-
2
-
-
3042782049
-
What is computer security?
-
Jan.-Feb.
-
M. Bishop, "What is computer security?" IEEE Sec. Priv. Mag., vol.1, no.1, pp. 67-69, Jan.-Feb. 2003.
-
(2003)
IEEE Sec. Priv. Mag.
, vol.1
, Issue.1
, pp. 67-69
-
-
Bishop, M.1
-
3
-
-
50349098286
-
-
Online. Available
-
BSI, "IT Grundschutz Manual," 2004. [Online]. Available: http://www.bsi.de/english/gshb/manual/download/index.html
-
(2004)
IT Grundschutz Manual
-
-
-
5
-
-
55249089094
-
The growing risks of information systems success
-
December
-
M. Vitale, "The growing risks of information systems success," MIS Quarterly, vol.10, no.4, pp. 327-334, December 1986.
-
(1986)
MIS Quarterly
, vol.10
, Issue.4
, pp. 327-334
-
-
Vitale, M.1
-
6
-
-
33847748221
-
Is information security under control?: Investigating quality in information security management
-
DOI 10.1109/MSP.2007.11
-
W. Baker and L. Wallace, "Is information security under control?: Investigating quality in information security management," IEEE Security and Privacy, vol.5, no.1, pp. 36-44, 2007. (Pubitemid 46384607)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.1
, pp. 36-44
-
-
Baker, W.H.1
Wallace, L.2
-
7
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
December
-
R. Baskerville, "Information systems security design methods: Implications for information systems development," ACM Computing Surveys, vol.25, no.4, pp. 375-414, December 1993.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
9
-
-
34848920878
-
Necessary measures: Metric-driven information security risk assessment and decision making
-
DOI 10.1145/1290958.1290969, 1290969
-
W. Baker, L. Rees, and P. Tippett, "Necessary measures: metric-driven information security risk assessment and decision making," Communications of the ACM, vol.50, no.10, pp. 101-106, 2007. (Pubitemid 47505006)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 101-106
-
-
Baker, W.H.1
Rees, L.P.2
Tippett, P.S.3
-
10
-
-
2942625232
-
Coming Up Short on Financial Measurement
-
C. D. Ittner and D. F. Larcker, "Coming Up Short On Financial Measurement," Havard Business Review, vol.81, no.11, 2003.
-
(2003)
Havard Business Review
, vol.81
, Issue.11
-
-
Ittner, C.D.1
Larcker, D.F.2
-
11
-
-
0032324668
-
Challenges to the practical implementation of modeling and valuing real options
-
D. M. Lander and G. E. Pinches, "Challenges to the practical implementation of modelling and valuing real options," The Quarterly Review of Economics and Finance, vol.38, pp. 537-567, 1998. (Pubitemid 128180039)
-
(1998)
Quarterly Review of Economics and Finance
, vol.38
, Issue.3 PART 1
, pp. 537-567
-
-
Lander, D.M.1
Pinches, G.E.2
-
13
-
-
24944559544
-
-
FIPS, National Bureau of Standards, Federal Information Processing Standards Publications (FIPS PUB) August
-
FIPS, "Guideline for automatic data processing risk analysis," National Bureau of Standards, Federal Information Processing Standards Publications (FIPS PUB) 65, August 1975.
-
(1975)
Guideline for Automatic Data Processing Risk Analysis
, vol.65
-
-
-
14
-
-
70449846056
-
Risk analysis for information technology
-
Summer
-
R. Rainer, C. Snyder, and H. Carr, "Risk analysis for information technology," Journal of Management Information Systems, vol.8, no.1, pp. 129-147, Summer 1991.
-
(1991)
Journal of Management Information Systems
, vol.8
, Issue.1
, pp. 129-147
-
-
Rainer, R.1
Snyder, C.2
Carr, H.3
-
15
-
-
0031631068
-
A conceptual framework for information security management
-
T. Finne, "A conceptual framework for information security management," Computers & Security, vol.17, pp. 303-307, 1998. (Pubitemid 128400523)
-
(1998)
Computers and Security
, vol.17
, Issue.4
, pp. 303-307
-
-
Finne, T.1
-
16
-
-
84990029315
-
The economics of information security investment
-
November
-
L. Gordon and M. Loeb, "The economics of information security investment," ACM Transactions on Information and System Security, vol.5, no.4, pp. 438-457, November 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.1
Loeb, M.2
-
17
-
-
4243109556
-
A model for evaluating it security investments
-
H. Cavusoglu, B. Mishra, and S. Raghunathan, "A model for evaluating it security investments," Communications of the ACM, vol.47, no.7, pp. 87-92, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
18
-
-
42149112876
-
Information security and risk management
-
April
-
L. Bodin, L. Gordon, and M. Loeb, "Information security and risk management," Communications of the ACM, vol.51, no.4, pp. 64-68, April 2008.
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 64-68
-
-
Bodin, L.1
Gordon, L.2
Loeb, M.3
-
19
-
-
9744234714
-
One approach to risk assessment
-
February
-
B. Farquhar, "One approach to risk assessment," Computers and Security, vol.10, no.10, pp. 21-23, February 1991.
-
(1991)
Computers and Security
, vol.10
, Issue.10
, pp. 21-23
-
-
Farquhar, B.1
-
20
-
-
1842829828
-
-
National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-8930, NIST Special Publication 800-830, July
-
G. Stoneburner, A. Goguen, and A. Feringa, "Risk management guide for information technology systems," National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-8930, NIST Special Publication 800-830, July 2002.
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
21
-
-
33846674492
-
-
Carnegie Mellon - Software Engineering Institute, Pittsburgh, PA 15213-23890, Tech. Rep., August
-
C. Alberts, A. Dorofee, J. Stevens, and C. Woody, "Introduction to the OCTAVE approach," Carnegie Mellon - Software Engineering Institute, Pittsburgh, PA 15213-23890, Tech. Rep., August 2003.
-
(2003)
Introduction to the OCTAVE Approach
-
-
Alberts, C.1
Dorofee, A.2
Stevens, J.3
Woody, C.4
-
23
-
-
77953791271
-
Formal threat descriptions for enhancing governmental risk assessment
-
ACM Press
-
A. Ekelhart, S. Fenz, T. Neubauer, and E. Weippl, "Formal threat descriptions for enhancing governmental risk assessment," in Proceedings of the First International Conference on Theory and Practice of Electronic Governance. ACM Press, 2007.
-
(2007)
Proceedings of the First International Conference on Theory and Practice of Electronic Governance
-
-
Ekelhart, A.1
Fenz, S.2
Neubauer, T.3
Weippl, E.4
|