-
1
-
-
34249871944
-
"A qualitative study of users' view on information security"
-
Albrechtsen, E. (2007), "A qualitative study of users' view on information security", Computers & Security, Vol. 26 No. 4, pp. 276-89.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
2
-
-
54949083705
-
"Gammeldags tenkning i moderne organisasjoner? Om IKT-sikkerhet i kunnskapsorganisasjoner"
-
in Lydersen, S. (Ed.) Tapir Akademisk, Trondheim (in Norwegian)
-
Albrechtsen, E. and Grøtan, T.O. (2004), "Gammeldags tenkning i moderne organisasjoner? Om IKT-sikkerhet i kunnskapsorganisasjoner" ("Old-fashioned thinking in modern organizations? On ICT-security in knowledge organizations)", in Lydersen, S. (Ed.), Fra flis I fingeren til ragnarokk, Tapir Akademisk, Trondheim, pp. 335-55 (in Norwegian).
-
(2004)
Fra Flis I Fingeren Til Ragnarokk
, pp. 335-355
-
-
Albrechtsen, E.1
Grøtan, T.O.2
-
4
-
-
56149122731
-
"Industrial safety management and information security management: Risk characteristics and management approaches"
-
Albrechtsen, E. and Hovden, J. (2007b), "Industrial safety management and information security management: Risk characteristics and management approaches", The Proceedings of ESREL2007.
-
(2007)
The Proceedings of ESREL2007
-
-
Albrechtsen, E.1
Hovden, J.2
-
5
-
-
54949149369
-
"Information security digital divide in organizations: Information security managers versus users"
-
(unpublished) manuscript submitted to Computers & Security
-
Albrechtsen, E. and Hovden, J. (unpublished), "Information security digital divide in organizations: Information security managers versus users", manuscript submitted to Computers & Security.
-
-
-
Albrechtsen, E.1
Hovden, J.2
-
6
-
-
16444374009
-
"The two sides of ROI: Return on investment vs risk of incarceration"
-
Berghel, H. (2005), "The two sides of ROI: Return on investment vs risk of incarceration", Communications of the ACM, Vol. 48 No. 4, pp. 15-20.
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
, pp. 15-20
-
-
Berghel, H.1
-
7
-
-
0242665376
-
"Information security is information risk management"
-
ACM Press, New York, NY
-
Blakely, B., McDermott, E. and Geer, D. (2001), "Information security is information risk management", Proceedings of the 2001 Workshop on New Security Paradigms, ACM Press, New York, NY, pp. 97-104.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 97-104
-
-
Blakely, B.1
McDermott, E.2
Geer, D.3
-
8
-
-
0003951439
-
-
Jossey-Bass, San Francisco, CA
-
Bolman, L.G. and Deal, T.E. (2003), Reframing Organizations: Artistry, Choice, and Leadership, Jossey-Bass, San Francisco, CA.
-
(2003)
Reframing Organizations: Artistry, Choice, and Leadership
-
-
Bolman, L.G.1
Deal, T.E.2
-
9
-
-
54949152120
-
-
BSI, Bundesamt für Sicherheit in der Informationstechnik IT Baseline Protection in brief
-
BSI, Bundesamt für Sicherheit in der Informationstechnik (2004), IT Security Guidelines, IT Baseline Protection in brief.
-
(2004)
IT Security Guidelines
-
-
-
10
-
-
54949097194
-
-
Congressional Research Service Report for Congress, available at
-
Cashell, B., Jackson, W., Jickling, M. and Webl, B. (2004), "The economic impact of cyber attacks", Congressional Research Service Report for Congress, available at: www.cisco.com/warp/public/779/ govtaffairs/images/CRS_Cyber_Attacks.pdf.
-
(2004)
"The Economic Impact of Cyber Attacks"
-
-
Cashell, B.1
Jackson, W.2
Jickling, M.3
Webl, B.4
-
11
-
-
23044525969
-
"Current directions in IS security research: Towards socio-organizational perspectives"
-
Dhillon, G. and Backhose, J. (2001), "Current directions in IS security research: Towards socio-organizational perspectives", Information Systems Journal, Vol. 11 No. 2, pp. 127-53.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhose, J.2
-
12
-
-
32444443168
-
"Aligning the information security policy with the strategic information systems plan"
-
Doherty, N.F. and Fulford, H. (2006), "Aligning the information security policy with the strategic information systems plan", Computers & Security, Vol. 25 No. 1, pp. 55-63.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 55-63
-
-
Doherty, N.F.1
Fulford, H.2
-
13
-
-
0006607828
-
"Scandinavian design: On participation and skill"
-
in Adler, P.S. and Winograd, T.A. (Eds) Oxford University Press, New York, NY
-
Ehn, P. (1992), "Scandinavian design: On participation and skill", in Adler, P.S. and Winograd, T.A. (Eds), Usability - Turning Technologies into Tools, Oxford University Press, New York, NY.
