-
1
-
-
69049114070
-
-
Aceituno, V. C. (2004). ISM31.0. - Information security management maturity model, Institute for Security and Open Methodology. Retrieved January 10, 2005, from http://isecom.securenetltd.com/Security_Maturity_Model_v3.0.pdf
-
Aceituno, V. C. (2004). ISM31.0. - Information security management maturity model, Institute for Security and Open Methodology. Retrieved January 10, 2005, from http://isecom.securenetltd.com/Security_Maturity_Model_v3.0.pdf
-
-
-
-
3
-
-
0002698747
-
Information security management in the new millennium
-
Backhouse J., and Dhillon G. Information security management in the new millennium. Communications of the ACM 43 (2000) 125-128
-
(2000)
Communications of the ACM
, vol.43
, pp. 125-128
-
-
Backhouse, J.1
Dhillon, G.2
-
5
-
-
69049097209
-
-
Magazine. Retrieved October 19, 2004, from
-
Berinato, S. (2003). After the storm, reform. CIO Magazine. Retrieved October 19, 2004, from http://www.cio.com/archive/121503/securityfuture.html
-
(2003)
After the storm, reform
-
-
Berinato, S.1
-
8
-
-
69049084670
-
-
BS7799 British Standard on Information Security System Management, 2000, Retrieved August 10, 2003, from
-
BS7799 (British Standard on Information Security System Management) (2000). Retrieved August 10, 2003, from http://www.bsi-global.com/Corporate/17799.xalter
-
-
-
-
9
-
-
69049092843
-
-
Carnegie-Mellon University. Software Engineering Institute. Retrieved October 19, 2004, from
-
Caralli, R. A. & Wilson, W.R. (2003). The challenges of security management. Carnegie-Mellon University. Software Engineering Institute. Retrieved October 19, 2004, from http://www.cert.org/archive/pdf/Esmchallenges.pdf
-
(2003)
The challenges of security management
-
-
Caralli, R.A.1
Wilson, W.R.2
-
10
-
-
69049086787
-
Control objectives for information and related technology: Management guidelines
-
COBIT , Illinois: ISACA, Retrieved April 20, 2004, from
-
COBIT (2000). Control objectives for information and related technology: Management guidelines. Information Systems, Audit, and Control Foundation. Illinois: ISACA, 1997. Retrieved April 20, 2004, from http://www.isaca.org/cobit.htm
-
(1997)
Information Systems, Audit, and Control Foundation
-
-
-
11
-
-
69049084669
-
-
COBIT , Illinois: ISACA, Retrieved April 20, 2004, from
-
COBIT (2002). Control objectives for information and related technology, by the Information Systems, Audit, and Control Foundation. Illinois: ISACA, 1997. Retrieved April 20, 2004, from http://www.isaca.org/cobit.htm
-
(1997)
Control objectives for information and related technology, by the Information Systems, Audit, and Control Foundation
-
-
-
13
-
-
0034158883
-
Information security management: A hierarchical framework for various approaches
-
Eloff M.M., and Solms S.H. Information security management: A hierarchical framework for various approaches. Computers and Security 19 3 (2000) 243-256
-
(2000)
Computers and Security
, vol.19
, Issue.3
, pp. 243-256
-
-
Eloff, M.M.1
Solms, S.H.2
-
15
-
-
64949122788
-
-
Hanley Management College, UK and Dataföreningen, Sweden. Retrieved November 20, 2004, from
-
Ezingeard, J. N. & Bowen-Schrire, M. (2003). Information security: A strategic issue. A conjoint report study, Hanley Management College, UK and Dataföreningen, Sweden. Retrieved November 20, 2004, from http://www.henley.se
-
(2003)
A conjoint report study, Information security: A strategic issue
-
-
Ezingeard, J.N.1
Bowen-Schrire, M.2
-
16
-
-
0042363355
-
The application of information security policies in large UK-based organizations: An exploratory investigation
-
Fulford H., and Doherty N.F. The application of information security policies in large UK-based organizations: An exploratory investigation. Information Management & Computer Security 11 3 (2003) 106-114
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
17
-
-
3242808612
-
-
Retrieved June 24, 2004, from
-
Gordon, L. A., Loeb, G. M., Lucyshyn, W. & Richardson, R. (2004). 9th Annual FBI/CSI Computer Crime and Security Survey 2004. Retrieved June 24, 2004, from http://GoCSI.com
-
(2004)
9th Annual FBI/CSI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, G.M.2
Lucyshyn, W.3
Richardson, R.4
-
18
-
-
69049087850
-
Policy development
-
Tipton H.F., and Kraus M. (Eds), Auerbach Publications, New York
-
Hare C. Policy development. In: Tipton H.F., and Kraus M. (Eds). Information security management handbook. 4th ed. Vol. 3 (2002), Auerbach Publications, New York
-
(2002)
Information security management handbook. 4th ed.
