-
2
-
-
0041957197
-
-
Pearson Education, Inc., Upper Saddle River, New Jersey
-
Alberts C., and Dorofee A. Managing information security risks: the OCTAVE approach (2002), Pearson Education, Inc., Upper Saddle River, New Jersey
-
(2002)
Managing information security risks: the OCTAVE approach
-
-
Alberts, C.1
Dorofee, A.2
-
3
-
-
0018481721
-
Assessing project implementation risk: a methodological approach
-
Anderson J., and Narasimhan R. Assessing project implementation risk: a methodological approach. Management Science 25 6 (1979) 512-521
-
(1979)
Management Science
, vol.25
, Issue.6
, pp. 512-521
-
-
Anderson, J.1
Narasimhan, R.2
-
4
-
-
0028731436
-
The effect of intrusion detection management methods on the return on investment
-
Badenhorst K.P., and Eloff J.H.P. The effect of intrusion detection management methods on the return on investment. Computers & Security 13 5 (1994) 411-435
-
(1994)
Computers & Security
, vol.13
, Issue.5
, pp. 411-435
-
-
Badenhorst, K.P.1
Eloff, J.H.P.2
-
5
-
-
0000111181
-
Controlling prototype development through risk analysis
-
Baskerville R.L., and Stage J. Controlling prototype development through risk analysis. MIS Quarterly 20 4 (1996) 481-501
-
(1996)
MIS Quarterly
, vol.20
, Issue.4
, pp. 481-501
-
-
Baskerville, R.L.1
Stage, J.2
-
7
-
-
34548502174
-
Configuration of detection software: a comparison of decision and game theory approaches
-
Cavusoglu H., and Raghunathan S. Configuration of detection software: a comparison of decision and game theory approaches. Decision Analysis 1 3 (2004) 131-148
-
(2004)
Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
8
-
-
79957597754
-
Optimal design of information technology security architecture
-
Cavusoglu H., Mishra B., and Raghunathan S. Optimal design of information technology security architecture. Proceedings of the Twenty-Third International Conference on Information Systems, Barcelona, Spain (2002) 749-756
-
(2002)
Proceedings of the Twenty-Third International Conference on Information Systems, Barcelona, Spain
, pp. 749-756
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
9
-
-
0029718539
-
Risk analysis modelling with the use of fuzzy logic
-
de Ru W.G., and Eloff J.H.P. Risk analysis modelling with the use of fuzzy logic. Computers & Security 15 3 (1996) 239-248
-
(1996)
Computers & Security
, vol.15
, Issue.3
, pp. 239-248
-
-
de Ru, W.G.1
Eloff, J.H.P.2
-
11
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Gaffney Jr. J.E., and Ulvila J.W. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis 1 1 (2004) 39-54
-
(2004)
Decision Analysis
, vol.1
, Issue.1
, pp. 39-54
-
-
Gaffney Jr., J.E.1
Ulvila, J.W.2
-
13
-
-
30744472925
-
Principles and procedures of the lram approach to information systems risk analysis and management
-
Guarro S.B. Principles and procedures of the lram approach to information systems risk analysis and management. Computer & Security 6 6 (1987) 493-504
-
(1987)
Computer & Security
, vol.6
, Issue.6
, pp. 493-504
-
-
Guarro, S.B.1
-
14
-
-
32544451794
-
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
-
Gupta M., Rees J., Chaturvedi A., and Chi J. Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decision Support Systems 41 3 (2006) 592-603
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
, pp. 592-603
-
-
Gupta, M.1
Rees, J.2
Chaturvedi, A.3
Chi, J.4
-
17
-
-
84948760464
-
Two formal analyses of attack graphs
-
Jha S., Sheyner O., and Wing J. Two formal analyses of attack graphs. Computer Security Foundations Workshops, Cape Breton, Nova Scotia, Canada (2002) 49-63
-
(2002)
Computer Security Foundations Workshops, Cape Breton, Nova Scotia, Canada
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
18
-
-
0000133760
-
Threats to information systems: today's reality, yesterday's understanding
-
Loch K.D., Carr H.H., and Warkentin M.E. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 16 2 (1992) 173-186
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
