-
1
-
-
49249127698
-
-
available at: (accessed February 2007)
-
Avolio, F. (2000), "Best practices in network security", available at: www.networkcomputing.com/1105/1105f2.html?ls=NCJS_1105bt (accessed February 2007).
-
(2000)
"Best Practices in Network Security"
-
-
Avolio, F.1
-
2
-
-
49249130061
-
"Information systems security: Principles and perspectives"
-
Sprint E/Solutions White Paper, Overland Park, KS
-
Bachman, D. (2002), "Information systems security: Principles and perspectives", Sprint E/Solutions White Paper, Overland Park, KS.
-
(2002)
-
-
Bachman, D.1
-
3
-
-
12244306739
-
An information security meta-policy for emergent organizations
-
Baskerville, R. and Siponen, M. (2002), "An information security meta-policy for emergent organizations", Journal of Logistics Information Management, Vol. 15 Nos 5/6, pp. 337-46.
-
(2002)
Journal of Logistics Information Management
, vol.15
, Issue.5-6
, pp. 337-346
-
-
Baskerville, R.1
Siponen, M.2
-
6
-
-
49249098577
-
-
available at: (accessed February 2007)
-
Briney, A. and Prince, F. (2002), "Does size matter?", available at: www.infosecuritymag.com/2002/sep/2002survey.pdf (accessed February 2007).
-
(2002)
"Does Size Matter?"
-
-
Briney, A.1
Prince, F.2
-
10
-
-
23044525969
-
"Current directions in IS security research: Towards socio-organizational perspectives"
-
Dhillon, G. and Blackhouse, J. (2001), "Current directions in IS security research: Towards socio-organizational perspectives", Information Systems Journal, Vol. 11 No. 2, pp. 127-53.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Blackhouse, J.2
-
11
-
-
33744830087
-
"Value-focused assessment of information system security in organizations"
-
Dhillon, G. and Torkzadeh, G. (2006), "Value-focused assessment of information system security in organizations", Information Systems Journal, Vol. 16 No. 3, pp. 293-314.
-
(2006)
Information Systems Journal
, vol.16
, Issue.3
, pp. 293-314
-
-
Dhillon, G.1
Torkzadeh, G.2
-
12
-
-
77949838547
-
-
EarthWeb available at: (accessed February 2007)
-
EarthWeb (2003), "IT management", available at: Http:// itmanagement.webopedia.com/TERM/N/nonrepudiation.html (accessed February 2007).
-
(2003)
"IT Management"
-
-
-
13
-
-
49249083359
-
"Information security becomes a business priority"
-
Filipek, R. (2007), "Information security becomes a business priority", Internal Auditor, Vol. 64 No. 1, p. 18.
-
(2007)
Internal Auditor
, vol.64
, Issue.1
, pp. 18
-
-
Filipek, R.1
-
14
-
-
0002042413
-
"The 9 to 5 underground: Are you policing computer crimes?"
-
Hoffer, J. and Straub, D. (1989), "The 9 to 5 underground: Are you policing computer crimes?", Sloan Management Review, Vol. 30 No. 4, pp. 35-43.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-43
-
-
Hoffer, J.1
Straub, D.2
-
16
-
-
0003016872
-
-
3rd ed., Wiley, New York, NY
-
Hutt, A., Bosworth, S. and Hoyt, D. (1995), Computer Security Handbook, 3rd ed., Wiley, New York, NY.
-
(1995)
Computer Security Handbook
-
-
Hutt, A.1
Bosworth, S.2
Hoyt, D.3
-
17
-
-
49249119755
-
"Improved security through information security governance"
-
Fall (in press)
-
Johnston, A. and Hale, R. (2007), "Improved security through information security governance", Communications of the ACM, Fall (in press).
-
(2007)
Communications of the ACM
-
-
Johnston, A.1
Hale, R.2
-
18
-
-
84870869739
-
"Analyzing interorganizational information sharing strategies in B2B e-commerce supply chains"
-
Kauffman, R. and Mohtadi, H. (2003), "Analyzing interorganizational information sharing strategies in B2B e-commerce supply chains", Proceedings of INFORMS Conference on Information Systems and Technology, Atlanta, GA.
-
(2003)
Proceedings of INFORMS Conference on Information Systems and Technology, Atlanta, GA
-
-
Kauffman, R.1
Mohtadi, H.2
-
19
-
-
0033995591
-
"Information technology in the retail food industry"
-
Kinsey, J. and Ashman, S. (2000), "Information technology in the retail food industry", Technology in Society, Vol. 22 No. 1, pp. 83-96.
-
(2000)
Technology in Society
, vol.22
, Issue.1
, pp. 83-96
-
-
Kinsey, J.1
Ashman, S.2
-
21
-
-
0042394600
-
-
CRC Press, Boca Raton, FL
-
Krauss, M. and Tipton, H. (2002), Handbook of Information Security Management, CRC Press, Boca Raton, FL.
