-
1
-
-
0035995871
-
Security in the information systems curriculum: Identification and status of relevant issues
-
Anderson, J. E. and Schwager, P. H., "Security in the information systems curriculum: Identification and status of relevant issues," Journal of Computer Information Systems, (42:3), 2002, pp. 16-24.
-
(2002)
Journal of Computer Information Systems
, vol.42
, Issue.3
, pp. 16-24
-
-
Anderson, J.E.1
Schwager, P.H.2
-
2
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
Aytes, K. and Connolly T., "Computer security and risky computing practices: A rational choice perspective," Journal of Organizational and End User Computing, (16:3), 2004, pp. 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
3
-
-
34249741951
-
Computer worm threat escalates,
-
August 19
-
Bank, D., "Computer worm threat escalates," Wall Street Journal, August 19, 2005, pp. B4.
-
(2005)
Wall Street Journal
-
-
Bank, D.1
-
4
-
-
0035551934
-
Entry-level if job skills: A survey of employers
-
Cappel, J., "Entry-level if job skills: a survey of employers," Journal of Computer Information Systems, (42:2), 2001/2002, pp. 76-83.
-
(2001)
Journal of Computer Information Systems
, vol.42
, Issue.2
, pp. 76-83
-
-
Cappel, J.1
-
5
-
-
84876632761
-
-
CERT/CC Statistics 1988-2005, http://www.cert.org/stats/cert_stats.html, 2005, accessed April 18, 2006.
-
CERT/CC Statistics 1988-2005, http://www.cert.org/stats/cert_stats.html, 2005, accessed April 18, 2006.
-
-
-
-
6
-
-
84876642493
-
-
Clarke, R., Forum on technology and innovation: Sponsored by Sen. Bill Frist (R-TN), Sen. Jay Rockefeller (DWV), and the Council on Competitiveness, http://www.techlawjournal.com/security/20020214.asp, 2002, accessed September 21, 2005.
-
Clarke, R., "Forum on technology and innovation: Sponsored by Sen. Bill Frist (R-TN), Sen. Jay Rockefeller (DWV), and the Council on Competitiveness," http://www.techlawjournal.com/security/20020214.asp, 2002, accessed September 21, 2005.
-
-
-
-
7
-
-
84876654748
-
-
accessed October 25, 2004
-
CNNMoney, "Home PCs not so safe?" http://money.cnn.com/2004/10/ 25/technology, 2004, accessed October 25, 2004.
-
(2004)
Home PCs not so safe
-
-
CNNMoney1
-
8
-
-
34249707723
-
How can we spread the security message?
-
27 September
-
Collins, B., Rawlinson, R., Manwani, S., and Allen, K., "How can we spread the security message?" Computer Weekly, 27 September, 2005, pp. 32.
-
(2005)
Computer Weekly
, pp. 32
-
-
Collins, B.1
Rawlinson, R.2
Manwani, S.3
Allen, K.4
-
9
-
-
23044525969
-
Current directions in IS security research: Toward socio-organizational perspectives
-
Dhillon, G., and Blackhouse, J., "Current directions in IS security research: Toward socio-organizational perspectives," Information Systems Journal, (11:2), 2001, pp. 127-153.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Blackhouse, J.2
-
10
-
-
0037903781
-
Changes in student computer technology attitudes over time
-
Duffy, T. J. and Walstrom, K. A., "Changes in student computer technology attitudes over time," Journal of Computer Information Systems, (43:3), 2003, pp. 27-33.
-
(2003)
Journal of Computer Information Systems
, vol.43
, Issue.3
, pp. 27-33
-
-
Duffy, T.J.1
Walstrom, K.A.2
-
11
-
-
84886756530
-
Physical security models, philosophies, and context
-
Forcht, K. A. and Kruck, S. E., "Physical security models, philosophies, and context," Journal of International Information Management, (10:2), 2001, pp. 85-97.
-
(2001)
Journal of International Information Management
, vol.10
, Issue.2
, pp. 85-97
-
-
Forcht, K.A.1
Kruck, S.E.2
-
12
-
-
34249672161
-
College face rising costs for computer security
-
Foster, A. L., "College face rising costs for computer security," Chronicle of Higher Education, (LI:17), 2004, pp. A1.
-
(2004)
Chronicle of Higher Education
, vol.51
, Issue.17
-
-
Foster, A.L.1
-
13
-
-
84951714571
-
Arming yourself in the virus war
-
Goldsborough, R., "Arming yourself in the virus war," Tech Directions, (63:8), 2004, pp. 14.
-
(2004)
Tech Directions
, vol.63
, Issue.8
, pp. 14
-
-
Goldsborough, R.1
-
14
-
-
34249724127
-
Investment in security training on the wrong track, say senior staff
-
29 November
-
Goodwin, B., "Investment in security training on the wrong track, say senior staff," Computer Weekly, 29 November, 2005. pp. 58.
