-
2
-
-
34948850959
-
On the imbalance of the security problem space and its expected consequences
-
12
-
Beznosov, K. and Beznosova, O. (2007). 'On the Imbalance of the Security Problem Space and its Expected Consequences'. Information Management & Computer Security 15(5):420-431 (12).
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.5
, pp. 420-431
-
-
Beznosov, K.1
Beznosova, O.2
-
3
-
-
36849085382
-
Towards understanding IT security professionals and their tools
-
Pittsburgh, Pennsylvania
-
Botta, D., et al. (2007). 'Towards Understanding IT Security Professionals and Their Tools'. In SOUPS Proceedings, pp. 100-111, Pittsburgh, Pennsylvania.
-
(2007)
SOUPS Proceedings
, pp. 100-111
-
-
Botta, D.1
-
4
-
-
33645031405
-
Organisational factors to the effectiveness of implementing information security management
-
Chang, S. and Ho, C. (2006). 'Organisational factors to the effectiveness of implementing information security management'. Information Management & Computer Security, vol. 106, pp. 345-361.
-
(2006)
Information Management & Computer Security
, vol.106
, pp. 345-361
-
-
Chang, S.1
Ho, C.2
-
6
-
-
84925997977
-
-
I. J. Human-Computer Studies
-
Flechais, I. and Sasse, M. (2007). 'Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science'. I. J. Human-Computer Studies.
-
(2007)
Stakeholder Involvement, Motivation, Responsibility, Communication: How to Design Usable Security in e-Science
-
-
Flechais, I.1
Sasse, M.2
-
7
-
-
84925997976
-
Human, organizational, and technological factors of it security
-
Hawkey, K., Botta, D., Werlinger, R., Muldner, K., Gagne, A., and Beznosov. K. (2008) 'Human, organizational, and technological factors of it security'. Accepted at CHI 2008 (Research Landscapes), (to appear).
-
(2008)
CHI 2008 (Research Landscapes)
-
-
Hawkey, K.1
Botta, D.2
Werlinger, R.3
Muldner, K.4
Gagne, A.5
Beznosov, K.6
-
8
-
-
67650962431
-
Information security governance reporting
-
Garigue, R. and Stefaniu, M. (2003). 'Information Security Governance Reporting'. EDPACS 31(6):11-17.
-
(2003)
EDPACS
, vol.31
, Issue.6
, pp. 11-17
-
-
Garigue, R.1
Stefaniu, M.2
-
12
-
-
33749496395
-
A framework for outsourcing IS/IT security services
-
Karyda, M., et al. (2006). 'A framework for outsourcing IS/IT security services'. Information Management & Computer Security 14:403-416.
-
(2006)
Information Management & Computer Security
, vol.14
, pp. 403-416
-
-
Karyda, M.1
-
13
-
-
33644533141
-
Information security: Management's effect on culture and policy
-
Knapp, K., et al. (2006). 'Information security: management's effect on culture and policy'. Information Management & Computer Security 14(1):24-36.
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.1
, pp. 24-36
-
-
Knapp, K.1
-
14
-
-
77954505756
-
The interrelationship and effect of culture and risk communication in setting internet banking security goals
-
New York, NY, USA. ACM Press
-
Koskosas, I. and Paul, R. (2004). 'The interrelationship and effect of culture and risk communication in setting internet banking security goals'. In ICEC '04, pp. 341-350, New York, NY, USA. ACM Press.
-
(2004)
ICEC '04
, pp. 341-350
-
-
Koskosas, I.1
Paul, R.2
-
15
-
-
33750513188
-
Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
-
Kraemer, S. and Carayon, P. (2007). 'Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists'. Applied Ergonomics 38:143-154.
-
(2007)
Applied Ergonomics
, vol.38
, pp. 143-154
-
-
Kraemer, S.1
Carayon, P.2
-
17
-
-
0036532101
-
An empirical study of industrial securityengineering practices
-
Rayford, R., Vaughn, B. and Fox, K. (2001). 'An empirical study of industrial securityengineering practices'. The Journal of Systems and Software 61:225-232.
-
(2001)
The Journal of Systems and Software
, vol.61
, pp. 225-232
-
-
Rayford, R.1
Vaughn, B.2
Fox, K.3
-
18
-
-
0034241415
-
Whatever happened to qualitative description?
-
Sandelowski, M. (2000). 'Whatever Happened to Qualitative Description?'. Research in Nursing & Health 23(4):334-340.
-
(2000)
Research in Nursing & Health
, vol.23
, Issue.4
, pp. 334-340
-
-
Sandelowski, M.1
-
19
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. and Welke, R. (1998). 'Coping with systems risk: security planning models for management decision making'. MIS Q. 22(4):441-469.
-
(1998)
MIS Q
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
20
-
-
34948812617
-
Toward viable information security reporting systems
-
12
-
Sveen, F., et al. (2007). 'Toward Viable Information Security Reporting Systems'. Information Management & Computer Security 15(5):408-419 (12).
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.5
, pp. 408-419
-
-
Sveen, F.1
-
21
-
-
15744368808
-
Information security obedience: A definition
-
Thomson, K. and von Solms, R. (2005). 'Information security obedience: a definition'. Computers & Security 24(1):69-75.
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 69-75
-
-
Thomson, K.1
Von Solms, R.2
-
22
-
-
33744805562
-
Formulating information systems risk management strategies through cultural theory
-
Tsohou, A., et al. (2006). 'Formulating information systems risk management strategies through cultural theory'. Information Management & Computer Security 14(3):198-217.
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.3
, pp. 198-217
-
-
Tsohou, A.1
|