
Information Security Management: Global Challenges in the New Millennium
, pp. 173-177
-
-
Dhillon, G.1
-
14
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon, G. and Backhouse, J. (2000). “Information system security management in the new millennium,” Communications of the ACM, Vol. 43, No. 7, pp. 125–128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
15
-
-
23044525969
-
Current directions in IS security research: Towards socio organizational perspectives
-
Dhillon, G. and Backhouse, J. (2001). “Current directions in IS security research: Towards socio organizational perspectives.,” Information Systems Journal, Vol. 11, No. 2, pp. 127–153.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
19
-
-
85008048174
-
The Future of Systems Research
-
Hennessy, J. (1999). “The Future of Systems Research,” Computer, Vol. 32, No. 8, pp. 27–33.
-
(1999)
Computer
, vol.32
, Issue.8
, pp. 27-33
-
-
Hennessy, J.1
-
21
-
-
28044434952
-
-
(accessed August 2004)
-
Internet Systems Consortium, Inc. (2004). ISC Internet Domain Survey, http://www.isc.org/ds/(accessed August 2004)
-
(2004)
ISC Internet Domain Survey
-
-
-
22
-
-
0002039535
-
Diagnosing the human threats to information technology implementation: A missing factor in systems analysis illustrated in a case study
-
Levine, H. G. and Rossmoore, D. (1993). “Diagnosing the human threats to information technology implementation: A missing factor in systems analysis illustrated in a case study,” Journal of Management Information Systems, Vol. 10, No. 2, p. 55.
-
(1993)
Journal of Management Information Systems
, vol.10
, Issue.2
, pp. 55
-
-
Levine, H.G.1
Rossmoore, D.2
-
23
-
-
0000133760
-
Threats to Information Systems: Today's Reality, Yesterday's Understanding
-
Loch, K. D., Carr, H. H., and Warkentin, M. E. (1992). “Threats to Information Systems: Today's Reality, Yesterday's Understanding,” MIS Quarterly, Vol. 16, No. 2, p. 173.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
25
-
-
33751176377
-
Risks to the Public
-
No. 4
-
Neumann, P. (1992~1993). “Risks to the Public,” Software Engineering Notes, Vol. 17, No. 1, No. 4.
-
(1992)
Software Engineering Notes
, vol.17
, Issue.1
-
-
Neumann, P.1
-
29
-
-
84976800746
-
Design rules based on analysis of human error
-
Norman, D. (1983). “Design rules based on analysis of human error,” Communications of The ACM, Vol. 26, No. 4, pp. 254–258.
-
(1983)
Communications of The ACM
, vol.26
, Issue.4
, pp. 254-258
-
-
Norman, D.1
-
32
-
-
0022238997
-
Software Aspects of Strategic Defense Systems
-
Parnas, D. L. (1985). “Software Aspects of Strategic Defense Systems,” Communications of the ACM, Vol. 28, No. 12, pp. 1326–1335.
-
(1985)
Communications of the ACM
, vol.28
, Issue.12
, pp. 1326-1335
-
-
Parnas, D.L.1
-
33
-
-
0004015896
-
-
Definition, Techniques, and Case Studies: UC Berkeley Technical Report UCB/CSD-02-1175
-
Patterson, D. A., Brown, A. B., Broadwell, P., Candea, G., Chen, M., Cutler, J., Enriquez, P., Fox, A., Kiciman, E., Merzbacher, M., Oppenheimer, D., Sastry, N., Tetzlaff, W., Traupman, J., and Treuhaft, N. (2002). Recovery- Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies: UC Berkeley Technical Report UCB/CSD-02-1175.
-
(2002)
Recovery- Oriented Computing (ROC): Motivation
-
-
Patterson, D.A.1
Brown, A.B.2
Broadwell, P.3
Candea, G.4
Chen, M.5
Cutler, J.6
Enriquez, P.7
Fox, A.8
Kiciman, E.9
Merzbacher, M.10
Oppenheimer, D.11
Sastry, N.12
Tetzlaff, W.13
Traupman, J.14
Treuhaft, N.15
-
36
-
-
0004223940
-
-
Cambridge: Cambridge University Press
-
Reason, J. (1990). Human Error, Cambridge: Cambridge University Press.
-
(1990)
Human Error
-
-
Reason, J.1
-
38
-
-
0016555241
-
The protection of information in computer systems
-
Salter, J. H. and Schroeder, M. D. (1975). “The protection of information in computer systems,” Proceedings of the IEEE, Vol. 63, No. 9, pp. 1278 1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278 1308
-
-
Salter, J.H.1
Schroeder, M.D.2
-
39
-
-
0032223732
-
Differences between novice and expert systems analysts: What do we know and what do we do?
-
Schenk, K. D., Vitalari, N. P., and Davis, K. S. (1998). “Differences between novice and expert systems analysts: What do we know and what do we do?,” Journal of Management Information Systems, Vol. 15, No. 1, pp. 9–50.
-
(1998)
Journal of Management Information Systems
, vol.15
, Issue.1
, pp. 9-50
-
-
Schenk, K.D.1
Vitalari, N.P.2
Davis, K.S.3
-
41
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W. and Welke, R. J. (1998). “Coping with systems risk: Security planning models for management decision making,” Mis Quarterly, Vol. 22, No. 4, pp. 441–469.
-
(1998)
Mis Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
43
-
-
33751169682
-
Cyber Terrorism and the Contemporary Corporation
-
Dhillon, G. (Ed.), Hershey, PA: Idea Group Publishing
-
Warren, M. and Hutchinson, W. (2001). “Cyber Terrorism and the Contemporary Corporation,” in Dhillon, G. (Ed.), Information Security Management: Global Challenges in the New Millennium, Hershey, PA: Idea Group Publishing, pp. 53–64.
-
(2001)
Information Security Management: Global Challenges in the New Millennium
, pp. 53-64
-
-
Warren, M.1
Hutchinson, W.2
-
44
-
-
1242265154
-
In defense of the realm: Understanding the threats to information security
-
Whitman, M. E. (2004). “In defense of the realm: Understanding the threats to information security,” International Journal of Information Management, Vol. 24, No. 1, pp. 43–57.
-
(2004)
International Journal of Information Management
, vol.24
, Issue.1
, pp. 43-57
-
-
Whitman, M.E.1
|