-
1
-
-
85013137347
-
The Effects of Outsourcing on Information Security
-
Alner, M. (2001). The Effects of Outsourcing on Information Security, Information Systems Security 10(2): 35-43.
-
(2001)
Information Systems Security
, vol.10
, Issue.2
, pp. 35-43
-
-
Alner, M.1
-
3
-
-
0004282030
-
-
2nd edn, San Francisco, CA: Jossey-Bass Publishers
-
Argyris, C., Putnam, R. and McLain Smith, D. (1987). Action Science, 2nd edn, San Francisco, CA: Jossey-Bass Publishers.
-
(1987)
Action Science
-
-
Argyris, C.1
Putnam, R.2
McLain Smith, D.3
-
4
-
-
71549173177
-
Toward an Assessment of Software Development Risk
-
Barki, H., Rivard, S. and Talbot, J. (1993). Toward an Assessment of Software Development Risk, Journal of Management Information Systems 10(2): 203-225.
-
(1993)
Journal of Management Information Systems
, vol.10
, Issue.2
, pp. 203-225
-
-
Barki, H.1
Rivard, S.2
Talbot, J.3
-
7
-
-
16344391307
-
Special Issue on Action Research in Information Systems: Making IS research relevant to practice - foreword
-
Baskerville, R.I. and Myers, M.D. (2004). Special Issue on Action Research in Information Systems: Making IS research relevant to practice - foreword, MIS Quarterly 28(3): 329-335.
-
(2004)
MIS Quarterly
, vol.28
, Issue.3
, pp. 329-335
-
-
Baskerville, R.I.1
Myers, M.D.2
-
8
-
-
0041379357
-
A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection
-
Baskerville, R.I. and Portougal, V. (2003). A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection, Journal of Database Management 14(2): 1-13.
-
(2003)
Journal of Database Management
, vol.14
, Issue.2
, pp. 1-13
-
-
Baskerville, R.I.1
Portougal, V.2
-
9
-
-
55249084997
-
The Case Research Strategy in Studies of Information Systems
-
Benbasat, I., Goldstein, D.K. and Mead, M. (1987). The Case Research Strategy in Studies of Information Systems, MIS Quarterly 11(3): 369-386.
-
(1987)
MIS Quarterly
, vol.11
, Issue.3
, pp. 369-386
-
-
Benbasat, I.1
Goldstein, D.K.2
Mead, M.3
-
11
-
-
4243109556
-
A Model for Evaluating IT Security Investments
-
Cavusoglu, H., Mishra, B. and Raghunathan, S. (2004). A Model for Evaluating IT Security Investments, Communications of the ACM 47(7): 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
12
-
-
0000160406
-
From Framework Through Experience to Learning: The essential nature of action research
-
H.-E. Nissen and H.K. Klein eds, Amsterdam: North-Holland
-
Checkland, P. (1991). From Framework Through Experience to Learning: The essential nature of action research, in H.-E. Nissen and H.K. Klein (eds.) Information Systems Research: Contemporary approaches & emergent traditions, Amsterdam: North-Holland.
-
(1991)
Information Systems Research: Contemporary approaches & emergent traditions
-
-
Checkland, P.1
-
13
-
-
29144447958
-
-
Centre for Analysis of Risk and Regulation at the London School of Economics and Political Science, Discussion paper No, 27
-
Ciborra, C. (2004). Digital Technologies and the Duality of Risk, Centre for Analysis of Risk and Regulation at the London School of Economics and Political Science, Discussion paper No : 27, 1-20.
-
(2004)
Digital Technologies and the Duality of Risk
, pp. 1-20
-
-
Ciborra, C.1
-
15
-
-
0027702789
-
Securing your Business Process
-
Collins, B.S. and Mathews, S. (1993). Securing your Business Process, Computers & Security 12(7): 629-634.