, vol.3
-
-
Hare, C.1
-
19
-
-
0345327795
-
An integrated system theory of information security management
-
Hong K.S., Chi Y.P., Chao L.R., and Tang J.H. An integrated system theory of information security management. Information Management & Computer Security 11 5 (2003) 243-448
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.5
, pp. 243-448
-
-
Hong, K.S.1
Chi, Y.P.2
Chao, L.R.3
Tang, J.H.4
-
20
-
-
69049083580
-
-
ISO/IEC 17799 (2005). Information technology - Code of practice for information security management. Geneva: International Organization for Standardization. Retrieved June 24, 2004, from http://www.iso.org
-
ISO/IEC 17799 (2005). Information technology - Code of practice for information security management. Geneva: International Organization for Standardization. Retrieved June 24, 2004, from http://www.iso.org
-
-
-
-
21
-
-
25644456506
-
-
IT Governance Institute , Retrieved August 11, 2004, from
-
IT Governance Institute (2005). Board briefing on IT governance. Retrieved August 11, 2004, from http://www.itgi.org
-
(2005)
Board briefing on IT governance
-
-
-
22
-
-
64949178299
-
Malaysian Public Service Department (Jabatan Perkhidmatan Awam Malaysia)
-
JPA
-
JPA (2005). Malaysian Public Service Department (Jabatan Perkhidmatan Awam Malaysia). Proceedings of Public Service Conference 2005.
-
(2005)
Proceedings of Public Service Conference
-
-
-
25
-
-
33644556599
-
-
ISC, Survey Results. Retrieved March 20, 2005, from
-
Knapp, K., Marshall, T., Rainer, R. K. & Morrow, D. (2004). Top ranked information security issues: The 2004 International Information System Security Certification Consortium (ISC) 2 Survey Results. Retrieved March 20, 2005, from www.isc2.org
-
(2004)
Top ranked information security issues: The 2004 International Information System Security Certification Consortium
, pp. 2
-
-
Knapp, K.1
Marshall, T.2
Rainer, R.K.3
Morrow, D.4
-
27
-
-
69049104312
-
-
MAMPU, (2001). Malaysian Administrative Modernization and Management Planning Unit, Mekanisme Pelaporan Insiden Keselamatan Teknologi Maklumat dan Komunikasi (Information and Communications Technology Security Incident Reporting Mechanism), Malaysia Government General Circular No. 1 of 2001. http://www.mampu.gov.my/mampu/bm/program/Circulars/Security/SPAm012001.html
-
MAMPU, (2001). Malaysian Administrative Modernization and Management Planning Unit, Mekanisme Pelaporan Insiden Keselamatan Teknologi Maklumat dan Komunikasi (Information and Communications Technology Security Incident Reporting Mechanism), Malaysia Government General Circular No. 1 of 2001. http://www.mampu.gov.my/mampu/bm/program/Circulars/Security/SPAm012001.html
-
-
-
-
29
-
-
69049098237
-
-
Malaysia, Public Service ICT Strategic Plan Executive Summary. Retrieved August 23, 2005, from
-
MAMPU, (2003). Malaysian Administrative Modernization and Management Planning Unit, Malaysia, Public Service ICT Strategic Plan Executive Summary. Retrieved August 23, 2005, from www.mampu.gov.my/mampu/bi/program/ict/ISPlan/ISPlan.htm
-
(2003)
-
-
-
31
-
-
69049092841
-
-
Retrieved February 27, 2003, from and, http://www.giac.org/practical/gsec/Jerry_Marsh_GSEC.pdf
-
Marsh, J. (2003). Myths managers believe about security. Retrieved February 27, 2003, from http://www.sans.org/rr/start/myths.php and http://www.giac.org/practical/gsec/Jerry_Marsh_GSEC.pdf
-
(2003)
Myths managers believe about security
-
-
Marsh, J.1
-
32
-
-
15744399299
-
Security and risk management: A fundamental business issue
-
July/Aug
-
McAdams A.C. Security and risk management: A fundamental business issue. Information Management Journal (2004) 36-44 July/Aug
-
(2004)
Information Management Journal
, pp. 36-44
-
-
McAdams, A.C.1
-
33
-
-
50749133016
-
Control is fundamental to successful information security
-
Menkus B. Control is fundamental to successful information security. Computers & Security 10 1 (1991) 293-297
-
(1991)
Computers & Security
