-
1
-
-
23744501762
-
"Defining a requirements process improvement model"
-
Beecham, S., Hall, T. and Rainer, A. (2005), "Defining a requirements process improvement model", Software Quality Journal, Vol. 13 No. 3, pp. 247-80.
-
(2005)
Software Quality Journal
, vol.13
, Issue.3
, pp. 247-280
-
-
Beecham, S.1
Hall, T.2
Rainer, A.3
-
2
-
-
0346452788
-
"Selecting continuous training program and activities for computer professionals"
-
Boulet, M-M., Dupuis, C. and Belkhiter, N. (2001), "Selecting continuous training program and activities for computer professionals", Computers and Education, Vol. 36 No. 1, pp. 83-94.
-
(2001)
Computers and Education
, vol.36
, Issue.1
, pp. 83-94
-
-
Boulet, M.-M.1
Dupuis, C.2
Belkhiter, N.3
-
5
-
-
40949118368
-
-
Center for Software Engineering available at:
-
Center for Software Engineering (2002), COCOMO, available at: sunset.usc.edu/research/COCOMOII/.
-
(2002)
COCOMO
-
-
-
6
-
-
40949133631
-
-
CERT available at:
-
CERT (2003), OCTAVE, available at: www.cert.org/octave/.
-
(2003)
OCTAVE
-
-
-
7
-
-
77956046845
-
-
2nd ed., Thompson Course Technology, Boston, MA
-
Ciampa, M. (2007), Security Awareness: Applying Practical Security in your World, 2nd ed., Thompson Course Technology, Boston, MA.
-
(2007)
Security Awareness: Applying Practical Security in Your World
-
-
Ciampa, M.1
-
9
-
-
40949091773
-
-
Dictionary.com available at:
-
Dictionary.com (2007), available at: Dictionary.reference.com/.
-
(2007)
-
-
-
10
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
Furnell, S.M., Jusoh, A. and Katsabas, D. (2006), "The challenges of understanding and using security: A survey of end-users", Computers and Security, Vol. 25 No. 1, pp. 27-35.
-
(2006)
Computers and Security
, vol.25
, Issue.1
, pp. 27-35
-
-
Furnell, S.M.1
Jusoh, A.2
Katsabas, D.3
-
11
-
-
37849185083
-
"Are CMM program investments beneficial? Analyzing past studies"
-
Galin, D. and Avrahami, M. (2006), "Are CMM program investments beneficial? Analyzing past studies", IEEE Software, Vol. 23 No. 6, pp. 81-7.
-
(2006)
IEEE Software
, vol.23
, Issue.6
, pp. 81-87
-
-
Galin, D.1
Avrahami, M.2
-
13
-
-
40949097186
-
"The regulation of information security"
-
Heiser, J.G. (2004), "The regulation of information security", Intermedia, Vol. 32 No. 2, p. 29.
-
(2004)
Intermedia
, vol.32
, Issue.2
, pp. 29
-
-
Heiser, J.G.1
-
14
-
-
0031166786
-
"Software quality and the capability maturity model"
-
Herbsleb, J., Zubrow, D., Goldenson, D., Hayes, W. and Paulk, M.C. (1997), "Software quality and the capability maturity model", Communications of the ACM, Vol. 40 No. 6, pp. 30-40.
-
(1997)
Communications of the ACM
, vol.40
, Issue.6
, pp. 30-40
-
-
Herbsleb, J.1
Zubrow, D.2
Goldenson, D.3
Hayes, W.4
Paulk, M.C.5
-
16
-
-
84870795656
-
"The relationship between the SSE-CMM and IT security guidance documentation"
-
available at:
-
Hopkinson, J.P. (2001), "The relationship between the SSE-CMM and IT security guidance documentation", The SSE-CMM and IT Security Guidance Documentation, available at: www.issea.org/docs/ sse-guides_2001.pdf.
-
(2001)
The SSE-CMM and IT Security Guidance Documentation
-
-
Hopkinson, J.P.1
-
17
-
-
33644680151
-
"Selection priority of process areas based on CMMI continuous representation"
-
Huang, S-J. and Han, W-M. (2006), "Selection priority of process areas based on CMMI continuous representation", International Journal of Information Management, Vol. 43 No. 3, pp. 297-307.
-
(2006)
International Journal of Information Management
, vol.43
, Issue.3
, pp. 297-307
-
-
Huang, S.-J.1
Han, W.-M.2
-
19
-
-
70349572829
-
-
ISACA available at:
-
ISACA (2006), Information security governance, available at: www.isaca.org/Content/NavigationMenu/Security/CISM_Certification/ Exam_Information1/Content_Areas1/Information_Security_Governance.htm.
-
(2006)
Information Security Governance
-
-
-
20
-
-
40949146387
-
-
ISACA available at:
-
ISACA (2007), COBIT, available at: www.isaca.org/template.cfm?Section= COBIT6.
