-
1
-
-
12244306739
-
An Information Security Meta-policy for Emergent Organizations
-
Baskerville, R. & Siponen, M.T. 2002, 'An Information Security Meta-policy for Emergent Organizations' Journal of Logistics Information Management, special issue on Information Security vol. 5-6, pp. 337-346.
-
(2002)
Journal of Logistics Information Management, Special Issue On Information Security
, vol.5-6
, pp. 337-346
-
-
Baskerville, R.1
Siponen, M.T.2
-
4
-
-
84869146886
-
-
Deloitte, viewed 23.8.2006
-
Deloitte. 2005, Information security research, viewed 23.8.2006 http://www.deloitte.com/dtt/research/0,1015,sid=1013&cid=85452,00.html.
-
(2005)
Information Security Research
-
-
-
5
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon, G. & Backhouse, J. 2000, 'Information system security management in the new millennium' Communications of the ACM vol. 43, issue 7, pp. 125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
6
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon, G. & Backhouse, J. 2001, 'Current directions in IS security research: towards socio-organizational perspectives' Information Systems Journal vol. 11, issue 2, pp. 127-153.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
7
-
-
26844516038
-
-
DTI, viewed 27.11.2006
-
DTI. 2005, The_Empirical_Economics_of_Standards viewed 27.11.2006 http://www.dti.gov.uk/files/file9655.pdf.
-
(2005)
The_Empirical_Economics_of_Standards
-
-
-
10
-
-
33847149105
-
-
viewed 23.8.2006
-
Ernst & Young. 2005, Global Information Security survey 2005 viewed 23.8.2006 http://int.sitestat.com/ernst-and-young/international/s?Global-Information-Security-survey-2005&ns_type=pdf.
-
(2005)
Global Information Security Survey 2005
-
-
Ernst1
Young2
-
11
-
-
15744404682
-
Management of risk in the information age
-
Gerber, M. & von Solms, R. 2005, 'Management of risk in the information age' Computers & Security vol. 24, pp. 16-30.
-
(2005)
Computers & Security
, vol.24
, pp. 16-30
-
-
Gerber, M.1
von Solms, R.2
-
13
-
-
69849093151
-
-
Homeland, USA viewed 24.8.2006
-
Homeland. 2006, The Department of Homeland Security, USA viewed 24.8.2006 http://www.dhs.gov/dhspublic/
-
(2006)
The Department of Homeland Security
-
-
-
14
-
-
33751161222
-
A longitudinal study of information system threat categories: The enduring problem of human error
-
Im, G. P. & Baskerville, R. L. 2005, 'A longitudinal study of information system threat categories: the enduring problem of human error' ACM SIGMIS Database vol. 36, issue 4.
-
(2005)
ACM SIGMIS Database
, vol.36
, Issue.4
-
-
Im, G.P.1
Baskerville, R.L.2
-
15
-
-
84869136304
-
-
ISF, viewed 22.6.2006
-
ISF. 2006, Information Security Forum viewed 22.6.2006 http://www.securityforum.org/html/frameset.htm.
-
(2006)
Information Security Forum
-
-
-
16
-
-
84869099002
-
Information Security Forum
-
ISFSTD, viewed 25.8
-
ISFSTD. 2006, Information Security Forum. The Standard of Good Practice for Information Security viewed 25.8. http://www.isfsecuritystandard.com/index_ns.htm.
-
(2006)
The Standard of Good Practice For Information Security
-
-
-
17
-
-
84869143804
-
-
ISO/IEC 9000. 2000, viewed 16.9.2006
-
ISO/IEC 9000. 2000, ISO 9000-14000 standards viewed 16.9.2006 http://www.iso.org/iso/en/iso9000-14000/understand/selection_use/selection_use.html.
-
ISO 9000-14000 Standards
-
-
-
19
-
-
0001946339
-
A set of principles for conducting and evaluating interpretive field studies in information systems
-
Klein, H. K & Myers, M. D. 1999, 'A set of principles for conducting and evaluating interpretive field studies in information systems' MIS Quarterly vol. 23, issue 1, pp. 67-88.
-
(1999)
MIS Quarterly
, vol.23
, Issue.1
, pp. 67-88
-
-
Klein, H.K.1
Myers, M.D.2
-
21
-
-
22544463689
-
The implications of Sarbanes-Oxley for non-US IT departments
-
O'Conor, M. 2005, 'The implications of Sarbanes-Oxley for non-US IT departments' Network Security vol. 2005, issue 7, pp. 17-20.
