-
3
-
-
84986166563
-
ISO 9000 and performance of small tourism enterprises: A focus on Westons Cider Company
-
Augustyn M. M., and Pheby J.D., (2000), "ISO 9000 and performance of small tourism enterprises: a focus on Westons Cider Company", Managing service quality, Vol. 10 (6), 2000, pp. 374-388.
-
(2000)
Managing service quality
, vol.10
, Issue.6
, pp. 374-388
-
-
Augustyn, M.M.1
Pheby, J.D.2
-
5
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. (1993), "Information systems security design methods: implications for information systems development", ACM Computing Surveys, Vol. 25 No.4, pp.375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
6
-
-
51449098443
-
ISO 27001: Risk management and compliance
-
Brenner J., (2007), "ISO 27001: Risk management and compliance", Risk Management Magazine, Vol. 54 (1), pp. 24-29;
-
(2007)
Risk Management Magazine
, vol.54
, Issue.1
, pp. 24-29
-
-
Brenner, J.1
-
7
-
-
0000706508
-
Smaller enterprises' experiences with ISO 9000
-
Brown A., Van der Wiele T., Loughton K., (1998), "Smaller enterprises' experiences with ISO 9000", International journal of Quality & reliability management, Vol. 15 (3), 1998, pp. 273-285.
-
(1998)
International journal of Quality & reliability management
, vol.15
, Issue.3
, pp. 273-285
-
-
Brown, A.1
Van der Wiele, T.2
Loughton, K.3
-
8
-
-
0012670699
-
-
Center for Research on Information Technology and Organizations CRITO, University of California, Irvine
-
Brousseau, E., (2002), "Globalization and E-commerce: The French Environment and Policy", Center for Research on Information Technology and Organizations (CRITO), University of California, Irvine. http://www.crito.uci. edu/publications/pdf/GEC2_France.pdf
-
(2002)
Globalization and E-commerce: The French Environment and Policy
-
-
Brousseau, E.1
-
10
-
-
8444230478
-
-
Chapman D., Smalov L., (2004), On information security guidelines for small/medium enterprises, ICEIS 2004 - Information analysis and specification, 2004, pp. 3-9.
-
Chapman D., Smalov L., (2004), "On information security guidelines for small/medium enterprises", ICEIS 2004 - Information analysis and specification, 2004, pp. 3-9.
-
-
-
-
11
-
-
51449124119
-
-
CERT, (2007), CERT/CC: Statistics 1988-2007, Computer Emergency Response Team, www.cert.org, USA;
-
CERT, (2007), "CERT/CC: Statistics 1988-2007", Computer Emergency Response Team, www.cert.org, USA;
-
-
-
-
13
-
-
51449104593
-
-
CLUSIF, (2004; 2006), Politiques de sécurité des systèmes d'information et sinistralité en France, Club de la sécurité des informations français (French information systems security club), Paris.
-
CLUSIF, (2004; 2006), "Politiques de sécurité des systèmes d'information et sinistralité en France", Club de la sécurité des informations français (French information systems security club), Paris.
-
-
-
-
14
-
-
51449099260
-
La certification des critères communs: Le point de vue du developpeur
-
CNRS
-
CNRS, (2002), "La certification des critères communs: le point de vue du developpeur", Securité informatique, No 42, pp. 5-6.
-
(2002)
Securité informatique
, Issue.42
, pp. 5-6
-
-
-
15
-
-
51449106369
-
BS 5750 - a logical step
-
Conway T., (1994), "BS 5750 - a logical step", The TQM magazine, Vol. 6 (5), pp. 38-40.
-
(1994)
The TQM magazine
, vol.6
, Issue.5
, pp. 38-40
-
-
Conway, T.1
-
17
-
-
20144378762
-
The coming commoditization of processes
-
June, pp
-
Davenport, T. H., (2005), "The coming commoditization of processes," Harvard Business Review (June), pp. 100-108.