-
(1993)
Computers & Security
, vol.12
, Issue.7
, pp. 629-634
-
-
Collins, B.S.1
Mathews, S.2
-
16
-
-
0011420610
-
Information Systems Outsourcing by Large American Industrial Firms: Choices and impacts
-
Collins, J.S. and Milien, R.A. (1995). Information Systems Outsourcing by Large American Industrial Firms: Choices and impacts, Information Resources Management Journal 8(1): 5-13.
-
(1995)
Information Resources Management Journal
, vol.8
, Issue.1
, pp. 5-13
-
-
Collins, J.S.1
Milien, R.A.2
-
17
-
-
10244236477
-
Sarbanes-Oxley and IT Governance: New guidance on IT control and compliance
-
Damianides, M. (2005). Sarbanes-Oxley and IT Governance: New guidance on IT control and compliance, Information Systems Management 22(1): 77-85.
-
(2005)
Information Systems Management
, vol.22
, Issue.1
, pp. 77-85
-
-
Damianides, M.1
-
18
-
-
49749108866
-
Information Protection and Business Process Reengineering
-
DeMaio, H.B. (1995). Information Protection and Business Process Reengineering, Information Systems Security 3(4): 5-10.
-
(1995)
Information Systems Security
, vol.3
, Issue.4
, pp. 5-10
-
-
DeMaio, H.B.1
-
19
-
-
49749150459
-
-
accessed 3 April, 2007
-
Department of Trade and Industry (2007). Business Continuity Management, Impact Analysis [www document]http://www.dti.gov.uk/sectors/infosec/ infosecadvice/continuitymanagement/impactanalysis/page33399.html(accessed 3 April, 2007).
-
(2007)
Business Continuity Management, Impact Analysis [www document]
-
-
-
20
-
-
70449576952
-
Realizing Benefits of an Information Security Program
-
Dhillon, G. (2004). Realizing Benefits of an Information Security Program, Business Process Management 10(3): 260-261.
-
(2004)
Business Process Management
, vol.10
, Issue.3
, pp. 260-261
-
-
Dhillon, G.1
-
21
-
-
0034516080
-
Information Security Management: An approach to combine process certification and product evaluation
-
Eloff, M.M. and von Solms, S.H. (2000). Information Security Management: An approach to combine process certification and product evaluation, Computers & Security 19(8): 698-709.
-
(2000)
Computers & Security
, vol.19
, Issue.8
, pp. 698-709
-
-
Eloff, M.M.1
von Solms, S.H.2
-
22
-
-
85013069388
-
Outsourcing Security: The need, the risks, the providers, and the process
-
Endorf, C. (2004). Outsourcing Security: The need, the risks, the providers, and the process, Information Security Management 12(6): 17-23.
-
(2004)
Information Security Management
, vol.12
, Issue.6
, pp. 17-23
-
-
Endorf, C.1
-
23
-
-
0642264602
-
A Security Framework for Information Systems Outsourcing
-
Fink, D. (1994). A Security Framework for Information Systems Outsourcing, Information Management & Computer Security 2(4): 3-8.
-
(1994)
Information Management & Computer Security
, vol.2
, Issue.4
, pp. 3-8
-
-
Fink, D.1
-
25
-
-
0002638021
-
Choosing Appropriate Information Systems Research Approaches
-
H.-E. Nissen and H.K. Klein eds, Amsterdam: North-Holland
-
Galliers, R.D. (1991). Choosing Appropriate Information Systems Research Approaches, in H.-E. Nissen and H.K. Klein (eds.) Information Systems Research: Contemporary approaches & emergent traditions, Amsterdam: North-Holland.
-
(1991)
Information Systems Research: Contemporary approaches & emergent traditions
-
-
Galliers, R.D.1
-
26
-
-
85013136025
-
The Finaincial Impact of IT Security Breaches: What do investors think
-
Garg, A., Curtis, J. and Halper, H. (2003a). The Finaincial Impact of IT Security Breaches: What do investors think, Information Systems Security 12(1): 22-33.
