-
1
-
-
0035638270
-
"Who wants to be an evolutionary theorist? Remarks on the occasion of the year 2000"
-
Aldrich, H.E. (2001), "Who wants to be an evolutionary theorist? Remarks on the occasion of the year 2000", OMT Distinguished Scholarly Career Award Presentation, Journal of Management Inquiry, Vol. 10, pp. 115-27.
-
(2001)
Journal of Management Inquiry
, vol.10
, pp. 115-127
-
-
Aldrich, H.E.1
-
2
-
-
67650136608
-
"Grounded action research: A method for understanding IT in practice"
-
Baskerville, R. and Pries-Heje, J. (1999), "Grounded action research: A method for understanding IT in practice", Accounting, Management and Information Technologies, Vol. 9 No. 1, pp. 1-23.
-
(1999)
Accounting, Management and Information Technologies
, vol.9
, Issue.1
, pp. 1-23
-
-
Baskerville, R.1
Pries-Heje, J.2
-
3
-
-
49249110420
-
"Towards a dynamic and adaptive information security awareness approach"
-
Casmir, R. and Yngström, L. (2005), "Towards a dynamic and adaptive information security awareness approach", Proceedings of the IFIP TC11 WG11.8 4th World Conference on Information Security Education (WISE4), Moscow, Russia, pp. 162-73.
-
(2005)
Proceedings of the IFIP TC11 WG11.8 4th World Conference on Information Security Education (WISE4), Moscow, Russia
, pp. 162-173
-
-
Casmir, R.1
Yngström, L.2
-
5
-
-
3242808612
-
-
CSI/FBI Computer Security Institute, available at: (accessed February 20, 2007)
-
CSI/FBI (2005), Computer Crime and Security Survey 2005, Computer Security Institute, available at: www.cpppe.umd.edu/Bookstore/Documents/ 2005CSISurvey.pdf (accessed February 20, 2007).
-
(2005)
Computer Crime and Security Survey 2005
-
-
-
6
-
-
33748435812
-
-
CSI/FBI Computer Security Institute, available at: (accessed March 15, 2007)
-
CSI/FBI (2006), Computer Crime and Security Survey 2006, Computer Security Institute, available at: Http://i.cmpnet.com/gocsi/db_area/pdfs/ fbi/FBI2006.pdf (accessed March 15, 2007).
-
(2006)
Computer Crime and Security Survey 2006
-
-
-
7
-
-
49249116220
-
-
ENISA European Network and Information Security Agency, available at: (accessed February 20, 2007)
-
ENISA (2006), A Users' Guide: How to Raise Information Security Awareness, European Network and Information Security Agency, available at: www.enisa.europa.eu/doc/pdf/deliverables/ enisa_a_users_guide_how_to_raise_IS_awareness.pdf (accessed February 20, 2007).
-
(2006)
A Users' Guide: How to Raise Information Security Awareness
-
-
-
8
-
-
49249113943
-
-
Ernst & Young Global Information Security Survey available at: (accessed February 20, 2007)
-
Ernst & Young Global Information Security Survey (2004), Annual Global Information Security Survey, Report, available at: www.ivpv.ugent.be/nl/opleidingen/aanbod/ictbeveiliging2005/ 2004_Global_Information_Security_Survey_2004.pdf (accessed February 20, 2007).
-
(2004)
Annual Global Information Security Survey Report
-
-
-
9
-
-
84923430719
-
-
Ernst & Young Global Information Security Survey available at: (accessed February 20, 2007)
-
Ernst & Young Global Information Security Survey (2005), Annual Global Information Security Survey, Report, available at: www.vistorm.com/uplds/EY_Global_Information_Security_survey_20051.pdf (accessed February 20, 2007).
-
(2005)
Annual Global Information Security Survey, Report
-
-
-
10
-
-
33644755338
-
"Security awareness: Switch to a better programme"
-
Everett, C.J. (2006), "Security awareness: Switch to a better programme", Network Security, No. 2, pp. 15-18.
-
(2006)
Network Security
, Issue.2
, pp. 15-18
-
-
Everett, C.J.1
-
11
-
-
33744784411
-
"Designing a security awareness program: Part I"
-
Hansche, S. (2001), "Designing a security awareness program: Part I", Information Systems Security, Vol. 9 No. 6, pp. 14-23.
-
(2001)
Information Systems Security
, vol.9
, Issue.6
, pp. 14-23
-
-
Hansche, S.1
-
12
-
-
0012954414
-
"Models of change and information systems research"
-
in Nissen, H.E., Klein, H.K. and Hirschheim, R. (Eds), Elsevier Science Publishers, Amsterdam
-
Kaplan, B. (1991), "Models of change and information systems research", in Nissen, H.E., Klein, H.K. and Hirschheim, R. (Eds), Information Systems Research: Contemporary Approaches and Emergent Traditions, Elsevier Science Publishers, Amsterdam, pp. 593-611.
