-
2
-
-
7544250309
-
-
Audit Commission , London: HMSO
-
Audit Commission (2001) Community Safety Partnership, London: HMSO.
-
(2001)
Community Safety Partnership
-
-
-
3
-
-
47049126642
-
-
Audit Commission , London: HMSO
-
Audit Commission (2005) IT Fraud and Abuse, London: HMSO.
-
(2005)
IT Fraud and Abuse
-
-
-
4
-
-
21344459955
-
Structures of responsibility and security of information systems
-
Backhouse, J. and Dhillon, G. (1996) 'Structures of responsibility and security of information systems', European Journal of Information Systems, Vol. 5, No. 1, pp.2-9.
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-9
-
-
Backhouse, J.1
Dhillon, G.2
-
5
-
-
0030076340
-
The ethics of sentencing white-collar criminals
-
Balsmeier, P. and Kelly, J. (1996) 'The ethics of sentencing white-collar criminals', Journal of Business Ethics, Vol. 15, No. 2, pp.143-152.
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.2
, pp. 143-152
-
-
Balsmeier, P.1
Kelly, J.2
-
6
-
-
47049091642
-
-
Bank of England Report (1995) Report of the Board of Banking Supervision: Inquiry into the Circumstances of the Collapse of Barings HMSO.
-
Bank of England Report (1995) Report of the Board of Banking Supervision: Inquiry into the Circumstances of the Collapse of Barings HMSO.
-
-
-
-
7
-
-
24144458931
-
Information systems security from a knowledge management perspective
-
Belsis, P. and Kokolakis, S. (2005) 'Information systems security from a knowledge management perspective', Information Management & Computer Security, Vol. 13, No. 3, pp.189-202.
-
(2005)
Information Management & Computer Security
, vol.13
, Issue.3
, pp. 189-202
-
-
Belsis, P.1
Kokolakis, S.2
-
8
-
-
47049094725
-
Information security management - Part 2: Specification for information security management systems
-
BSI , London, British Standards Institute
-
BSI (2002) 'Information security management - Part 2: Specification for information security management systems', BS 7799-2: 2002, London, British Standards Institute.
-
(2002)
BS 7799-2: 2002
-
-
-
9
-
-
18144368967
-
Knowledge management science-not rocket science
-
Call, D. (2005) 'Knowledge management science-not rocket science', Journal of Management Science, Vol. 9, No. 2, pp.19-30.
-
(2005)
Journal of Management Science
, vol.9
, Issue.2
, pp. 19-30
-
-
Call, D.1
-
10
-
-
0029506317
-
Ethics and information technology use: A factor analysis of attitudes to computer use
-
Conger, S., Loch, K.D. and Helft, B.L. (1995) 'Ethics and information technology use: A factor analysis of attitudes to computer use', Information Systems Journal, Vol. 6, No. 4, pp.161-184.
-
(1995)
Information Systems Journal
, vol.6
, Issue.4
, pp. 161-184
-
-
Conger, S.1
Loch, K.D.2
Helft, B.L.3
-
11
-
-
0004040956
-
-
Milton Keynes: Open University Press
-
Croall, H. (1992) White-collar Crime, Milton Keynes: Open University Press.
-
(1992)
White-collar Crime
-
-
Croall, H.1
-
20
-
-
47049087789
-
Computer fraud: Its management and control
-
J. Reuvid Ed, London: Kogan, pp
-
Dhillon, G. and Backhouse, J. (1995) 'Computer fraud: Its management and control', in J. Reuvid (Ed.) The Regulation and Prevention of Economic Crime Internationally, London: Kogan, pp.81-89.
-
(1995)
The Regulation and Prevention of Economic Crime Internationally
, pp. 81-89
-
-
Dhillon, G.1
Backhouse, J.2
-
21
-
-
23044525969
-
Current directions in IS security research: Toward socio-organisational perspectives
-
Dhillon, G. and Backhouse, J. (2001) 'Current directions in IS security research: Toward socio-organisational perspectives', Information Systems Journal, Vol. 11, No. 2, pp.127-153.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
22
-
-
7744227587
-
Computer crime at CEFORMA: A case study
-
Dhillon, G., Silva, L. and Backhouse, J. (2004) 'Computer crime at CEFORMA: A case study', International Journal of Information Management, Vol. 24, No. 6, pp.551-561.
-
(2004)
International Journal of Information Management
, vol.24
, Issue.6
, pp. 551-561
-
-
Dhillon, G.1
Silva, L.2
Backhouse, J.3
-
26
-
-
0035780599
-
Formalizing information security requirements
-
Gerber, M., Solms, R.V. and Overbeek, R. (2001) 'Formalizing information security requirements', Information Management & Computer Security Vol. 9, No. 1, pp.32-37.