-
(2005)
Computer Weekly
, pp. 58
-
-
Goodwin, B.1
-
15
-
-
4944232725
-
2004 CSI/FBI Computer crime and security survey
-
Gordon, L. A., M. P. Loeb, W. Lucyshyn and R. Richardson, "2004 CSI/FBI Computer crime and security survey," CSI Publications, 2004.
-
(2004)
CSI Publications
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
16
-
-
20744447916
-
Perceptions of end-users on the requirements in personal firewall software: An exploratory study
-
Hazari, S., "Perceptions of end-users on the requirements in personal firewall software: An exploratory study," Journal of Organizational and End User Computing, (17:3), 2005, pp. 47-65.
-
(2005)
Journal of Organizational and End User Computing
, vol.17
, Issue.3
, pp. 47-65
-
-
Hazari, S.1
-
17
-
-
0037530622
-
Careless about privacy
-
Hinde, S., "Careless about privacy," Computers & Security, (22:4), 2003, pp. 284-288.
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 284-288
-
-
Hinde, S.1
-
18
-
-
34249736781
-
What you should know about customer privacy management
-
Article No. R-21-1912
-
Janowski, W., "What you should know about customer privacy management," Gartner Advisory Intra Web Database, 2003, Article No. R-21-1912.
-
(2003)
Gartner Advisory Intra Web Database
-
-
Janowski, W.1
-
19
-
-
84876616498
-
-
Jaques, R., Demand for IT security pros growing fast, PC Magazine, http://www.pcmag.co.uk/print/1159247, 2004, accessed November 15, 2004.
-
Jaques, R., "Demand for IT security pros growing fast," PC Magazine, http://www.pcmag.co.uk/print/1159247, 2004, accessed November 15, 2004.
-
-
-
-
20
-
-
33644623016
-
Protect your business against dangerous information leaks
-
Kirkpatrick, J., "Protect your business against dangerous information leaks," Machine Design, (78:3), 2006, pp. 66.
-
(2006)
Machine Design
, vol.78
, Issue.3
, pp. 66
-
-
Kirkpatrick, J.1
-
21
-
-
0345764837
-
Improving user security behavior
-
Leach, J., "Improving user security behavior," Computers and Security, (22:8), 2003, pp. 685-692.
-
(2003)
Computers and Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
22
-
-
0037343554
-
Web services: An analysis of the technology, its benefits, and implementation difficulties
-
Lim, B. and Wen, H. J., "Web services: An analysis of the technology, its benefits, and implementation difficulties," Information Systems Management, (20:2), 2003, pp. 49-57.
-
(2003)
Information Systems Management
, vol.20
, Issue.2
, pp. 49-57
-
-
Lim, B.1
Wen, H.J.2
-
23
-
-
27544484573
-
Facilitating conditions, wireless trust and adoption intention
-
Lu, J., Yu, C. S., and Liu, C., "Facilitating conditions, wireless trust and adoption intention," Journal of Computer Information Systems, (46:1), 2005, pp. 15-25.
-
(2005)
Journal of Computer Information Systems
, vol.46
, Issue.1
, pp. 15-25
-
-
Lu, J.1
Yu, C.S.2
Liu, C.3
-
24
-
-
0038633244
-
CDC's new epidemic: An investigation into awareness, attitudes, actions, and knowledge of computer viruses among students utilizing campus computer labs
-
Monds, K. E., and Wang, C., "CDC's new epidemic: An investigation into awareness, attitudes, actions, and knowledge of computer viruses among students utilizing campus computer labs," Journal of Computer Information Systems, (43:3), 2003, 118-126.
-
(2003)
Journal of Computer Information Systems
, vol.43
, Issue.3
, pp. 118-126
-
-
Monds, K.E.1
Wang, C.2
-
25
-
-
34249671060
-
Operations security awareness: The mind has no firewall
-
Rhodes, K. A., "Operations security awareness: The mind has no firewall," Computer Security Journal, (17:3), 2001, pp. 1-12.
-
(2001)
Computer Security Journal
, vol.17
, Issue.3
, pp. 1-12
-
-
Rhodes, K.A.1
-
26
-
-
2342465992
-
Worms and viruses: Are we losing control?
-
Schultz, E., "Worms and viruses: Are we losing control?" Computers & Security, (23:3), 2004, pp. 179-180.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 179-180
-
-
Schultz, E.1
-
27
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. T., "A conceptual foundation for organizational information security awareness," Information Management & Computer Security, (8:1), 2000, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
28
-
-
34249718240
-
Human factor derails best-laid security plans
-
Tuesday, V., "Human factor derails best-laid security plans," Computerworld, (35:18), 2001, pp. 52.
-
(2001)
Computerworld
, vol.35
, Issue.18
, pp. 52
-
-
Tuesday, V.1
-
29
-
-
84876627244
-
-
US Census Bureau, http://www.census.gov/mrts/www/current.html, 2004, accessed October 27, 2004.
-
US Census Bureau, http://www.census.gov/mrts/www/current.html, 2004, accessed October 27, 2004.
-
-
-
|