-
(1991)
Information Systems Research: Contemporary Approaches and Emergent Traditions
, pp. 593-611
-
-
Kaplan, B.1
-
13
-
-
33644556599
-
-
(ISC)2 Inc., Framingham, MA
-
Knapp, K.J., Marshall, T.E., Rainer, R.K. and Morrow, D.W. (2004), Top Ranked Information Security Issues: The 2004 International Information Systems Security Certification Consortium (ISC)2 Survey Results, (ISC)2 Inc., Framingham, MA.
-
(2004)
Top Ranked Information Security Issues: The 2004 International Information Systems Security Certification Consortium (ISC)2 Survey Results
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Morrow, D.W.4
-
14
-
-
49249103382
-
-
doctoral dissertation, University of South Africa, available at: (accessed February 20, 2007)
-
Kritzinger, E. (2006), "An information security retrieval and awareness model for industry", doctoral dissertation, University of South Africa, available at: Http://etd.unisa.ac.za/ETD-db/ETD-desc/ describe?urn=etd-11062006-094238 (accessed February 20, 2007).
-
(2006)
"An Information Security Retrieval and Awareness Model for Industry"
-
-
Kritzinger, E.1
-
15
-
-
33746994612
-
"A prototype for assessing information security awareness"
-
Kruger, H.A. and Kearney, W.D. (2006), "A prototype for assessing information security awareness", Computers & Security, Vol. 25 No. 1, pp. 289-96.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 289-296
-
-
Kruger, H.A.1
Kearney, W.D.2
-
16
-
-
0345764837
-
"Improving user security behavior"
-
Leach, J. (2003), "Improving user security behavior", Computers & Security, Vol. 22 No. 8, pp. 685-92.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
17
-
-
33845340126
-
"Grounded theory analysis of e-government initiatives: Exploring perceptions of government authorities"
-
Lee, J. and Kim, J. (2007), "Grounded theory analysis of e-government initiatives: Exploring perceptions of government authorities", Government Information Quarterly, Vol. 24 No. 1, pp. 135-47.
-
(2007)
Government Information Quarterly
, vol.24
, Issue.1
, pp. 135-147
-
-
Lee, J.1
Kim, J.2
-
18
-
-
22144444128
-
"Information systems for multinational enterprises - Some factors at work in their design and implementation"
-
Lehmann, H. and Gallupe, B. (2005), "Information systems for multinational enterprises - some factors at work in their design and implementation", Journal of International Management, Vol. 11 No. 2, pp. 163-86.
-
(2005)
Journal of International Management
, vol.11
, Issue.2
, pp. 163-186
-
-
Lehmann, H.1
Gallupe, B.2
-
21
-
-
84934933083
-
"Information technology and organizational change: Causal structure in theory and research"
-
Markus, M.L. and Daniel, R. (1988), "Information technology and organizational change: Causal structure in theory and research", Management Science, Vol. 34 No. 5, pp. 583-98.
-
(1988)
Management Science
, vol.34
, Issue.5
, pp. 583-598
-
-
Markus, M.L.1
Daniel, R.2
-
22
-
-
45749094057
-
-
Master's thesis, NISlab Norwegian Information Security Laboratory, Campus IT University, available at: (accessed February 20, 2007)
-
Mathisen, J. (2004), "Measuring information security awareness - a survey showing the Norwegian way to do it", Master's thesis, NISlab Norwegian Information Security Laboratory, Campus IT University, available at: www.dsv.su.se/research/seclab/pages/msckththeses-en.html (accessed February 20, 2007).
-
(2004)
"Measuring Information Security Awareness - A Survey Showing the Norwegian Way To Do It"
-
-
Mathisen, J.1
-
24
-
-
0038007944
-
"Re-examining fundamental GIS implementation constructs through a grounded theory approach"
-
Nasirin, S., Birks, D.F. and Jones, B. (2003), "Re-examining fundamental GIS implementation constructs through a grounded theory approach", Telematics and Informatics, Vol. 20 No. 4, pp. 331-47.
-
(2003)
Telematics and Informatics
, vol.20
, Issue.4
, pp. 331-347
-
-
Nasirin, S.1
Birks, D.F.2
Jones, B.3
-
25
-
-
1542493643
-
"CASE tools as organizational change: Investigating incremental and radical changes in systems development"
-
Orlikowski, W. (1993), "CASE tools as organizational change: investigating incremental and radical changes in systems development", Management Information Systems Quarterly, Vol. 17 No. 3, pp. 309-40.
-
(1993)
Management Information Systems Quarterly
, vol.17
, Issue.3
, pp. 309-340
-
-
Orlikowski, W.1
-
26
-
-
84993099250
-
"Implementing an information security awareness program"
-
Peltier, T.R. (2005), "Implementing an information security awareness program", Information Systems Security, Vol. 14 No. 2, pp. 37-48.