-
(2001)
Information Management & Computer Security
, vol.9
, Issue.1
, pp. 32-37
-
-
Gerber, M.1
Solms, R.V.2
Overbeek, R.3
-
28
-
-
47049121726
-
-
Halliday, J. and von Solms, R. (1997) 'Effective information security policies', Information Technology on the Move, v. Solms, Port Elizabeth, Port Elizabeth Technikon, pp.12-20.
-
Halliday, J. and von Solms, R. (1997) 'Effective information security policies', Information Technology on the Move, v. Solms, Port Elizabeth, Port Elizabeth Technikon, pp.12-20.
-
-
-
-
29
-
-
1242308738
-
Computer crime and abuse by IS employees: Something to worry about?
-
Harrington, S.J. (1995) 'Computer crime and abuse by IS employees: something to worry about?', Journal of Systems Management, Vol. 46, No. 2, pp.6-11.
-
(1995)
Journal of Systems Management
, vol.46
, Issue.2
, pp. 6-11
-
-
Harrington, S.J.1
-
30
-
-
0032620195
-
Identifying and controlling computer crime and employee fraud
-
Haugen, S. and Selin, J.R. (1999) 'Identifying and controlling computer crime and employee fraud', Industrial Management & Data Systems, Vol. 99, No. 8, pp.340-344.
-
(1999)
Industrial Management & Data Systems
, vol.99
, Issue.8
, pp. 340-344
-
-
Haugen, S.1
Selin, J.R.2
-
31
-
-
0037228072
-
The law, cybercrime, risk assessment and cyber protection
-
Hinde, S. (2003) 'The law, cybercrime, risk assessment and cyber protection', Computers and Security, Vol. 22, No. 2, pp.90-95.
-
(2003)
Computers and Security
, vol.22
, Issue.2
, pp. 90-95
-
-
Hinde, S.1
-
32
-
-
0011432676
-
Deficiencies of the traditional approach to information security and the requirement for a new methodology
-
Hitchings, J. (1995) 'Deficiencies of the traditional approach to information security and the requirement for a new methodology', Computers & Security, Vol. 14, No. 5, pp.377-383.
-
(1995)
Computers & Security
, vol.14
, Issue.5
, pp. 377-383
-
-
Hitchings, J.1
-
33
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Hoffer, J.A. and Straub, D.W. (1989) 'The 9 to 5 underground: Are you policing computer crimes?', Sloan Management Review, Vol. 30, No. 4, pp.35-44.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-44
-
-
Hoffer, J.A.1
Straub, D.W.2
-
34
-
-
84994768852
-
Managing information systems security: A soft approach
-
Cleveland, Ohio, USA, 16-18 December
-
James, H. (1996) 'Managing information systems security: A soft approach', International Conference for Information Systems (ICIS) Cleveland, Ohio, USA, 16-18 December.
-
(1996)
International Conference for Information Systems (ICIS)
-
-
James, H.1
-
35
-
-
84976680568
-
Accountability and computer decision systems
-
Johnson, D.G. and Mulvey, J.M. (1995) 'Accountability and computer decision systems', Communications of the ACM, Vol. 38, No. 12, pp.58-64.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 58-64
-
-
Johnson, D.G.1
Mulvey, J.M.2
-
36
-
-
47049094990
-
-
MPhil Thesis Information Systems, De Montfort University, Leicester, p
-
Kesar, S. (2002) 'Management of computer misuse committed by employees within organisations', MPhil Thesis (Information Systems), De Montfort University, Leicester, p.351.
-
(2002)
Management of computer misuse committed by employees within organisations
, pp. 351
-
-
Kesar, S.1
-
38
-
-
84976745037
-
Ethical concepts and information technology
-
Laudon, K.C. (1995) 'Ethical concepts and information technology', Communications of the ACM, Vol. 38, No. 12, pp.33-39.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 33-39
-
-
Laudon, K.C.1
-
40
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of IT misuse
-
Magklaras, G.B. and Furnell, S.M. (2003) 'Insider threat prediction tool: Evaluating the probability of IT misuse', Computers & Security Vol. 21, No. 1, pp.62-73.
-
(2003)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
41
-
-
24344460927
-
-
Magklaras, G.B. and Furnell, S.M. (2005) 'A preliminary model of end user sophistication for insider threat prediction in IT systems', Vol. 24, No. 5, pp.371-380.
-
(2005)
A preliminary model of end user sophistication for insider threat prediction in IT systems
, vol.24
, Issue.5
, pp. 371-380
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
42
-
-
0036535306
-
The persistence of knowledge-based advantage: An empirical test for product performance and technological knowledge
-
McEvily, S.K. and Chakravarthy, B. (2002) 'The persistence of knowledge-based advantage: An empirical test for product performance and technological knowledge', Strategic Management Journal, Vol. 23, pp.285-305.
-
(2002)
Strategic Management Journal
, vol.23
, pp. 285-305
-
-
McEvily, S.K.1
Chakravarthy, B.2
-
45
-
-
0022298184
-
Strategy formation in an adhocracy
-
Mintzberg, H. and McHugh, A. (1985) 'Strategy formation in an adhocracy', Administration Sciences, Vol. 30, No. 2, pp.160-197.