-
(2002)
Handbook of Information Security Management
-
-
Krauss, M.1
Tipton, H.2
-
22
-
-
84958970458
-
"Organizational modeling for efficient specification of information security requirements"
-
Leiwo, J., Gamage, C. and Zheng, Y. (1999), "Organizational modeling for efficient specification of information security requirements", Advances in Databases and Information Systems: 3rd East European Conference, ADBIS'99, Maribor, pp. 247-60.
-
(1999)
Advances in Databases and Information Systems: 3rd East European Conference, ADBIS'99, Maribor
, pp. 247-260
-
-
Leiwo, J.1
Gamage, C.2
Zheng, Y.3
-
23
-
-
49249132793
-
"A socio-technical perspective on information security knowledge and attitudes"
-
unpublished dissertation, The University of Texas at Austin, Austin, TX
-
Long, C. (1999), "A socio-technical perspective on information security knowledge and attitudes", unpublished dissertation, The University of Texas at Austin, Austin, TX.
-
(1999)
-
-
Long, C.1
-
24
-
-
4243084359
-
"Standards insecurity"
-
Mercuri, R. (2003), "Standards insecurity", Communications of the ACM, Vol. 46 No. 12, pp. 21-5.
-
(2003)
Communications of the ACM
, vol.46
, Issue.12
, pp. 21-25
-
-
Mercuri, R.1
-
25
-
-
1642318365
-
"Toward a new framework for information security"
-
in Bosworth, S. and Kabay, M.E. (Eds), Wiley, New York, NY
-
Parker, D. (2002), "Toward a new framework for information security", in Bosworth, S. and Kabay, M.E. (Eds), Computer Security Handbook, Wiley, New York, NY.
-
(2002)
Computer Security Handbook
-
-
Parker, D.1
-
26
-
-
49249110281
-
"Establishing business controls for electronic mail communications"
-
Peltier, T. (2003), "Establishing business controls for electronic mail communications", Information Systems Security, Vol. 12, pp. 34-43.
-
(2003)
Information Systems Security
, vol.12
, pp. 34-43
-
-
Peltier, T.1
-
27
-
-
0042484572
-
"2002 CSI/FBI computer crime and security survey"
-
Power, R. (2002), "2002 CSI/FBI computer crime and security survey", Computer Security Issues &Trends, Vol. 8 No. 1, pp. 1-22.
-
(2002)
Computer Security Issues &Trends
, vol.8
, Issue.1
, pp. 1-22
-
-
Power, R.1
-
28
-
-
1642344244
-
"IT security and multilateral security"
-
in Muller, G. and Rannenberg, K. (Eds), Addison-Wesley-Longman, Reading, MA
-
Rannenberg, K., Pfitzmann, A. and Muller, G. (1999), "IT security and multilateral security", in Muller, G. and Rannenberg, K. (Eds), Multilateral Security in Communications - Technology, Infrastructure, Economy, Addison-Wesley-Longman, Reading, MA.
-
(1999)
Multilateral Security in Communications - Technology, Infrastructure, Economy
-
-
Rannenberg, K.1
Pfitzmann, A.2
Muller, G.3
-
29
-
-
49249132931
-
"Intrusion detection technology: Leveraging the organization's security posture"
-
Rosenthal, D. (2002), "Intrusion detection technology: Leveraging the organization's security posture", Information Systems Management, Vol. 19 No. 1, pp. 35-44.
-
(2002)
Information Systems Management
, vol.19
, Issue.1
, pp. 35-44
-
-
Rosenthal, D.1
-
31
-
-
0033683516
-
"A conceptual foundation for organizational information security awareness"
-
Siponen, M. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
32
-
-
44649191395
-
"A design theory for secure information systems design methods"
-
Siponen, M., Baskerville, R. and Heikka, J. (2006), "A design theory for secure information systems design methods", Journal of the Association for Information Systems, Vol. 7 No. 11, pp. 725-70.
-
(2006)
Journal of the Association for Information Systems
, vol.7
, Issue.11
, pp. 725-770
-
-
Siponen, M.1
Baskerville, R.2
Heikka, J.3
-
34
-
-
0001133137
-
"Coping with systems risk: Security planning models for management decision making"
-
Straub, D. and Welke, R. (1998), "Coping with systems risk: security planning models for management decision making", MIS Quarterly, Vol. 22 No. 4, pp. 441-69.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
36
-
-
0033277446
-
"Password security: An empirical study"
-
Zviran, M. and Haga, W. (1999), "Password security: An empirical study", Journal of Management Information Systems, Vol. 15 No. 4, pp. 161-85.
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.2
|