-
(2005)
Network Security
, vol.2005
, Issue.7
, pp. 17-20
-
-
O'Conor, M.1
-
22
-
-
33644654726
-
Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II)
-
Pinder, P. 2006, 'Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II)' Information Security Technical Report vol. 11, issue 1, pp. 32-38.
-
(2006)
Information Security Technical Report
, vol.11
, Issue.1
, pp. 32-38
-
-
Pinder, P.1
-
23
-
-
10644238912
-
Homeland security and information sharing: Federal policy considerations
-
Relyea, H. C. 2004, 'Homeland security and information sharing: Federal policy considerations' Government Information Quarterly vol. 21, issue 4, pp. 420-438.
-
(2004)
Government Information Quarterly
, vol.21
, Issue.4
, pp. 420-438
-
-
Relyea, H.C.1
-
24
-
-
24944436916
-
Sarbanes-Oxley-a huge boon to information security
-
Schultz, E. E. 2004, 'Sarbanes-Oxley-a huge boon to information security' Computers & Security vol. 23, Issue 5, pp. 353-354.
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 353-354
-
-
Schultz, E.E.1
-
25
-
-
0036038088
-
Information security-who cares?
-
Conference Publication No. 488, 17-19 April 2002
-
Shephard, B. 2002, 'Information security-who cares?' Power System Management and Control Conference Publication No. 488, 17-19 April 2002, pp.124-129.
-
(2002)
Power System Management and Control
, pp. 124-129
-
-
Shephard, B.1
-
26
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
Siponen, M. T. 2005, 'Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods' Information and Organization vol. 15, issue 4, pp. 339-375.
-
(2005)
Information and Organization
, vol.15
, Issue.4
, pp. 339-375
-
-
Siponen, M.T.1
-
27
-
-
33747194078
-
Information Security Standards Focus on the Existence of Process, Not Its Content?
-
Siponen, M.T. 2006, 'Information Security Standards Focus on the Existence of Process, Not Its Content?' Communications of the ACM vol. 49, issue 8, pp. 97-100.
-
(2006)
Communications of the ACM
, vol.49
, Issue.8
, pp. 97-100
-
-
Siponen, M.T.1
-
28
-
-
0034814690
-
Information Security - A Multidimensional Discipline
-
von Solms, B. 2001, 'Information Security - A Multidimensional Discipline' Computers & Security vol. 20, pp. 504-508.
-
(2001)
Computers & Security
, vol.20
, pp. 504-508
-
-
von Solms, B.1
-
29
-
-
17844364638
-
Information Security governance: COBIT or ISO 17799 or both?
-
von Solms, B. 2005, 'Information Security governance: COBIT or ISO 17799 or both?' Computers & Security vol. 24, pp. 99-104.
-
(2005)
Computers & Security
, vol.24
, pp. 99-104
-
-
von Solms, B.1
-
30
-
-
3042812983
-
The 10 deadly sins of information security management
-
von Solms, B. & von Solms R. 2004, 'The 10 deadly sins of information security management' Computers & Security vol. 23, issue 5, pp. 371-376.
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 371-376
-
-
von Solms, B.1
von Solms, R.2
-
32
-
-
33745056813
-
The Sarbanes-Oxley Act and the changing role of the CIO and IT function
-
Sutton, S. G. & Arnold V. 2005, 'The Sarbanes-Oxley Act and the changing role of the CIO and IT function' Int. J. Business Information Systems vol. 1, issues 1/2.
-
(2005)
Int. J. Business Information Systems
, vol.1
, Issue.1-2
-
-
Sutton, S.G.1
Arnold, V.2
-
33
-
-
24644470542
-
The insider threat to information systems and the effectiveness of ISO17799
-
Theoharidou, M., Kokolakis, S., Karyda M. & Kiountouzis, E. 2005, 'The insider threat to information systems and the effectiveness of ISO17799' Computers & Security vol. 24, pp. 472-484.
-
(2005)
Computers & Security
, vol.24
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
34
-
-
84890025144
-
Implementation of ISO17799 and BS7799 in picture archiving and communication system: Local experience in implementation of BS7799 standard
-
Tong, C. K. S., Fung, K. H., Huang, H. Y. H. & Chan, K. K. 2003, 'Implementation of ISO17799 and BS7799 in picture archiving and communication system: local experience in implementation of BS7799 standard' International Congress Series.
-
(2003)
International Congress Series
-
-
Tong, C.K.S.1
Fung, K.H.2
Huang, H.Y.H.3
Chan, K.K.4
-
35
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
Whitman, M. E. 2003, 'Enemy at the gate: threats to information security' Communications of the ACM vol. 46, Issue 8.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
-
-
Whitman, M.E.1
|