-
1
-
-
55249099424
-
Mapping the intellectual structure of MIS, 1980-1985: A co-citation analysis
-
CULNAN M. (1987) Mapping the intellectual structure of MIS, 1980-1985: a co-citation analysis. MIS Quarterly 11(3), 341-353.
-
(1987)
MIS Quarterly
, vol.11
, Issue.3
, pp. 341-353
-
-
CULNAN, M.1
-
2
-
-
67650174475
-
-
ERNST and YOUNG (2008) Moving beyond compliance: Ernst & Young's 2008 global information security survey. [WWW document] http://www.ey.com/Global/assets.nsf/International/TSRS-Global-Information- Security-Survey-2008/$file/TSRS-Global-Information-Security-Survey-2008. pdf (accessed 1 April 2009).
-
ERNST and YOUNG (2008) Moving beyond compliance: Ernst & Young's 2008 global information security survey. [WWW document] http://www.ey.com/Global/assets.nsf/International/TSRS-Global-Information- Security-Survey-2008/$file/TSRS-Global-Information-Security-Survey-2008. pdf (accessed 1 April 2009).
-
-
-
-
3
-
-
84976755166
-
-
FARHOOMAND A.F. (1987) Scientific progress of management information systems. The DATA BASE for Advances in Information Systems 18(4), 48-56.
-
FARHOOMAND A.F. (1987) Scientific progress of management information systems. The DATA BASE for Advances in Information Systems 18(4), 48-56.
-
-
-
-
4
-
-
0003082268
-
A historiographical examination of information systems
-
FARHOOMAND A.F. and DRURY D.H. (1999) A historiographical examination of information systems. Communications of the AIS 1, 1-27.
-
(1999)
Communications of the AIS
, vol.1
, pp. 1-27
-
-
FARHOOMAND, A.F.1
DRURY, D.H.2
-
6
-
-
33751161222
-
A longitudinal study of information systems threat categories: The enduring problem of human error
-
IM G. and BASKERVILLE R. (2005) A longitudinal study of information systems threat categories: the enduring problem of human error. The DATA BASE for Advances in Information Systems 36(4), 68-79.
-
(2005)
The DATA BASE for Advances in Information Systems
, vol.36
, Issue.4
, pp. 68-79
-
-
IM, G.1
BASKERVILLE, R.2
-
7
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
LOCH K.D., CARR H.H. and WARKENTIN M.E. (1992) Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 16(2), 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
LOCH, K.D.1
CARR, H.H.2
WARKENTIN, M.E.3
-
10
-
-
17844366573
-
Analysis of end user security behaviors
-
STANTON J.M., STAM K.R., MASTRANGELO P. and JOLTON J. (2005) Analysis of end user security behaviors. Computers & Security 24(2), 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
STANTON, J.M.1
STAM, K.R.2
MASTRANGELO, P.3
JOLTON, J.4
-
11
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
STRAUB D. and WELKE R. (1998) Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22(4), 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
STRAUB, D.1
WELKE, R.2
-
12
-
-
0036754514
-
Research in information systems: An empirical study of diversity in the discipline and its journals
-
VESSEY I., RAMESH V. and GLASS R.L. (2002) Research in information systems: an empirical study of diversity in the discipline and its journals. Journal of Management Information Systems 19(2), 129-174.
-
(2002)
Journal of Management Information Systems
, vol.19
, Issue.2
, pp. 129-174
-
-
VESSEY, I.1
RAMESH, V.2
GLASS, R.L.3
-
13
-
-
84905713906
-
Information system security and privacy
-
HANSoN J, Ed, Ablex Publishing, Norwood, NJ
-
WARKENTIN M.E. (1995) Information system security and privacy. In Emerging Information Technologies, Advances in Telematics HANSoN J, Ed), Volume 2, pp. 57-77, Ablex Publishing, Norwood, NJ.
-
(1995)
Emerging Information Technologies, Advances in Telematics
, vol.2
, pp. 57-77
-
-
WARKENTIN, M.E.1
-
14
-
-
85106113141
-
IT governance and organizational development for security management
-
STRAUB D, GOODMAN Sand BASKERVILLE RL, Eds, pp, M.E. Sharpe, Armonk, NY
-
WARKENTIN M. and JOHNSTON A.C. (2008) IT governance and organizational development for security management. In Information Security Policies and Practices STRAUB D, GOODMAN Sand BASKERVILLE RL, Eds), pp. 46-68, M.E. Sharpe, Armonk, NY.
-
(2008)
Information Security Policies and Practices
, pp. 46-68
-
-
WARKENTIN, M.1
JOHNSTON, A.C.2
-
15
-
-
2642569127
-
Introducing the check-off password system (COPS): An advancement in user authentication methods and information security
-
WARKENTIN M., DAVIS K. and BEKKERING E. (2004) Introducing the check-off password system (COPS): an advancement in user authentication methods and information security. Journal of Organizational and End User Computing 16(3), 41-58.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 41-58
-
-
WARKENTIN, M.1
DAVIS, K.2
BEKKERING, E.3
-
16
-
-
33750683067
-
Understanding the perpetration of employee computer crime in the organisational context
-
WILLISON R. (2006) Understanding the perpetration of employee computer crime in the organisational context. Information and Organization 16(4), 304-324.
-
(2006)
Information and Organization
, vol.16
, Issue.4
, pp. 304-324
-
-
WILLISON, R.1
-
18
-
-
33749351964
-
Opportunities for computer abuse: Considering systems risk from the offender's perspective
-
WILLISON R. and BACKHOUSE J. (2006) Opportunities for computer abuse: considering systems risk from the offender's perspective. European Journal of Information Systems 15(4), 403-414.
-
(2006)
European Journal of Information Systems
, vol.15
, Issue.4
, pp. 403-414
-
-
WILLISON, R.1
BACKHOUSE, J.2
|