-
(1992)
Usability - Turning Technologies Into Tools
-
-
Ehn, P.1
-
14
-
-
84990029315
-
"The economics of information security investment"
-
Gordon, L.A. and Loeb, M.P. (2002), "The economics of information security investment", ACM Transactions on Information and System Security (TISSEC), Vol. 5 No. 4, pp. 438-57.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
15
-
-
54949102996
-
"Evaluating applied information security measures: An analysis of the data from the Norwegian Computer Crime Survey 2006"
-
Hagen, J.M. (2007), "Evaluating applied information security measures: An analysis of the data from the Norwegian Computer Crime Survey 2006", FFI/REPORT-2007/02558, pp. 35-48.
-
(2007)
FFI/REPORT-2007/02558
, pp. 35-48
-
-
Hagen, J.M.1
-
16
-
-
0034027568
-
"Culture's confusion"
-
Hale, A.R. (2000), "Culture's confusion", Safety Science, Vol. 34 Nos 1/3, pp. 1-4.
-
(2000)
Safety Science
, vol.34
, Issue.1-3
, pp. 1-4
-
-
Hale, A.R.1
-
17
-
-
0012284534
-
-
Hale, A.R. and Baram, M.S. (Eds) Pergamon, Oxford
-
Hale, A.R. and Baram, M.S. (Eds) (1998), Safety Management: The Challenge of Change, Pergamon, Oxford.
-
(1998)
Safety Management: The Challenge of Change
-
-
-
18
-
-
84937550545
-
-
Ashgate, Aldershot
-
Hollnagel, E., Woods, D.D. and Leveson, N. (2006), Resilience Engineering: Concepts and Precepts, Ashgate, Aldershot.
-
(2006)
Resilience Engineering: Concepts and Precepts
-
-
Hollnagel, E.1
Woods, D.D.2
Leveson, N.3
-
19
-
-
0036330173
-
"Information security policy - What do international security standards say?"
-
Höne, K. and Eloff, J.H.P. (2002), "Information security policy - what do international security standards say?", Computers & Security, Vol. 21 No. 5, pp. 402-9.
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Höne, K.1
Eloff, J.H.P.2
-
21
-
-
54949135582
-
-
Tapir, Trondheim (in Norwegian)
-
Ilstad, S., Paasche, T. and Hovden, J. (1977), Survey-metoden (Survey Methods), Tapir, Trondheim (in Norwegian).
-
(1977)
Survey-metoden (Survey Methods)
-
-
Ilstad, S.1
Paasche, T.2
Hovden, J.3
-
23
-
-
33644755338
-
"Awareness training, security awareness: Switch to a better programme"
-
Johnson, E. (2006), "Awareness training, security awareness: Switch to a better programme", Network Security, Vol. 2006 No. 2, pp. 15-18.
-
(2006)
Network Security
, vol.2006
, Issue.2
, pp. 15-18
-
-
Johnson, E.1
-
24
-
-
18844431067
-
"Information systems security policies: A contextual perspective"
-
Karyda, M., Kiountouzis, E. and Kokolakis, S. (2005), "Information systems security policies: A contextual perspective", Computers & Security, Vol. 24 No. 3, pp. 246-60.
-
(2005)
Computers & Security
, vol.24
, Issue.3
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
25
-
-
27844543023
-
-
Carnegie Mellon, Software Engineering Institute, Pittsburgh, PA
-
Keeney, M., Kowalski, E., Capelli, D., Moore, A., Shimeall, T. and Rogers, S. (2005), Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Carnegie Mellon, Software Engineering Institute, Pittsburgh, PA.
-
(2005)
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
-
-
Keeney, M.1
Kowalski, E.2
Capelli, D.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
26
-
-
24044451509
-
"Beyond trust: Security policies and defence in depth"
-
Kemp, M. (2005), "Beyond trust: Security policies and defence in depth", Network Security, Vol. 2005 No. 8, pp. 14-16.
-
(2005)
Network Security
, vol.2005
, Issue.8
, pp. 14-16
-
-
Kemp, M.1
-
27
-
-
1242263532
-
"Why there aren't more information security research studies"
-
Kotulic, A.G. and Clark, J. (2004), "Why there aren't more information security research studies", Information & Management, Vol. 41 No. 5, pp. 597-607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.2
-
29
-
-
38949205172
-
"The safety representative under pressure. A study of occupational health and safety management in the Norwegian oil and gas industry"
-
Lie, T., Hovden, J., Karlsen, J.E. and Alteren, B. (2008), "The safety representative under pressure. A study of occupational health and safety management in the Norwegian oil and gas industry", Safety Science, Vol. 46 No. 3.
-
(2008)
Safety Science
, vol.46
, Issue.3
-
-
Lie, T.1
Hovden, J.2
Karlsen, J.E.3
Alteren, B.4
-
30
-
-
54949096003
-
"Impact of legislation on information security management"
-
November/December
-
Lobree, B. (2002), "Impact of legislation on information security management", Security Management Practices, November/December, pp. 41-8.