-
(2005)
Harvard Business Review
, pp. 100-108
-
-
Davenport, T.H.1
-
18
-
-
0036398120
-
Policy enforcement in the workplace
-
David J., (2002), "Policy enforcement in the workplace", Computers & Security, Vol. 21 (6), pp. 506-513;
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 506-513
-
-
David, J.1
-
19
-
-
0002681615
-
Determinants of success for computer usage in small businesses
-
DeLone W.H., (1988), "Determinants of success for computer usage in small businesses", MIS Quarterly, Vol. 5 (4), pp. 51-61;
-
(1988)
MIS Quarterly
, vol.5
, Issue.4
, pp. 51-61
-
-
DeLone, W.H.1
-
20
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon G., Backhouse J., (2001), "Current directions in IS security research: towards socio-organizational perspectives", Information Systems Journal, 11, pp. 127-153;
-
(2001)
Information Systems Journal
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
21
-
-
25144436981
-
Do information security policies reduce the incidence of security breaches: An exploratory analysis
-
Oct-Dec, pp
-
Doherty N.F., Fulford H., (2005), "Do information security policies reduce the incidence of security breaches: an exploratory analysis", Information resources management journal; 18 (4), Oct-Dec, pp. 21-39;
-
(2005)
Information resources management journal
, vol.18
, Issue.4
, pp. 21-39
-
-
Doherty, N.F.1
Fulford, H.2
-
22
-
-
32444443168
-
Aligning the information security policy with the strategic information systems plan
-
Doherty N.F., Fulford H., (2006), "Aligning the information security policy with the strategic information systems plan", Computers & Security; 25, pp. 55-63;
-
(2006)
Computers & Security
, vol.25
, pp. 55-63
-
-
Doherty, N.F.1
Fulford, H.2
-
26
-
-
33644541231
-
A new forecasting model for the diffusion of ISO 9000 standards certifications in European countries
-
Franceschini F., Galetto M., Gianni G., (2004), "A new forecasting model for the diffusion of ISO 9000 standards certifications in European countries", International journal of Quality & reliability management, Vol. 21 (1), pp. 32-50.
-
(2004)
International journal of Quality & reliability management
, vol.21
, Issue.1
, pp. 32-50
-
-
Franceschini, F.1
Galetto, M.2
Gianni, G.3
-
27
-
-
33746253089
-
A worldwide analysis of ISO 9000 standard diffusion: Considerations and future development
-
Franceschini F., Galetto M., Cecconi P., (2006), "A worldwide analysis of ISO 9000 standard diffusion: Considerations and future development", Benchmarking: An international journal, Vol. 13 (4), pp. 523-541.
-
(2006)
Benchmarking: An international journal
, vol.13
, Issue.4
, pp. 523-541
-
-
Franceschini, F.1
Galetto, M.2
Cecconi, P.3
-
28
-
-
0003108458
-
consultant engagement for first time computerization: A proactive client role in small businesses
-
Gable G.G., (1991), "consultant engagement for first time computerization: A proactive client role in small businesses", Information & Management, Vol. 20, pp. 83-93;
-
(1991)
Information & Management
, vol.20
, pp. 83-93
-
-
Gable, G.G.1
-
29
-
-
24144453387
-
Information systems security issues and decisions for small businesses: An empirical examination
-
Gupta A., Hammond R., (2005), "Information systems security issues and decisions for small businesses: an empirical examination", Information Management and Computer Security, Vol. 13 No 4, pp. 297-310;
-
(2005)
Information Management and Computer Security
, vol.13
, Issue.4
, pp. 297-310
-
-
Gupta, A.1
Hammond, R.2
-
30
-
-
0036613095
-
What makes an effective information security policy
-
Hone K., Eloff J.H.P., (2002a), "What makes an effective information security policy", Network Security, Vol. 20 (6), pp. 14-16;
-
(2002)
Network Security
, vol.20
, Issue.6
, pp. 14-16
-
-
Hone, K.1
Eloff, J.H.P.2
-
31
-
-
0036330173
-
Information security policy: What do international security standards say
-
Hone K., Eloff J.H.P., (2002b), "Information security policy: what do international security standards say", Computers & Security, Vol. 21 (5), pp. 402-409;
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Hone, K.1
Eloff, J.H.P.2
-
33
-
-
51449090797
-
-
ISMS User Group
-
ISMS User Group, (2007), http://www.iso27001certificates.com/.
