메뉴 건너뛰기




Volumn 46, Issue 8, 2003, Pages 91-95

Enemy at the gate: Threats to information security

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION EXTORTION; ONLINE SURVEYS; SERVICE PROVIDERS; TECHNOLOGICAL OBSOLESCENCE;

EID: 4243198165     PISSN: 00010782     EISSN: None     Source Type: Journal    
DOI: 10.1145/859670.859675     Document Type: Review
Times cited : (238)

References (6)
  • 1
    • 9744281201 scopus 로고    scopus 로고
    • Key issues in information systems management: 1994-95 SIM Delphi results
    • Branchsau, J.C., Janz, B.D., and Weatherbe, J.C. Key issues in information systems management: 1994-95 SIM Delphi results. MIS Q 20. 2 (1996), 225-242.
    • (1996) MIS Q , vol.20 , Issue.2 , pp. 225-242
    • Branchsau, J.C.1    Janz, B.D.2    Weatherbe, J.C.3
  • 2
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K.D., Carr, H.H., and Warkentin, M.E. Threats to information systems: Today's reality, yesterday's understanding. MIS Q. 16, 2 (1992), 173-186.
    • (1992) MIS Q , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 3
    • 0042484572 scopus 로고    scopus 로고
    • 2002 CSI/FBI computer crime and security survey
    • Power, R. 2002 CSI/FBI computer crime and security survey. Computer Security Issues & Trends 8, 1 (2002), 1-24.
    • (2002) Computer Security Issues & Trends , vol.8 , Issue.1 , pp. 1-24
    • Power, R.1
  • 4
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W. and Welke, R.J. Coping with systems risk: Security planning models for management decision making. MIS Q. 22, 4 (1998), 441-469.
    • (1998) MIS Q , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 6
    • 4243168417 scopus 로고    scopus 로고
    • Integrated approach includes information security
    • Wood, C.C. Integrated approach includes information security. Security 37, 2 (2000), 43-44.
    • (2000) Security , vol.37 , Issue.2 , pp. 43-44
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.