-
(2003)
Information Systems Security
, vol.12
, Issue.1
, pp. 22-33
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
27
-
-
0042363394
-
Quantifying the Financial Impact of IT Security Breaches
-
Garg, A., Curtis, J. and Halper, H. (2003b). Quantifying the Financial Impact of IT Security Breaches, Information Management & Computer Security 11(2): 74-83.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.2
, pp. 74-83
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
28
-
-
4944234006
-
Return on Information Security Investments, Myths vs Realities
-
Gordon, L.A. and Loeb, M.P. (2002). Return on Information Security Investments, Myths vs Realities, Strategic Finance 84(5): 26-31.
-
(2002)
Strategic Finance
, vol.84
, Issue.5
, pp. 26-31
-
-
Gordon, L.A.1
Loeb, M.P.2
-
29
-
-
85017361394
-
The Impact of Virus Attack Announcements on the Market Value of Firms
-
Hovav, A. and D'Arcy, J. (2004). The Impact of Virus Attack Announcements on the Market Value of Firms, Information Systems Security 13(2): 32-40.
-
(2004)
Information Systems Security
, vol.13
, Issue.2
, pp. 32-40
-
-
Hovav, A.1
D'Arcy, J.2
-
30
-
-
33751161222
-
A Longitudinal Study of Information Systems Threat Categories: The enduring problem of human error
-
Im, G.P. and Baskerville, R.L. (2005). A Longitudinal Study of Information Systems Threat Categories: The enduring problem of human error, The DATA BASE for Advances in Information Systems 36(4): 68-79.
-
(2005)
The DATA BASE for Advances in Information Systems
, vol.36
, Issue.4
, pp. 68-79
-
-
Im, G.P.1
Baskerville, R.L.2
-
32
-
-
0001841217
-
Business Process Change: A study of methodologies, techniques and tools
-
Kettinger, W.J., Teng, J. and Guha, S. (1997). Business Process Change: A study of methodologies, techniques and tools, MIS Quarterly 21(1): 55-80.
-
(1997)
MIS Quarterly
, vol.21
, Issue.1
, pp. 55-80
-
-
Kettinger, W.J.1
Teng, J.2
Guha, S.3
-
33
-
-
1242265180
-
Information Security Considerations in IS/IT Outsourcing Projects: A descriptive case study of two sectors
-
Khalfan, A.M. (2004). Information Security Considerations in IS/IT Outsourcing Projects: A descriptive case study of two sectors, International Journal of Information Management 24(1): 29-42.
-
(2004)
International Journal of Information Management
, vol.24
, Issue.1
, pp. 29-42
-
-
Khalfan, A.M.1
-
34
-
-
0242329011
-
The Use of Business Process Modelling in Systems Security Analysis and Design
-
Kokolakis, S.A., Demopoulos, A.J. and Kiountouzis, E.A. (2000). The Use of Business Process Modelling in Systems Security Analysis and Design, Information Management & Computer Security 8(3): 107.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.3
, pp. 107
-
-
Kokolakis, S.A.1
Demopoulos, A.J.2
Kiountouzis, E.A.3
-
35
-
-
49749116745
-
Adverse Events in Hospitals: The contribution of poor information systems
-
Turku, Finland
-
Lederman, R. (2004). Adverse Events in Hospitals: The contribution of poor information systems, in European Conference on Information Systems, (Turku, Finland, 2004).
-
(2004)
European Conference on Information Systems
-
-
Lederman, R.1
-
36
-
-
25144515646
-
Managing Hospital Databases: Can large hospitals really protect patient data?
-
Lederman, R. (2005). Managing Hospital Databases: Can large hospitals really protect patient data? Health Informatics 11(3): 201-210.
-
(2005)
Health Informatics
, vol.11
, Issue.3
, pp. 201-210
-
-
Lederman, R.1
-
38
-
-
0000133760
-
Threats to Information Systems: Today's reality, yesterday's understanding
-
Loch, K.D., Carr, H.H. and Warkentin, M.E. (1992). Threats to Information Systems: Today's reality, yesterday's understanding, MIS Quarterly 16(2): 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
40
-
-
84905581473
-
A Process Oriented Framework for Assessing the Business Value of Information Technology
-
Mooney, J., Gurbaxani, V. and Kraemer, K. (1996). A Process Oriented Framework for Assessing the Business Value of Information Technology, The DATABASE for Advances in Information Systems 27(2): 68-81.