-
(2002)
Security Management Practices
, pp. 41-48
-
-
Lobree, B.1
-
31
-
-
33746748784
-
"On incident handling and response: A state-of-the-art approach"
-
Mitropoulos, S., Patsos, D. and Douligeris, C. (2006), "On incident handling and response: A state-of-the-art approach", Computers & Security, Vol. 25 No. 5, pp. 351-70.
-
(2006)
Computers & Security
, vol.25
, Issue.5
, pp. 351-370
-
-
Mitropoulos, S.1
Patsos, D.2
Douligeris, C.3
-
35
-
-
32644465248
-
-
Carnegie Mellon, Software Engineering Institute, Pittsburgh, PA
-
Randazzo, M.R., Keeney, M., Kowalski, E., Capelli, D. and Moore, A. (2004), Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, Carnegie Mellon, Software Engineering Institute, Pittsburgh, PA.
-
(2004)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.R.1
Keeney, M.2
Kowalski, E.3
Capelli, D.4
Moore, A.5
-
36
-
-
0031279121
-
"Risk management in a dynamic society"
-
Rasmussen, J. (1997), "Risk management in a dynamic society", Safety Science, Vol. 27 Nos 2/3, pp. 183-213.
-
(1997)
Safety Science
, vol.27
, Issue.2-3
, pp. 183-213
-
-
Rasmussen, J.1
-
40
-
-
0033683516
-
"A conceptual foundation for organizational information security awareness"
-
Siponen, M. (2000), "A conceptual foundation for organizational information security awareness", Information Management and Computer security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
41
-
-
85019433170
-
"A review of information security issues and respective research contributions"
-
Siponen, M.T. and Oinas-Kukkonen, H. (2007), "A review of information security issues and respective research contributions", The Database for Advances in Information Systems, Vol. 38 No. 1, pp. 60-81.
-
(2007)
The Database for Advances in Information Systems
, vol.38
, Issue.1
, pp. 60-81
-
-
Siponen, M.T.1
Oinas-Kukkonen, H.2
-
42
-
-
33644654426
-
"Information security and the law"
-
Sundt, C. (2006), "Information security and the law", Information Security Technical Report, Vol. 11 No. 1, pp. 2-9.
-
(2006)
Information Security Technical Report
, vol.11
, Issue.1
, pp. 2-9
-
-
Sundt, C.1
-
43
-
-
33744520370
-
"Towards an information security competence maturity model"
-
Thomson, K-L. and von Solms, R. (2006), "Towards an information security competence maturity model", Computer Fraud & Security, Vol. 2006 No. 5, pp. 11-15.
-
(2006)
Computer Fraud & Security
, vol.2006
, Issue.5
, pp. 11-15
-
-
Thomson, K.-L.1
von Solms, R.2
-
44
-
-
0033657872
-
"Information security - The third wave?"
-
Von Solms, B. (2000), "Information security - the third wave?", Computers & Security, Vol. 19 No. 7, pp. 615-20.
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 615-620
-
-
Von Solms, B.1
-
45
-
-
0034814690
-
"Information security - A multidimensional discipline"
-
Von Solms, B. (2001), "Information security - a multidimensional discipline", Computers & Security, Vol. 20 No. 6, pp. 501-8.
-
(2001)
Computers & Security
, vol.20
, Issue.6
, pp. 501-508
-
-
Von Solms, B.1
-
46
-
-
33747053670
-
"Information security - The fourth wave"
-
Von Solms, B. (2006), "Information security - the fourth wave", Computers & Security, Vol. 25 No. 3, pp. 165-8.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 165-168
-
-
Von Solms, B.1
-
48
-
-
0036299647
-
"The development of access control policies for information technology systems"
-
Ward, P. and Smith, C.L. (2002), "The development of access control policies for information technology systems", Computer & Security, Vol. 21 No. 4, pp. 365-71.
-
(2002)
Computer & Security
, vol.21
, Issue.4
, pp. 365-371
-
-
Ward, P.1
Smith, C.L.2
-
49
-
-
24644439555
-
"Information security policy's impact on reporting security incidents"
-
Wiant, T.L. (2005), "Information security policy's impact on reporting security incidents", Computers & Security, Vol. 24 No. 6, pp. 448-59.
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 448-459
-
-
Wiant, T.L.1
-
50
-
-
54949091017
-
"A framework for selection of methodology for risk and vulnerability assessments of infrastructures depending on ICT"
-
Wiencke, H.S., Aven, T. and Hagen, J. (2006), "A framework for selection of methodology for risk and vulnerability assessments of infrastructures depending on ICT", The Proceedings of ESREL2006.
-
(2006)
The Proceedings of ESREL2006
-
-
Wiencke, H.S.1
Aven, T.2
Hagen, J.3
|