-
1
-
-
12844250676
-
Multilevel Security: Reprise
-
O.S. Saydjari, "Multilevel Security: Reprise," IEEE Security & Privacy, vol. 2, no. 5, 2004, pp. 64-67.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 64-67
-
-
Saydjari, O.S.1
-
2
-
-
18744366536
-
Computer Security: Quality Rather than Quantity
-
R.T. Mercuri, "Computer Security: Quality Rather than Quantity," Comm. ACM, vol. 45, no. 10, 2002, pp. 12-14.
-
(2002)
Comm. ACM
, vol.45
, Issue.10
, pp. 12-14
-
-
Mercuri, R.T.1
-
3
-
-
0001133137
-
Coping with Systems Risk: Security Planning Models for Management Decision-Making
-
D.W Straub and R.J. Welke, "Coping with Systems Risk: Security Planning Models for Management Decision-Making," MIS Quarterly, vol. 22, no. 4, 1998, pp. 441-470.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-470
-
-
Straub, D.W.1
Welke, R.J.2
-
4
-
-
0002698747
-
Information Systems Security Management in the New Millennium
-
G. Dhillon and J. Backhouse, "Information Systems Security Management in the New Millennium," Comm. ACM, vol. 43, no. 7, 2000, pp. 125-128.
-
(2000)
Comm. ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
5
-
-
1842829828
-
-
Nat'l Inst. of Standards and Technology, US Dept of Commerce
-
G. Stoneburner, A. Goguen, and A. Feringa, "Risk Management Guide for Information Technology Systems," Nat'l Inst. of Standards and Technology, US Dept of Commerce, 2002; http://csrc.nist.gov/publications/ nistpubs/800-30/sp800-30.pdf.
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
7
-
-
4243198165
-
Enemy at the Gate: Threats to Information Security
-
M.E. Whitman, "Enemy at the Gate: Threats to Information Security," Comm. ACM, vol. 46, no. 8, 2003, pp. 91-95.
-
(2003)
Comm. ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
8
-
-
1242263532
-
Why There Aren't More Information Security Research Studies
-
A.G. Kotulic and J.G. Clark, "Why There Aren't More Information Security Research Studies," Information & Management, vol. 41, 2004, pp. 597-607.
-
(2004)
Information & Management
, vol.41
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
9
-
-
3042782049
-
What is Computer Security?
-
M. Bishop, "What is Computer Security?" IEEE Security & Privacy, vol. 1, no. 1, 2003, pp. 67-69.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 67-69
-
-
Bishop, M.1
-
10
-
-
33847703898
-
Riptech Internet Security Threat Report
-
T. Belchner et al., "Riptech Internet Security Threat Report," Riptech, 2002.
-
(2002)
Riptech
-
-
Belchner, T.1
-
11
-
-
33847750071
-
-
The Internet Business Disruptions Benchmark Report
-
"The Internet Business Disruptions Benchmark Report," Aberdeen Group, 2004; www.aberdeen.com/summary/report/benchmark/ibd.asp.
-
(2004)
Aberdeen Group
-
-
-
12
-
-
84990029315
-
The Economics of Information Security Investment
-
L.A. Gordon and M.P. Loeb, "The Economics of Information Security Investment," ACM Trans. Information and System Security, vol. 5, no. 4, 2002, pp. 438-457.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
13
-
-
0002373586
-
Total Quality Control
-
A.V. Feigenbaum, "Total Quality Control," Harvard Business Rev., vol. 34, no. 6, 1956, p. 93.
-
(1956)
Harvard Business Rev
, vol.34
, Issue.6
, pp. 93
-
-
Feigenbaum, A.V.1
|