-
1
-
-
33750323023
-
Plant information systems, manufacturing capabilities, and plant performance
-
Banker R.D., Bardhan I.R., Chang H., and Lin S. Plant information systems, manufacturing capabilities, and plant performance. MIS Quarterly 30 2 (2006) 315-337
-
(2006)
MIS Quarterly
, vol.30
, Issue.2
, pp. 315-337
-
-
Banker, R.D.1
Bardhan, I.R.2
Chang, H.3
Lin, S.4
-
3
-
-
33747462440
-
Taking industry seriously in information systems research
-
Chiasson M.W., and Davidson E. Taking industry seriously in information systems research. MIS Quarterly 29 4 (2005) 591-605
-
(2005)
MIS Quarterly
, vol.29
, Issue.4
, pp. 591-605
-
-
Chiasson, M.W.1
Davidson, E.2
-
4
-
-
34447318683
-
-
CNSS, National Information Assurance (IA) Glossary (CNSS Instruction No. 4009), Committee on National Security Systems, revised in June 2006, http://www.cnss.gov/instructions.html (cited July 5, 2006).
-
-
-
-
5
-
-
33750313567
-
Systems design, process performance, and economic outcomes in international banking
-
Davamanirajan P., Kauffman R.J., Kriebel C.H., and Mukhopadhyay T. Systems design, process performance, and economic outcomes in international banking. Journal of Management Information Systems 23 2 (2006) 65-90
-
(2006)
Journal of Management Information Systems
, vol.23
, Issue.2
, pp. 65-90
-
-
Davamanirajan, P.1
Kauffman, R.J.2
Kriebel, C.H.3
Mukhopadhyay, T.4
-
6
-
-
0034158883
-
Information security management: a hierarchical framework for various approaches
-
Eloff M.M., and von Solms S.H. Information security management: a hierarchical framework for various approaches. Computers and Security 19 3 (2000) 243-256
-
(2000)
Computers and Security
, vol.19
, Issue.3
, pp. 243-256
-
-
Eloff, M.M.1
von Solms, S.H.2
-
8
-
-
0026054207
-
Information systems management and strategy formulation: the "stages of growth" model revisited
-
Galliers R.D., and Sutherland A.R. Information systems management and strategy formulation: the "stages of growth" model revisited. Journal of Information Systems 1 (1991) 89-114
-
(1991)
Journal of Information Systems
, vol.1
, pp. 89-114
-
-
Galliers, R.D.1
Sutherland, A.R.2
-
10
-
-
0001823869
-
Security concerns of system users: a study of perceptions of the adequacy of security
-
Goodhue D.L., and Straub D.W. Security concerns of system users: a study of perceptions of the adequacy of security. Information and Management 20 1 (1991) 13-22
-
(1991)
Information and Management
, vol.20
, Issue.1
, pp. 13-22
-
-
Goodhue, D.L.1
Straub, D.W.2
-
12
-
-
39749159243
-
Electronic data interchange and small organizations: adoption and impact of technology
-
Iacovou C.L., Benbasat I., and Dexter A.S. Electronic data interchange and small organizations: adoption and impact of technology. MIS Quarterly 19 4 (1995) 465-485
-
(1995)
MIS Quarterly
, vol.19
, Issue.4
, pp. 465-485
-
-
Iacovou, C.L.1
Benbasat, I.2
Dexter, A.S.3
-
14
-
-
0035479209
-
Security threats to Internet: a Korean multi-industry investigation
-
Jung B., Han I., and Lee S. Security threats to Internet: a Korean multi-industry investigation. Information and Management 38 8 (2001) 487-498
-
(2001)
Information and Management
, vol.38
, Issue.8
, pp. 487-498
-
-
Jung, B.1
Han, I.2
Lee, S.3
-
16
-
-
0002904380
-
Organizational characteristics and information systems planning: an empirical study
-
King W.R. Organizational characteristics and information systems planning: an empirical study. Information Systems Research 5 2 (1994) 75-109
-
(1994)
Information Systems Research
, vol.5
, Issue.2
, pp. 75-109
-
-
King, W.R.1
-
17
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic A.G., and Clark J.G. Why there aren't more information security research studies. Information and Management 41 5 (2004) 597-607
-
(2004)
Information and Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
18
-
-
27644548494
-
Impacts of globalization on e-commerce use and firm performance: a cross-country investigation
-
Kraemer K.L., Gibbs J., and Dedrick J. Impacts of globalization on e-commerce use and firm performance: a cross-country investigation. Information Society 21 5 (2005) 323-340
