-
2
-
-
14644419039
-
Enterprise system development in higher education
-
Chae, B., & Poole, M. S. (2005). Enterprise system development in higher education. Journal of Cases on Information Technology, 7(2), 82-101.
-
(2005)
Journal of Cases on Information Technology
, vol.7
, Issue.2
, pp. 82-101
-
-
Chae, B.1
Poole, M.S.2
-
3
-
-
85039135890
-
-
Freeh, J. L. (2000). Congressional testimony of FBI director on cybercrime. Testimony before the U.S. Senate Committee on Judiciary, Subcommittee for the Technology, Terrorism, and Government Information. Retrieved April 28, 2006, from http://www.fbi.gov/con-gress/congress00/ cyber032800.htm
-
Freeh, J. L. (2000). Congressional testimony of FBI director on "cybercrime." Testimony before the U.S. Senate Committee on Judiciary, Subcommittee for the Technology, Terrorism, and Government Information. Retrieved April 28, 2006, from http://www.fbi.gov/con-gress/congress00/ cyber032800.htm
-
-
-
-
4
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel, R., Gopal, R., & Goes, P. (2002). Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science 48(6), 749-764.
-
(2002)
Management Science
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
5
-
-
0013303131
-
A cop on the beat: Collecting and appraising intrusive evidence
-
Goan, T. (1999). A cop on the beat: Collecting and appraising intrusive evidence. Communications of the ACM, 42(7), 46-53.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 46-53
-
-
Goan, T.1
-
6
-
-
3242808612
-
-
Computer Security Institute, Retrieved April 28, 2006, from
-
Gordon, L. A., Martin, P. L., William, L., & Richardson, R. (2004). CSI/FBI computer crime and security survey. Computer Security Institute 2004. Retrieved April 28, 2006, from http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/ FBI2004.pdf
-
(2004)
CSI/FBI computer crime and security survey
-
-
Gordon, L.A.1
Martin, P.L.2
William, L.3
Richardson, R.4
-
7
-
-
36649033944
-
Guest editorial: Security management: Two sides of the same coin
-
Hale, J., & Brusil, P. J. (2004). Guest editorial: Security management: Two sides of the same coin. Journal of Network and Systems Management, 12(1), 1-8.
-
(2004)
Journal of Network and Systems Management
, vol.12
, Issue.1
, pp. 1-8
-
-
Hale, J.1
Brusil, P.J.2
-
9
-
-
15844405077
-
Information security threats and practices in small businesses
-
Keller, S., Powell, A., Horstmann, B., Predmore, C., & Crawford, M. (2005). Information security threats and practices in small businesses. Information Systems Management, 22(2), 7-20.
-
(2005)
Information Systems Management
, vol.22
, Issue.2
, pp. 7-20
-
-
Keller, S.1
Powell, A.2
Horstmann, B.3
Predmore, C.4
Crawford, M.5
-
12
-
-
85039136995
-
-
Levy, Y., & Ramim, M. (2004). Financing expensive technologies in an era of decreased funding: Think Big... Start Small... Build Fast... In C. Howard, K. Schuenk, & R. Discenza (Eds.), Distance learning and university effectiveness: Changing educational paradigms for online learning (pp. 278-301). Hershey, PA: Idea Group Publishing.
-
Levy, Y., & Ramim, M. (2004). Financing expensive technologies in an era of decreased funding: Think Big... Start Small... Build Fast... In C. Howard, K. Schuenk, & R. Discenza (Eds.), Distance learning and university effectiveness: Changing educational paradigms for online learning (pp. 278-301). Hershey, PA: Idea Group Publishing.
-
-
-
-
13
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of IT misuse
-
Magklaras, G. B., & Furnell, S. M. (2002). Insider threat prediction tool: Evaluating the probability of IT misuse. Computers & Security, 21(1), 62-73.
-
(2002)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
14
-
-
27544488062
-
Towards an understanding and definition of academic misconduct in online learning environments
-
April 7-9, Fort Lauderdale, Florida
-
Ramim, M. (2005, April 7-9). Towards an understanding and definition of academic misconduct in online learning environments. In Proceedings of IEEE SoutheastCon 2005 (pp. 641-650), Fort Lauderdale, Florida.
-
(2005)
Proceedings of IEEE SoutheastCon 2005
, pp. 641-650
-
-
Ramim, M.1
-
15
-
-
14644444165
-
Up in smoke: Rebuilding after an IT disaster
-
Ross, S. C., Tyran, C. K., Auer, D. J., Junell, J. M., & Williams, T. G. (2005). Up in smoke: Rebuilding after an IT disaster. Journal of Cases on Information Technology, 7(2), 31-49.
-
(2005)
Journal of Cases on Information Technology
, vol.7
, Issue.2
, pp. 31-49
-
-
Ross, S.C.1
Tyran, C.K.2
Auer, D.J.3
Junell, J.M.4
Williams, T.G.5
-
16
-
-
0000052619
-
Authentication, access control, and audit
-
Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys, 28(1), 241-243.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.1
, pp. 241-243
-
-
Sandhu, R.1
Samarati, P.2
-
17
-
-
85021950441
-
Secure audit logs to support computer forensics
-
Schneier, B., & Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security, 2(2), 159-176.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
18
-
-
33846215366
-
IDS products lead sales surge
-
Schultz, E. (2003). IDS products lead sales surge. Computers & Security, 22(8), 660.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 660
-
-
Schultz, E.1
-
19
-
-
33846212986
-
Managing information security on a shoestring budget
-
Sridhar, V., & Bhasker, B. (2003). Managing information security on a shoestring budget. Annals of Cases on Information Technology, 5(1), 151-167.
-
(2003)
Annals of Cases on Information Technology
, vol.5
, Issue.1
, pp. 151-167
-
-
Sridhar, V.1
Bhasker, B.2
-
21
-
-
85039135598
-
-
U.S. Department of Justice, Retrieved April 28, 2006, from
-
U.S. Department of Justice. (2002). Fraud and related activity in connection with computers. Retrieved April 28, 2006, from http://www.usdoj.gov/ criminal/cybercrime/1030_new.html
-
(2002)
Fraud and related activity in connection with computers
-
-
-
22
-
-
11144307987
-
-
Wang, B., & Paper, D. (2005). A case of an IT-enabled organizational change intervention: The missing pieces. Journal of Cases on Information Technology, 7(1), 34-52.
-
Wang, B., & Paper, D. (2005). A case of an IT-enabled organizational change intervention: The missing pieces. Journal of Cases on Information Technology, 7(1), 34-52.
-
-
-
-
23
-
-
4243171424
-
Can e-learning replace classroom learning?
-
Zhang, D. J., Zhao, L., Zhou, L., & Nunamaker, J. F. (2004). Can e-learning replace classroom learning? Communications of the ACM, 47(5), 75-79.
-
(2004)
Communications of the ACM
, vol.47
, Issue.5
, pp. 75-79
-
-
Zhang, D.J.1
Zhao, L.2
Zhou, L.3
Nunamaker, J.F.4
|