-
(2007)
COBIT
-
-
-
21
-
-
33645988424
-
"ISO/IEC 17799:2005 information technology - Security techniques - Code of practice for information security management"
-
ISO available at:
-
ISO (2005), "ISO/IEC 17799:2005 information technology - security techniques - code of practice for information security management", available at: www.iso.ch/iso/en/prods-services/popstds/ informationsecurity.html.
-
(2005)
-
-
-
22
-
-
0347412022
-
"An exploration of the relationship between software development process maturity and project performance"
-
Jiang, J.J., Klein, G., Hwang, H-G., Huang, J. and Hung, S-Y. (2004), "An exploration of the relationship between software development process maturity and project performance", Information & Management, Vol. 41 No. 3, pp. 279-88.
-
(2004)
Information & Management
, vol.41
, Issue.3
, pp. 279-288
-
-
Jiang, J.J.1
Klein, G.2
Hwang, H.-G.3
Huang, J.4
Hung, S.-Y.5
-
23
-
-
9944237270
-
"Evaluating the user-centredness of development organisations: Conclusions and implications from empirical usability capability maturity assessments"
-
Jokela, T. (2004), "Evaluating the user-centredness of development organisations: Conclusions and implications from empirical usability capability maturity assessments", Interacting with Computers, Vol. 16 No. 6, pp. 1095-132.
-
(2004)
Interacting With Computers
, vol.16
, Issue.6
, pp. 1095-1132
-
-
Jokela, T.1
-
25
-
-
85007731052
-
"Computerisation and health care: Some worries behind the promises"
-
Neame, R. and Kluge, E-H. (1999), "Computerisation and health care: some worries behind the promises", British Medical Journal, Vol. 319 No. 7220, p. 1295.
-
(1999)
British Medical Journal
, vol.319
, Issue.7220
, pp. 1295
-
-
Neame, R.1
Kluge, E.-H.2
-
26
-
-
6444239461
-
"A maturity model for the implementation of software process improvement: An empirical study"
-
Niazi, M., Wilson, D. and Zowghi, D. (2005), "A maturity model for the implementation of software process improvement: An empirical study", The Journal of Systems and Software, Vol. 74 No. 2, p. 155.
-
(2005)
The Journal of Systems and Software
, vol.74
, Issue.2
, pp. 155
-
-
Niazi, M.1
Wilson, D.2
Zowghi, D.3
-
27
-
-
40949158262
-
"Surviving the quagmire of process models, integrated models, and standards"
-
Paulk, M.C. (2004), "Surviving the quagmire of process models, integrated models, and standards", Annual Quality Congress Proceedings, Vol. 58, pp. 429-38.
-
(2004)
Annual Quality Congress Proceedings
, vol.58
, pp. 429-438
-
-
Paulk, M.C.1
-
30
-
-
18844430775
-
"An alternative model for measuring the success of IS projects: The GPIS model"
-
Saleh, Y. and Alshawi, M. (2005), "An alternative model for measuring the success of IS projects: The GPIS model", Journal of Enterprise Information Management, Vol. 18 No. 1, pp. 47-63.
-
(2005)
Journal of Enterprise Information Management
, vol.18
, Issue.1
, pp. 47-63
-
-
Saleh, Y.1
Alshawi, M.2
-
31
-
-
33746927551
-
"Utilization of statistical process control (SPC) in emergent software organizations: Pitfalls and suggestions"
-
Sargut, K.U. and Demirörs, O. (2006), "Utilization of statistical process control (SPC) in emergent software organizations: pitfalls and suggestions", Software Quality Journal, Vol. 14 No. 2, pp. 135-57.
-
(2006)
Software Quality Journal
, vol.14
, Issue.2
, pp. 135-157
-
-
Sargut, K.U.1
Demirörs, O.2
-
33
-
-
40949120415
-
-
Software Engineering Institute available at:
-
Software Engineering Institute (2006), What is CMMI?, available at: www.sei.cmu.edu/cmmi/general/general.html.
-
(2006)
What Is CMMI?
-
-
-
34
-
-
84884825086
-
-
University of Massachusetts Dartmouth available at:
-
University of Massachusetts Dartmouth (n.d.), "SEI capability maturity model", available at: www2.umassd.edu/swpi/ processframework/cmm/cmm.html.
-
"SEI Capability Maturity Model"
-
-
-
35
-
-
40949157392
-
"Information governance: A model for security in medical practice"
-
Williams, P.A.H. (2007a), "Information governance: A model for security in medical practice", Journal of Digital Forensics, Security and Law, Vol. 2 No. 1.
-
(2007)
Journal of Digital Forensics, Security and Law
, vol.2
, Issue.1
-
-
Williams, P.A.H.1
|