-
(2007)
-
-
-
35
-
-
51449110433
-
The ISO survey of ISO 9001:2000 and ISO 14001 Certificates
-
ISO, Geneva
-
ISO, (2002), "The ISO survey of ISO 9001:2000 and ISO 14001 Certificates", Twelfth cycle, Geneva.
-
(2002)
Twelfth cycle
-
-
-
36
-
-
51449092069
-
-
ISO (2003, 2004, 2005), The ISO survey of ISO 9001:2000 and ISO 14001 Certificates, Geneva.
-
ISO (2003, 2004, 2005), "The ISO survey of ISO 9001:2000 and ISO 14001 Certificates", Geneva.
-
-
-
-
38
-
-
0002633623
-
The U.S. National Information Infrastructure Initiative: The Market, the Net, and the Virtual Project
-
Kahin, B. and Wilson, E, Eds, MIT Press, Cambridge, Mass
-
Kahin, B. (1997), "The U.S. National Information Infrastructure Initiative: The Market, the Net, and the Virtual Project", in Kahin, B. and Wilson, E. (Eds), National Information Infrastructure Initiatives: Vision and Policy Design, MIT Press, Cambridge, Mass.
-
(1997)
National Information Infrastructure Initiatives: Vision and Policy Design
-
-
Kahin, B.1
-
40
-
-
0029727921
-
In praise of ISO 9000
-
Mc Lachlan V.N., (1996), "In praise of ISO 9000", The TQM magazine, Vol. 8 (3), pp. 21-23.
-
(1996)
The TQM magazine
, vol.8
, Issue.3
, pp. 21-23
-
-
Mc Lachlan, V.N.1
-
41
-
-
84986133689
-
Corporate information security management
-
MCB University press;
-
Mitchell R.C., Marcella R., Baxter G., (1999), "Corporate information security management", New Library World, Vol. 100, no 1150, pp. 213-227, MCB University press;
-
(1999)
New Library World
, vol.100
, Issue.1150
, pp. 213-227
-
-
Mitchell, R.C.1
Marcella, R.2
Baxter, G.3
-
42
-
-
84870590661
-
Le dirigeant confronté à la décision d'investissement en T.I.C.
-
l'Harmattan, Paris;
-
Monnoyer M.C., (2003), Le dirigeant confronté à la décision d'investissement en T.I.C., in Boutary, TIC et PME: des usages aux stratégies, l'Harmattan, Paris;
-
(2003)
Boutary, TIC et PME: Des usages aux stratégies
-
-
Monnoyer, M.C.1
-
43
-
-
0002495427
-
Policies, procedures and standards: An approach for implementation
-
Moule B., Giavara L., (1995), "Policies, procedures and standards: an approach for implementation", Information Management & Computer Security, Vol. 3 (3), pp. 7-16;
-
(1995)
Information Management & Computer Security
, vol.3
, Issue.3
, pp. 7-16
-
-
Moule, B.1
Giavara, L.2
-
44
-
-
0036833109
-
The stock market's reaction to quality certification: Empirical evidence from Spain
-
Nicolau J.L., Sellers R., (2002), "The stock market's reaction to quality certification: empirical evidence from Spain", European journal of operations research, Vol. 142, pp. 632-41;
-
(2002)
European journal of operations research
, vol.142
, pp. 632-641
-
-
Nicolau, J.L.1
Sellers, R.2
-
45
-
-
84977302505
-
The facts about small business and the real values of its 'life world'
-
July
-
Noteboom B., (1988), "The facts about small business and the real values of its 'life world'", American journal of economics and sociology (47:3), July 1988, pp. 299-314;
-
(1988)
American journal of economics and sociology
, vol.47
, Issue.3
, pp. 299-314
-
-
Noteboom, B.1
-
47
-
-
0033745439
-
Implementing information security in the 21st century - Do you have the balancing factors?
