-
1
-
-
0038344285
-
An investigation of keypad interface security
-
Adams, D. A. and S. Y. Chang. (1993). An Investigation of Keypad Interface Security, Information & Management (24). 53-59.
-
(1993)
Information & Management
, vol.24
, pp. 53-59
-
-
Adams, D.A.1
Chang, S.Y.2
-
2
-
-
70349371776
-
Security of statistical databases with an output perturbation technique
-
Adam N. and D. H. Jones. (1989). Security of Statistical Databases with an Output Perturbation Technique, Journal of Management Information Systems (6)1. 101-110.
-
(1989)
Journal of Management Information Systems
, vol.6
, Issue.1
, pp. 101-110
-
-
Adam, N.1
Jones, D.H.2
-
4
-
-
33749617452
-
Clarifying the effects of internet monitoring on job attitudes: The mediating role of employee trust
-
Alder, G. S., T. W. Noel, and M. L. Ambrose. (2006). Clarifying the Effects of Internet Monitoring on Job Attitudes: The Mediating Role of Employee Trust, Information & Management (43). 894-903.
-
(2006)
Information & Management
, vol.43
, pp. 894-903
-
-
Alder, G.S.1
Noel, T.W.2
Ambrose, M.L.3
-
5
-
-
0038544668
-
Why we need a new definition of information security
-
Anderson, J. M. (2003). Why We Need a New Definition of Information Security, Computers & Security (22)4. 308-313.
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 308-313
-
-
Anderson, J.M.1
-
6
-
-
70349359537
-
Ethics and morality: A business opportunity for the amoral?
-
Angell, I. (2007). Ethics and Morality: A Business Opportunity for the Amoral?, Journal of Information System Security (3)1. 3-18.
-
(2007)
Journal of Information System Security
, vol.3
, Issue.1
, pp. 3-18
-
-
Angell, I.1
-
7
-
-
0036644509
-
Computer monitoring: Benefits and pitfalls facing management
-
Ariss, S. S. (2002) Computer Monitoring: Benefits and Pitfalls Facing Management Information & Management (39). 553-558.
-
(2002)
Information & Management
, vol.39
, pp. 553-558
-
-
Ariss, S.S.1
-
9
-
-
70349362909
-
SoapSY: Unifying security data from various heterogeneous distributed systems into a single database architecture
-
Avourdiadis, N., A. Blyth, and P. Thomas. (2005). SoapSY: Unifying Security Data from Various Heterogeneous Distributed Systems into a Single Database Architecture, Journal of Information System Security (1)2. 26-52.
-
(2005)
Journal of Information System Security
, vol.1
, Issue.2
, pp. 26-52
-
-
Avourdiadis, N.1
Blyth, A.2
Thomas, P.3
-
10
-
-
21044453774
-
Choice of transaction channels: The effects of product characteristics on market evolution
-
Ba, S. et al. (2005). Choice of Transaction Channels: The Effects of Product Characteristics on Market Evolution, Journal of Management Information Systems (21)4. 173-197.
-
(2005)
Journal of Management Information Systems
, vol.21
, Issue.4
, pp. 173-197
-
-
Ba, S.1
Al, E.2
-
11
-
-
84888300769
-
Rating certificate authorities: A market approach to the lemons problem
-
Backhouse, J., J. Baptista, and C. Hsu. (2006a). Rating Certificate Authorities: A Market Approach to the Lemons Problem, Journal of Information System Security (2)2. 3-14.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.2
, pp. 3-14
-
-
Backhouse, J.1
Baptista, J.2
Hsu, C.3
-
13
-
-
33846027847
-
Circuits of power in creating de jure standards: Shaping an international information systems security standard
-
Backhouse, J., C. W. Hsu, and L. Silva. (2006b). Circuits of Power in Creating De Jure Standards: Shaping an International Information Systems Security Standard, Management Information Systems Quarterly (30). 413-438.
-
(2006)
Management Information Systems Quarterly
, vol.30
, pp. 413-438
-
-
Backhouse, J.1
Hsu, C.W.2
Silva, L.3
-
15
-
-
0006372914
-
A study of senior information systems managers decision models in adopting new computer architecture
-
Paper 4
-
Bajaj, A. (2000). A Study of Senior Information Systems Managers Decision Models in Adopting New Computer Architecture, Journal of the Association for Information Systems (1) Paper 4. 1-55.