-
(1996)
The DATABASE for Advances in Information Systems
, vol.27
, Issue.2
, pp. 68-81
-
-
Mooney, J.1
Gurbaxani, V.2
Kraemer, K.3
-
41
-
-
0030386217
-
Electronic Communications Risk Management: A checklist for business managers
-
Moulton, R.T. and Moulton, M.E. (1996). Electronic Communications Risk Management: A checklist for business managers, Computers & Security 15(5): 377-386.
-
(1996)
Computers & Security
, vol.15
, Issue.5
, pp. 377-386
-
-
Moulton, R.T.1
Moulton, M.E.2
-
43
-
-
49749097504
-
Information Technology Security Engagements - An Evolving Speciality
-
Nearon, B.H. (2000). Information Technology Security Engagements - An Evolving Speciality, The CPA Journal 70(7): 29-33.
-
(2000)
The CPA Journal
, vol.70
, Issue.7
, pp. 29-33
-
-
Nearon, B.H.1
-
45
-
-
27144549861
-
Information Technology and the Board of Directors
-
Nolan, R. and McFarlan, W. (2005). Information Technology and the Board of Directors, Harvard Business Review 83(10): 96-106.
-
(2005)
Harvard Business Review
, vol.83
, Issue.10
, pp. 96-106
-
-
Nolan, R.1
McFarlan, W.2
-
46
-
-
27844604199
-
Strategically Managing Risk in the Information Age: A holistic approach
-
Olson, E.G. (2005). Strategically Managing Risk in the Information Age: A holistic approach, Journal of Business Strategy 26(6): 45-54.
-
(2005)
Journal of Business Strategy
, vol.26
, Issue.6
, pp. 45-54
-
-
Olson, E.G.1
-
47
-
-
77955704149
-
The Real Cost of Computer Crime
-
Ott, J.L. (2003). The Real Cost of Computer Crime, Information Systems Security 12(1): 2-4.
-
(2003)
Information Systems Security
, vol.12
, Issue.1
, pp. 2-4
-
-
Ott, J.L.1
-
48
-
-
85013137337
-
Information Security Policy Framework: Best practices for security policy in the E-commerce age
-
Palmer, M.E., Robinson, C., Patilla, J.C and Moser, E.P. (2001). Information Security Policy Framework: Best practices for security policy in the E-commerce age, Information Systems Security 10(2): 13-27.
-
(2001)
Information Systems Security
, vol.10
, Issue.2
, pp. 13-27
-
-
Palmer, M.E.1
Robinson, C.2
Patilla, J.C.3
Moser, E.P.4
-
50
-
-
84973818294
-
Three Dilemmas in Action Research
-
Rapoport, R.N. (1970). Three Dilemmas in Action Research, Human Relations 23(6): 499-513.
-
(1970)
Human Relations
, vol.23
, Issue.6
, pp. 499-513
-
-
Rapoport, R.N.1
-
51
-
-
85014614766
-
Three Decades of Risk Research: Accomplishments and new challenges
-
Renn, O. (1998). Three Decades of Risk Research: Accomplishments and new challenges, Journal of Risk Research 1(1): 49-71.
-
(1998)
Journal of Risk Research
, vol.1
, Issue.1
, pp. 49-71
-
-
Renn, O.1
-
52
-
-
38249000806
-
Information Management Strategy - An Evolutionary Process
-
Reponen, T. (1993). Information Management Strategy - An Evolutionary Process, Scandinavian Journal of Management 9(9): 189-209.
-
(1993)
Scandinavian Journal of Management
, vol.9
, Issue.9
, pp. 189-209
-
-
Reponen, T.1
-
53
-
-
49749097861
-
-
Royal Canadian Mounted Police (1981). Security in the EDP environment, in Security Information Publication. Canada: Royal Canadian Mounted Police.