-
Nosworthy J.D., (2000), "Implementing information security in the 21st century - Do you have the balancing factors?", Computers and security, Vol. 19 (4), pp. 337-347;
-
(2000)
Computers and security
, vol.19
, Issue.4
, pp. 337-347
-
-
Nosworthy, J.D.1
-
48
-
-
0003724905
-
Information Systems Security: Scope, State-of-the-art, and Evaluation of Techniques
-
47b
-
Pernul G., (1995), "Information Systems Security: Scope, State-of-the-art, and Evaluation of Techniques", International journal of information management, Vol. 15 (3), pp. 165-180; [47b]
-
(1995)
International journal of information management
, vol.15
, Issue.3
, pp. 165-180
-
-
Pernul, G.1
-
50
-
-
1142273446
-
PFIRES: A policy framework for information security
-
Rees J., Bandyopadhyay S., Spafford E.H., (2003), "PFIRES: A policy framework for information security", Communications of the ACM, Vol. 46 (7), pp. 101-106;
-
(2003)
Communications of the ACM
, vol.46
, Issue.7
, pp. 101-106
-
-
Rees, J.1
Bandyopadhyay, S.2
Spafford, E.H.3
-
51
-
-
33645700786
-
An analysis of the degree of small companies' dissatisfaction with ISO 9000 certification
-
Rodriguez-Escobar J.A., Gonzalez-Benito J., Martinez-Lorente A.R., (2006), "An analysis of the degree of small companies' dissatisfaction with ISO 9000 certification", Total quality management, Vol. 17 (4), pp. 507-521.
-
(2006)
Total quality management
, vol.17
, Issue.4
, pp. 507-521
-
-
Rodriguez-Escobar, J.A.1
Gonzalez-Benito, J.2
Martinez-Lorente, A.R.3
-
52
-
-
33747019602
-
Information security culture: From analysis to change
-
Schlienger T., Teufel S., (2003), "Information security culture: from analysis to change", South African Computer Journal, Vol. 31, pp. 46-52;
-
(2003)
South African Computer Journal
, vol.31
, pp. 46-52
-
-
Schlienger, T.1
Teufel, S.2
-
54
-
-
25144525048
-
Policies for construction of information systems' security guidelines
-
Beijing, China, August, pp
-
Siponen M.T., (2000), "Policies for construction of information systems' security guidelines" in proceedings of the 15ht information security conference (IFIP TC11/Sec 2000), Beijing, China, August, pp. 111-120;
-
(2000)
proceedings of the 15ht information security conference (IFIP TC11/Sec 2000)
, pp. 111-120
-
-
Siponen, M.T.1
-
55
-
-
33747194078
-
Information security standards focus on the existence of process, not its content
-
Siponen M.T., (2006), "Information security standards focus on the existence of process, not its content", Communications of the ACM, Vol. 49 (8), pp. 97-100;
-
(2006)
Communications of the ACM
, vol.49
, Issue.8
, pp. 97-100
-
-
Siponen, M.T.1
-
56
-
-
39749091576
-
Six design theories for IS security Policies and Guidelines
-
Siponen M.T., Iivari J., (2006), "Six design theories for IS security Policies and Guidelines", Journal of the Association for Information systems, Vol. 7 (7), pp. 445-472;
-
(2006)
Journal of the Association for Information systems
, vol.7
, Issue.7
, pp. 445-472
-
-
Siponen, M.T.1
Iivari, J.2
-
57
-
-
0003317303
-
Impact of consultants on computerization success in small businesses
-
Soh C.P.P., Yap C.S., Raman K.S., (1992), "Impact of consultants on computerization success in small businesses", Information and Management, Vol. 22, pp. 309-319;
-
(1992)
Information and Management
, vol.22
, pp. 309-319
-
-
Soh, C.P.P.1
Yap, C.S.2
Raman, K.S.3
-
58
-
-
0003168891
-
Security requirements, risks and recommendations for small enterprise and home-office environments
-
Spinellis D., Kokolakis S., Gritzalis S., (1999), "Security requirements, risks and recommendations for small enterprise and home-office environments", Information Management and Computer Security, Vol.7 No 3, pp. 121-128;
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.3
, pp. 121-128
-
-
Spinellis, D.1
Kokolakis, S.2
Gritzalis, S.3
-
59
-
-
0642333244
-
Does ISO 9000 have an effect on quality management practices? An international empirical study
-
Subba R., Ragu-Nathan T.S., Solis L.E., (1997), "Does ISO 9000 have an effect on quality management practices? An international empirical study", Total quality management, Vol. 8 (6), pp. 335-346.