, vol.10
, Issue.1
, pp. 293-297
-
-
Menkus, B.1
-
35
-
-
69049096170
-
-
Orebro University, Sweden. Retrieved November 20, 2005, from
-
Musekura, J.B. & Ekh, R. (2003) Information security issues - Difference between perception and practice in organizations, Orebro University, Sweden. Retrieved November 20, 2005, from http://www.oru.se/oru-upload/
-
(2003)
Information security issues - Difference between perception and practice in organizations
-
-
Musekura, J.B.1
Ekh, R.2
-
36
-
-
48249152847
-
Info-terrorism in the age of the internet: Challenges and initiatives
-
Summer 2003
-
Nakra P. Info-terrorism in the age of the internet: Challenges and initiatives. Journal of Competitive Intelligence and Management 1 2 (2003) 1-10 Summer 2003
-
(2003)
Journal of Competitive Intelligence and Management
, vol.1
, Issue.2
, pp. 1-10
-
-
Nakra, P.1
-
40
-
-
69049107634
-
-
PWC , top issues report. Retrieved March 15, 2005, from
-
PWC (2004). Price Waterhouse Coopers - 2004 ISC2 top issues report. Retrieved March 15, 2005, from http://www.pwc.com
-
(2004)
Price Waterhouse Coopers - 2004
-
-
-
43
-
-
0036434179
-
Towards maturity of information security maturity criteria: Six lessons learned from software maturity criteria
-
Siponen M. Towards maturity of information security maturity criteria: Six lessons learned from software maturity criteria. Information Management and Computer Security 10 5 (2002) 210-224
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.5
, pp. 210-224
-
-
Siponen, M.1
-
44
-
-
0034989368
-
Corporate governance and information security
-
Solms S.H. Corporate governance and information security. Computers and Security 20 3 (2001) 215-218
-
(2001)
Computers and Security
, vol.20
, Issue.3
, pp. 215-218
-
-
Solms, S.H.1
-
45
-
-
3042812983
-
The 10 deadly sins of information security
-
Solms B., and Solms R. The 10 deadly sins of information security. Computers and Security 23 5 (2004) 371-376
-
(2004)
Computers and Security
, vol.23
, Issue.5
, pp. 371-376
-
-
Solms, B.1
Solms, R.2
-
46
-
-
69049085711
-
-
Retrieved July 24, 2004, from
-
Sommer, R. (2003). How to buy information security. Retrieved July 24, 2004, from http://www.virtualcity.co.uk.hottobuy.htm
-
(2003)
How to buy information security
-
-
Sommer, R.1
-
48
-
-
0011587363
-
Information security program maturity grid
-
Stacey T.R. Information security program maturity grid. Information System Security 5 (1996) 22-33
-
(1996)
Information System Security
, vol.5
, pp. 22-33
-
-
Stacey, T.R.1
-
49
-
-
20444471025
-
Enterprise resilience: Managing risk in the networked economy
-
Spring, Retrieved May 20, 2005, from
-
Starr, R., Newfrock, J. & Delurey, M. (2003). Enterprise resilience: Managing risk in the networked economy. Strategy & Business, Spring 2003. Retrieved May 20, 2005, from http://www.strategy-business.com
-
(2003)
Strategy & Business
-
-
Starr, R.1
Newfrock, J.2
Delurey, M.3
-
51
-
-
0003725488
-
-
Pearson Education, Inc, New York
-
Turban E., King D., Lee J., and Viehland D. Electronic commerce 2004 - Managerial perspective. International Edition (2004), Pearson Education, Inc, New York 1-34
-
(2004)
Electronic commerce 2004 - Managerial perspective. International Edition
, pp. 1-34
-
-
Turban, E.1
King, D.2
Lee, J.3
Viehland, D.4
-
52
-
-
0003669849
-
-
John Wiley and Sons, Inc, New York
-
Vaughn E.J. Risk management (1997), John Wiley and Sons, Inc, New York
-
(1997)
Risk management
-
-
Vaughn, E.J.1
-
53
-
-
33645209293
-
How software project risk affects project performance: An investigation of the dimensions of risk and an exploratory model
-
Spring 2004
-
Wallace L., Keil M., and Rai A. How software project risk affects project performance: An investigation of the dimensions of risk and an exploratory model. Decision Sciences 35 2 (2004) 289-320 Spring 2004
-
(2004)
Decision Sciences
, vol.35
, Issue.2
, pp. 289-320
-
-
Wallace, L.1
Keil, M.2
Rai, A.3
|