-
(2005)
Information Society
, vol.21
, Issue.5
, pp. 323-340
-
-
Kraemer, K.L.1
Gibbs, J.2
Dedrick, J.3
-
19
-
-
23344453209
-
Investigating factors affecting the adoption of anti-spyware systems
-
Lee Y., and Kozar K.A. Investigating factors affecting the adoption of anti-spyware systems. Communications of the ACM 48 8 (2005) 72-78
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 72-78
-
-
Lee, Y.1
Kozar, K.A.2
-
20
-
-
0000133760
-
Threats to information systems: today's reality, yesterday's understanding
-
Loch K.D., Carr H.H., and Warkentin M.E. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 16 2 (1992) 173-186
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
21
-
-
0009222571
-
The management and control of information in high-technology firms
-
Mohr J.J. The management and control of information in high-technology firms. The Journal of High Technology Management Research 7 2 (1996) 245-268
-
(1996)
The Journal of High Technology Management Research
, vol.7
, Issue.2
, pp. 245-268
-
-
Mohr, J.J.1
-
23
-
-
0028713556
-
Development of security policies
-
Olnes J. Development of security policies. Computers and Security 13 8 (1994) 628-636
-
(1994)
Computers and Security
, vol.13
, Issue.8
, pp. 628-636
-
-
Olnes, J.1
-
26
-
-
3242808612
-
-
Computer Security Institute http://www.gocsi.com/ (cited September 20, 2003)
-
Richardson R. 2003 CSI/FBI Computer Crime and Security Survey (2003), Computer Security Institute. http://www.gocsi.com/ http://www.gocsi.com/ (cited September 20, 2003)
-
(2003)
2003 CSI/FBI Computer Crime and Security Survey
-
-
Richardson, R.1
-
28
-
-
0002699431
-
Discovering and disciplining computer abuse in organization: a field study
-
Straub D.W., and Nance W.D. Discovering and disciplining computer abuse in organization: a field study. MIS Quarterly (1990) 45-55
-
(1990)
MIS Quarterly
, pp. 45-55
-
-
Straub, D.W.1
Nance, W.D.2
-
29
-
-
0001133137
-
Coping with systems risk: security planning models for management decision making
-
Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly (1998) 441-469
-
(1998)
MIS Quarterly
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
30
-
-
0141919268
-
The IS risk analysis based on a business model
-
Suh B., and Han I. The IS risk analysis based on a business model. Information and Management 41 2 (2003) 149-158
-
(2003)
Information and Management
, vol.41
, Issue.2
, pp. 149-158
-
-
Suh, B.1
Han, I.2
-
31
-
-
3042812983
-
The 10 deadly sins of information security management
-
von Solms B., and von Solms R. The 10 deadly sins of information security management. Computers and Security 23 5 (2004) 371-376
-
(2004)
Computers and Security
, vol.23
, Issue.5
, pp. 371-376
-
-
von Solms, B.1
von Solms, R.2
-
32
-
-
0141917862
-
A framework for information security evaluation
-
von Solms R., van de Haar H., von Solms S.H., and Caelli W.J. A framework for information security evaluation. Information and Management 26 3 (1994) 143-153
-
(1994)
Information and Management
, vol.26
, Issue.3
, pp. 143-153
-
-
von Solms, R.1
van de Haar, H.2
von Solms, S.H.3
Caelli, W.J.4
-
33
-
-
85127993111
-
-
CRC Press, Boca Raton, FL
-
White G.B., Fisch E.A., and Pooch U.W. Computer System and Network Security (1996), CRC Press, Boca Raton, FL
-
(1996)
Computer System and Network Security
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
34
-
-
4243198165
-
Enemy at the gates: threats to information security
-
Whitman M.E. Enemy at the gates: threats to information security. Communication of the ACM 46 8 (2003) 91-95
-
(2003)
Communication of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
35
-
-
0000019603
-
An examination of push-pull theory applied to process innovation in knowledge work
-
Zmud R.W. An examination of push-pull theory applied to process innovation in knowledge work. Management Science 30 6 (1984) 727-738
-
(1984)
Management Science
, vol.30
, Issue.6
, pp. 727-738
-
-
Zmud, R.W.1
|