19
-
-
0032348156
-
Attention shaping and software risk - a categorical analysis of four classical risk management approaches
-
Lyytinen K., Mathiassen L., and Ropponen J. Attention shaping and software risk - a categorical analysis of four classical risk management approaches. Information Systems Research 9 3 (1998) 233-255
-
(1998)
Information Systems Research
, vol.9
, Issue.3
, pp. 233-255
-
-
Lyytinen, K.1
Mathiassen, L.2
Ropponen, J.3
-
20
-
-
0001591897
-
Portfolio approach to information systems
-
McFarlan F.W. Portfolio approach to information systems. Harvard Business Review 59 5 (1981) 142-150
-
(1981)
Harvard Business Review
, vol.59
, Issue.5
, pp. 142-150
-
-
McFarlan, F.W.1
-
22
-
-
34548512776
-
Dominance approach to risk analysis of computer systems
-
Ngai E.W.T., and Wat F.K.T. Dominance approach to risk analysis of computer systems. Decision Support Systems 37 4 (2004) 485-500
-
(2004)
Decision Support Systems
, vol.37
, Issue.4
, pp. 485-500
-
-
Ngai, E.W.T.1
Wat, F.K.T.2
-
24
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo R., Deswarte Y., and Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25 5 (1999) 633-650
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
26
-
-
55249117122
-
Dominance approach to risk analysis of computer systems
-
Post G.V., and Diltz J.D. Dominance approach to risk analysis of computer systems. MIS Quarterly 10 4 (1986) 363-375
-
(1986)
MIS Quarterly
, vol.10
, Issue.4
, pp. 363-375
-
-
Post, G.V.1
Diltz, J.D.2
-
28
-
-
0041766619
-
2003 CSI/FBI computer crime and security survey
-
Tech. Rep.
-
Richardson R. 2003 CSI/FBI computer crime and security survey. Computer Security Journal (2003) Tech. Rep.
-
(2003)
Computer Security Journal
-
-
Richardson, R.1
-
29
-
-
55949129743
-
Security gets top-level attention
-
Stein T. Security gets top-level attention. Optimize, 23 September (2003)
-
(2003)
Optimize, 23 September
-
-
Stein, T.1
-
30
-
-
1842829828
-
Risk management guide for information technology systems
-
Stoneburner G., Goguen A., and Feringa A. Risk management guide for information technology systems. National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Special Publication 800-30 (2002)
-
(2002)
National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Special Publication 800-30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
31
-
-
34548505226
-
Engineering principles for information technology security (a baseline for achieving security), revision a
-
Stoneburner G., Hayden C., and Feringa A. Engineering principles for information technology security (a baseline for achieving security), revision a. National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Special Publication 800-27 (2004)
-
(2004)
National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Special Publication 800-27
-
-
Stoneburner, G.1
Hayden, C.2
Feringa, A.3
-
32
-
-
0000280419
-
Effective is security: an empirical study
-
Straub D.W. Effective is security: an empirical study. Information Systems Research 1 3 (1990) 255-276
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
33
-
-
0001133137
-
Coping with systems risk: security planning models for management decision-making
-
Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision-making. MIS Quarterly 22 4 (1998) 441-469
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
34
-
-
25444498268
-
Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis
-
Tanna G.B., Gupta M., Rao H.R., and Upadhyaya S. Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis. Decision Support Systems 41 1 (2005) 242-261
-
(2005)
Decision Support Systems
, vol.41
, Issue.1
, pp. 242-261
-
-
Tanna, G.B.1
Gupta, M.2
Rao, H.R.3
Upadhyaya, S.4
-
36
-
-
34548477863
-
Management of information security
-
Thompson, Boston, Massachusetts
-
Whitman M.E., and Mattord H.J. Management of information security. Course Technology (2004), Thompson, Boston, Massachusetts
-
(2004)
Course Technology
-
-
Whitman, M.E.1
Mattord, H.J.2
|