-
Royal Canadian Mounted Police (1981). Security in the EDP environment, in Security Information Publication. Canada: Royal Canadian Mounted Police.
-
-
-
-
54
-
-
0031337118
-
Managing Security for Outsourcing Contracts
-
Sherwood, J. (1997). Managing Security for Outsourcing Contracts, Computers & Security 16(7): 603-609.
-
(1997)
Computers & Security
, vol.16
, Issue.7
, pp. 603-609
-
-
Sherwood, J.1
-
55
-
-
33645880065
-
A Prototype for Assessing Information Technology Risks in Health Care
-
Smith, E. and Eloff, J.H.P. (2002). A Prototype for Assessing Information Technology Risks in Health Care, Computers & Security 21(2): 266-284.
-
(2002)
Computers & Security
, vol.21
, Issue.2
, pp. 266-284
-
-
Smith, E.1
Eloff, J.H.P.2
-
56
-
-
3042857071
-
On Risk: Perception and direction
-
Stewart, A. (2004). On Risk: Perception and direction, Computers & Security 23(5): 362-370.
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 362-370
-
-
Stewart, A.1
-
57
-
-
85013027847
-
Recognizing and Preparing Loss Estimates from Cyber-Attacks
-
Stevenson-Smith, G. (2004). Recognizing and Preparing Loss Estimates from Cyber-Attacks, Information Systems Security 12(6): 46-58.
-
(2004)
Information Systems Security
, vol.12
, Issue.6
, pp. 46-58
-
-
Stevenson-Smith, G.1
-
58
-
-
0001133137
-
Coping with Systems Risk: Security planning models for management decision making
-
Straub, D.W. and Welke, R.J. (1998). Coping with Systems Risk: Security planning models for management decision making, MIS Quarterly 22(4): 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
59
-
-
0000400750
-
An Assessment of the Scientific Merits of Action Research
-
Susman, G.I. and Evered, R.D. (1978). An Assessment of the Scientific Merits of Action Research, Administrative Science Quarterly 23(4): 582-603.
-
(1978)
Administrative Science Quarterly
, vol.23
, Issue.4
, pp. 582-603
-
-
Susman, G.I.1
Evered, R.D.2
-
61
-
-
0035780469
-
Embedding Security Practices in Contemporary Information Systems Development Approaches
-
Tryfonas, T., Kiountouzis, E. and Poulymenakou, A. (2001). Embedding Security Practices in Contemporary Information Systems Development Approaches, Information Management & Computer Security 9(4): 183-197.
-
(2001)
Information Management & Computer Security
, vol.9
, Issue.4
, pp. 183-197
-
-
Tryfonas, T.1
Kiountouzis, E.2
Poulymenakou, A.3
-
62
-
-
0036067283
-
The Information Security Management Toolbox - Taking the Pain Out of Security Management
-
Vermeulen, C. and von Solms, R. (2002). The Information Security Management Toolbox - Taking the Pain Out of Security Management, Information Management & Computer Security 10(3): 119-125.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.3
, pp. 119-125
-
-
Vermeulen, C.1
von Solms, R.2
-
63
-
-
4243198165
-
Enemy at the Gate: Threats to information security
-
Whitman, M.E. (2003). Enemy at the Gate: Threats to information security, Communications of the ACM 46(8): 91-95.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
64
-
-
0042948034
-
Research Methods in Information Systems: Using action research
-
E. Mumford, R. Hirschheim, G. Fitzgerald and T. Wood-Harper eds, Amsterdam: North-Holland, pp
-
Wood-Harper, T. (1985). Research Methods in Information Systems: Using action research, in E. Mumford, R. Hirschheim, G. Fitzgerald and T. Wood-Harper (eds.) Research Methods in Information Systems, Amsterdam: North-Holland, pp. 169-191.
-
(1985)
Research Methods in Information Systems
, pp. 169-191
-
-
Wood-Harper, T.1
|