-
(1997)
Total quality management
, vol.8
, Issue.6
, pp. 335-346
-
-
Subba, R.1
Ragu-Nathan, T.S.2
Solis, L.E.3
-
60
-
-
0030488640
-
Top management support, external expertise and information systems implementation in small businesses
-
Thong J.Y.L, Yap C.S., Raman K.S., (1996), "Top management support, external expertise and information systems implementation in small businesses", Information systems research, Vol.7, No 2, pp 248-267;
-
(1996)
Information systems research
, vol.7
, Issue.2
, pp. 248-267
-
-
Thong, J.Y.L.1
Yap, C.S.2
Raman, K.S.3
-
61
-
-
51449119905
-
SMEs and the evolution of the European information society: Policy themes and initiatives
-
London; pp
-
Turner C., (1997), "SMEs and the evolution of the European information society: policy themes and initiatives", European Business Journal, Vol. 9, No 4, London; pp. 47-52;
-
(1997)
European Business Journal
, vol.9
, Issue.4
, pp. 47-52
-
-
Turner, C.1
-
62
-
-
0033657872
-
information security- The third wave?
-
Von Solms B., (2000), "information security- The third wave?", Computers & Security, Vol. 19 (7), pp. 615-620;
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 615-620
-
-
Von Solms, B.1
-
63
-
-
51449103251
-
-
Von Solms R., Van de Haar, (2000), From Trusted Information Security Controls to a Trusted Information Security Environment, proceeding of the 16th Annual Working Conference on Information Security, IFIP, August, Beijing, Chine, contribution no 4/52;
-
Von Solms R., Van de Haar, (2000), "From Trusted Information Security Controls to a Trusted Information Security Environment", proceeding of the 16th Annual Working Conference on Information Security, IFIP, August, Beijing, Chine, contribution no 4/52;
-
-
-
-
64
-
-
2942564710
-
From policies to culture
-
Von Solms B., Von Solms R., (2004), "From policies to culture", Computers & Security, Vol. 23, pp. 275-279;
-
(2004)
Computers & Security
, vol.23
, pp. 275-279
-
-
Von Solms, B.1
Von Solms, R.2
-
65
-
-
19944396489
-
From information security to ... business security
-
Von Solms B., Von Solms R., (2005), "From information security to ... business security", Computers & Security, Vol. 24, pp. 271-273;
-
(2005)
Computers & Security
, vol.24
, pp. 271-273
-
-
Von Solms, B.1
Von Solms, R.2
-
66
-
-
2342475711
-
Towards information security behavioural compliance
-
Vroom C., Von Solms R., (2004), "Towards information security behavioural compliance", Computers & Security, Vol.23, pp. 191-198;
-
(2004)
Computers & Security
, vol.23
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
67
-
-
0012903874
-
Analyzing the Past to Prepare for the Future: Writing a Literature Review
-
Webster, J., & Watson, R. T. (2002). "Analyzing the Past to Prepare for the Future: Writing a Literature Review", MIS Quarterly, 26(2), xiii-xxiii.
-
(2002)
MIS Quarterly
, vol.26
, Issue.2
-
-
Webster, J.1
Watson, R.T.2
-
69
-
-
18844458431
-
An unappreciated reason why information security policies fail
-
Wood CC., (2000), "An unappreciated reason why information security policies fail", Computer fraud & Security, Vol. 2000 (10), pp. 13-14;
-
(2000)
Computer fraud & Security
, vol.2000
, Issue.10
, pp. 13-14
-
-
Wood, C.C.1
|