-
1
-
-
34848836808
-
The state of information security 2003
-
Oct. 15
-
Berinato, S. The state of information security 2003. CIO Magazine 17, 2 (Oct. 15, 2003).
-
(2003)
CIO Magazine
, vol.17
, pp. 2
-
-
Berinato, S.1
-
2
-
-
7444242205
-
The effect of information security breach announcements on shareholder wealth: Capital market reactions for breached firms and Internet security developers
-
Fall
-
Cavusoglu, H., Mishra, B., and Rathunathan, S. The effect of information security breach announcements on shareholder wealth: Capital market reactions for breached firms and Internet security developers. International Journal of Electronic Commerce 9, 1 (Fall 2004), 69-104.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Mishra, B.2
Rathunathan, S.3
-
3
-
-
4243109556
-
A model for evaluating IT security investments
-
July
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. A model for evaluating IT security investments. Commun. ACM 47, 7 (July 2004), 87-92.
-
(2004)
Commun. ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
4
-
-
0001229241
-
Organizational information requirements, media richness, and structural design
-
May
-
Daft, R. and Lengel, R. Organizational information requirements, media richness, and structural design. Management Science 32, 4 (May 1986), 554-569.
-
(1986)
Management Science
, vol.32
, Issue.4
, pp. 554-569
-
-
Daft, R.1
Lengel, R.2
-
6
-
-
0003615205
-
A Common Language for Computer Security Incidents
-
SAND98-8667, Oct. 1998;
-
Howard, J. and Longstaff, T. A Common Language for Computer Security Incidents. Sandia National Laboratories Report SAND98-8667, Oct. 1998; www.cert.org/research/taxonomy_988667.pdf.
-
Sandia National Laboratories Report
-
-
Howard, J.1
Longstaff, T.2
-
8
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Dec
-
Straub, D. and Welke, R. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22, 4 (Dec. 1998), 441-470.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-470
-
-
Straub, D.1
Welke, R.2
-
9
-
-
12244283592
-
-
National Institute of Standards and Technology Special Publication 800-55, Gaithersburg, MD, July
-
Swanson, M., Bartol, N., Sabato, J., and Graffo, L. Security Metrics Guide for Information Technology Systems. National Institute of Standards and Technology Special Publication 800-55, Gaithersburg, MD, July 2003.
-
(2003)
Security Metrics Guide for Information Technology Systems
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Graffo, L.4
-
10
-
-
34848926387
-
-
Verton, D. DHS seeks real-world data on security breaches, Sept. 20
-
Verton, D. DHS seeks real-world data on security breaches. Computerworld (Sept. 20, 2004).
-
(2004)
Computerworld
-
-
-
11
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
Aug
-
Whitman, M. Enemy at the gate: Threats to information security. Commun. ACM 46, 8 (Aug. 2003), 91-95.
-
(2003)
Commun. ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.1
|