-
(2005)
Information Systems Security
, vol.14
, Issue.2
, pp. 37-48
-
-
Peltier, T.R.1
-
27
-
-
0033246744
-
"Building process theory with narrative: From description to explanation"
-
Pentland, B.T. (1999), "Building process theory with narrative: from description to explanation", Academy of Management Review, Vol. 24 No. 4, pp. 711-24.
-
(1999)
Academy of Management Review
, vol.24
, Issue.4
, pp. 711-724
-
-
Pentland, B.T.1
-
28
-
-
0003806663
-
-
Oxford University Press, Oxford
-
Poole, M.S., van de Ven, A.H., Dooley, K. and Holmes, M.E. (2000), Organizational Change and Innovation Process, Oxford University Press, Oxford.
-
(2000)
Organizational Change and Innovation Process
-
-
Poole, M.S.1
van de Ven, A.H.2
Dooley, K.3
Holmes, M.E.4
-
29
-
-
49249131489
-
-
doctoral dissertation, Department of Information Processing Science, University of Oulu, available at: (accessed February 20, 2007)
-
Puhakainen, P. (2006), "A design theory for information security awareness", doctoral dissertation, Department of Information Processing Science, University of Oulu, available at: Http:// herkules.oulu.fi/isbn9514281144 (accessed February 20, 2007).
-
(2006)
"A Design Theory for Information Security Awareness"
-
-
Puhakainen, P.1
-
30
-
-
21144465972
-
"The organizational taxonomy: Definition and design"
-
Rich, P. (1992), "The organizational taxonomy: Definition and design", Academy of Management Review, Vol. 17 No. 4, pp. 758-81.
-
(1992)
Academy of Management Review
, vol.17
, Issue.4
, pp. 758-781
-
-
Rich, P.1
-
31
-
-
84905725481
-
-
Security Awareness Index Report ITToolBox and Pentasafe, available at: (accessed February 20, 2007)
-
Security Awareness Index Report (2002), "The state of security awareness among organizations worldwide", ITToolBox and Pentasafe, available at: Http://security.ittoolbox.com/pub/AM101502a.pdf (accessed February 20, 2007).
-
(2002)
"The State of Security Awareness Among Organizations Worldwide"
-
-
-
33
-
-
0033683516
-
"A conceptual foundation for organizational information security awareness"
-
Siponen, T.M. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, T.M.1
-
35
-
-
0242453511
-
"Promoting security awareness and commitment"
-
Spurling, P. (1995), "Promoting security awareness and commitment", Information Management & Computer Security, Vol. 3 No. 2, pp. 20-6.
-
(1995)
Information Management & Computer Security
, vol.3
, Issue.2
, pp. 20-26
-
-
Spurling, P.1
-
36
-
-
17844366573
-
"Analysis of end user security behaviours"
-
Stanton, M.J., Stam, R.K., Mastrangelo, P. and Jolton, J. (2005), "Analysis of end user security behaviours", Computers & Security, Vol. 24 No. 2, pp. 124-33.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, M.J.1
Stam, R.K.2
Mastrangelo, P.3
Jolton, J.4
-
37
-
-
0037941821
-
-
Sage, Newbury Park, CA
-
Strauss, A. and Corbin, J. (1990), Basics of Qualitative Research: Grounded Theory Procedures and Techniques, Sage, Newbury Park, CA.
-
(1990)
Basics of Qualitative Research: Grounded Theory Procedures and Techniques
-
-
Strauss, A.1
Corbin, J.2
-
38
-
-
49249116071
-
"Making information security awareness and training more effective"
-
Thomson, M.E. (1999), "Making information security awareness and training more effective", Proceedings of the IFIP TC11 WG11.3 First World Conference on Information Security Education (WISE1), Kista, Sweden, pp. 261-70.
-
(1999)
Proceedings of the IFIP TC11 WG11.3 First World Conference on Information Security Education (WISE1), Kista, Sweden
, pp. 261-270
-
-
Thomson, M.E.1
-
39
-
-
0242517401
-
"Information security awareness: Educating your users effectively"
-
Thomson, M.E. and von Solms, R. (1998), "Information security awareness: Educating your users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
von Solms, R.2
-
41
-
-
1142290930
-
"Event- and outcome-driven explanations of entrepreneurship"
-
van de Ven, A.H. and Engleman, R. (2004), "Event- and outcome-driven explanations of entrepreneurship", Journal of Business Venturing, Vol. 19, pp. 343-58.
-
(2004)
Journal of Business Venturing
, vol.19
, pp. 343-358
-
-
van de Ven, A.H.1
Engleman, R.2
-
42
-
-
21844497076
-
"Explaining development and change in organizations"
-
van de Ven, A.H. and Poole, M.S. (1995), "Explaining development and change in organizations", Academy of Management Review, Vol. 20 No. 3, pp. 510-40.
-
(1995)
Academy of Management Review
, vol.20
, Issue.3
, pp. 510-540
-
-
van de Ven, A.H.1
Poole, M.S.2
|