-
(1985)
Administration Sciences
, vol.30
, Issue.2
, pp. 160-197
-
-
Mintzberg, H.1
McHugh, A.2
-
50
-
-
85071808588
-
The tacit dimension
-
L. Prusak Ed, Boston, MA: Butterworth-Heinemann, pp
-
Polanyi, M. (1997) 'The tacit dimension', in L. Prusak (Ed.) Knowledge in Organizations, Boston, MA: Butterworth-Heinemann, pp.135-146.
-
(1997)
Knowledge in Organizations
, pp. 135-146
-
-
Polanyi, M.1
-
51
-
-
47049098580
-
-
Price Waterhouse Report (1995) 'Baring futures (Singapore) Pte Ltd: investigation pursuant to Section 231 of the Companies Act (Chapter 50)', in C.S.M. Lim and N.K.N. Tan (Eds.) The Report of the Inspectors from Price Waterhouse Appointed by the Minister of Finance September.
-
Price Waterhouse Report (1995) 'Baring futures (Singapore) Pte Ltd: investigation pursuant to Section 231 of the Companies Act (Chapter 50)', in C.S.M. Lim and N.K.N. Tan (Eds.) The Report of the Inspectors from Price Waterhouse Appointed by the Minister of Finance September.
-
-
-
-
52
-
-
33745810594
-
Knowledge management: Securing the future
-
Randeree, E. (2006) 'Knowledge management: Securing the future', Journal of Knowledge Management, Vol. 10, No. 4, pp.145-156.
-
(2006)
Journal of Knowledge Management
, vol.10
, Issue.4
, pp. 145-156
-
-
Randeree, E.1
-
54
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E.E. (2002) 'A framework for understanding and predicting insider attacks', Computers & Security, Vol. 21, No. 6, pp.526-531.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
55
-
-
0003638155
-
-
New York: Doubleday
-
Senge, P., Kleiner, A., Roberts, C., Ross, R.G. and Smith, B. (1999) The Dance of Change: The Challenges to Sustaining Momentum in Learning Organisations, New York: Doubleday.
-
(1999)
The Dance of Change: The Challenges to Sustaining Momentum in Learning Organisations
-
-
Senge, P.1
Kleiner, A.2
Roberts, C.3
Ross, R.G.4
Smith, B.5
-
56
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M.T. (2000) 'A conceptual foundation for organizational information security awareness', Information Management & Computer Security, Vol. 8, No. 1, pp.31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
57
-
-
0011644488
-
An analysis of the recent IS security development approaches: Descriptive and prescriptive implications
-
G. Dhillon Ed, Hershey: Idea Group Publishing, pp
-
Siponen, M.T. (2001) 'An analysis of the recent IS security development approaches: Descriptive and prescriptive implications', in G. Dhillon (Ed.) Information Security Management: Global Challenges in the New Millennium, Hershey: Idea Group Publishing, pp.125-134.
-
(2001)
Information Security Management: Global Challenges in the New Millennium
, pp. 125-134
-
-
Siponen, M.T.1
-
59
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D.W. (1990) 'Effective IS security: An empirical study', Information System Research, Vol. 1, No. 2, pp.255-277.
-
(1990)
Information System Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
60
-
-
0001133137
-
Coping with systems risks: Security planning models for management decision making
-
Straub, D.W. and Welke, R.J. (1998) 'Coping with systems risks: Security planning models for management decision making', MIS Quarterly, Vol. 22, No. 4, pp.441-464.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
61
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, M.E. and von Solms, R. (1998) 'Information security awareness: educating your users effectively', Information Management & Computer Security, Vol. 6, No. 4, pp.167-173.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
von Solms, R.2
-
62
-
-
0011586156
-
Why information security is so important
-
Von Solms, R. (1998) 'Why information security is so important', Information Security Management, Vol. 6, No. 5, pp.224-225.
-
(1998)
Information Security Management
, vol.6
, Issue.5
, pp. 224-225
-
-
Von Solms, R.1
-
63
-
-
0039639238
-
Organizational computer security policy: The reality
-
Warman, A.R. (1992) 'Organizational computer security policy: The reality', European Journal of Information Systems, Vol. 1, No. 5, pp.305-310.
-
(1992)
European Journal of Information Systems
, vol.1
, Issue.5
, pp. 305-310
-
-
Warman, A.R.1
-
65
-
-
0011596524
-
Knowledge and the speed of the transfer and imitation of organizational capabilities: An empirical test
-
Zander, U. and Kogut, B. (1995) 'Knowledge and the speed of the transfer and imitation of organizational capabilities: An empirical test', Organisation Science, Vol. 6, pp.76-92.
-
(1995)
Organisation Science
, vol.6
, pp. 76-92
-
-
Zander, U.1
Kogut, B.2
|