-
(2000)
Journal of the Association for Information Systems
, vol.1
, pp. 1-55
-
-
Bajaj, A.1
-
16
-
-
35148815257
-
Forgery quality and its implications for behavioral biometric security
-
Ballard, L., and D. Lopresti. (2007). Forgery Quality and Its Implications for Behavioral Biometric Security, IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics. (37)5. 1107-1118.
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics
, vol.37
, Issue.5
, pp. 1107-1118
-
-
Ballard, L.1
Lopresti, D.2
-
17
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. (1993). Information Systems Security Design Methods: Implications for Information Systems Development, ACM Computing Surveys (25). 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, pp. 375-414
-
-
Baskerville, R.1
-
18
-
-
48949090112
-
Information Warfare: A Comparative Framework for Business Information Security
-
Baskerville, R. (2005). Information Warfare: A Comparative Framework for Business Information Security, Journal of Information System Security (1)1. 23-50.
-
(2005)
Journal of Information System Security
, vol.1
, Issue.1
, pp. 23-50
-
-
Baskerville, R.1
-
19
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Bass, T. (2000). Intrusion Detection Systems and Multisensor Data Fusion, Communications of the ACM (43)2. 99-105.
-
(2000)
Communications of the ACM
, vol.43
, Issue.2
, pp. 99-105
-
-
Bass, T.1
-
21
-
-
84867973432
-
Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
-
Belanger, F., J. S Hiller, and W. J. Smith. (2004). Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes, The Journal of Strategic Information Systems (11)3-4.245-270.
-
(2004)
The Journal of Strategic Information Systems
, vol.11
, Issue.3-4
, pp. 245-270
-
-
Belanger, F.1
Hiller, J.S.2
Smith, W.J.3
-
22
-
-
1242331196
-
The identity crisis within the IS discipline: Defining and communicating the disciplines core properties
-
Benbasat, I. and R. W. Zmud. (2003). The Identity Crisis Within the IS Discipline: Defining and Communicating the Disciplines Core Properties, Management Information Systems Quarterly (27)2. 183-194.
-
(2003)
Management Information Systems Quarterly
, vol.27
, Issue.2
, pp. 183-194
-
-
Benbasat, I.1
Zmud, R.W.2
-
24
-
-
9744258059
-
Inducing sensitivity to deception in order to improve decision making performance: A field study
-
Biros, D., J. F. George, and R. W. Zmud. (2002). Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study, Management Information Systems Quarterly (26)2. 119-144.
-
(2002)
Management Information Systems Quarterly
, vol.26
, Issue.2
, pp. 119-144
-
-
Biros, D.1
George, J.F.2
Zmud, R.W.3
-
27
-
-
0023397555
-
Security and integrity controls for microcomputers: A summary analysis
-
Boockholdt J. L. (1987). Security and Integrity Controls for Microcomputers: A Summary Analysis, Information & Management (13). 33-41.
-
(1987)
Information & Management
, vol.13
, pp. 33-41
-
-
Boockholdt, J.L.1
-
28
-
-
0039935773
-
Implementing security and integrity in micro-mainframe networks
-
Boockholdt, J. L. (1989). Implementing Security and Integrity in Micro-Mainframe Networks, Management Information Systems Quarterly (13)2. 134-144.
-
(1989)
Management Information Systems Quarterly
, vol.13
, Issue.2
, pp. 134-144
-
-
Boockholdt, J.L.1
-
29
-
-
40749083825
-
Unveiling the Mask of Phishing: Threats, Preventive Measures, and Responsibilities
-
Bose, I. and A. C. M. Leung. (2007). Unveiling the Mask of Phishing: Threats, Preventive Measures, and Responsibilities, Communications of the Association for Information Systems (19). 1-39.
-
(2007)
Communications of the Association for Information Systems
, vol.19
, pp. 1-39
-
-
Bose, I.1
Leung, A.C.M.2
-
31
-
-
0019651520
-
Treating data privacy in distributed systems
-
Bussolati U. and G. Martella. (1981). Treating Data Privacy in Distributed Systems, Information & Management (4). 305-315.
-
(1981)
Information & Management
, vol.4
, pp. 305-315
-
-
Bussolati, U.1
Martella, G.2
-
32
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K. et al. (2003). The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market, Journal of Computer Security (11)3. 431-448.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Al, E.2
-
33
-
-
70349350220
-
Security consistency in information ecosystems: Structuring the risk environment on the internet
-
Carlsson, B. and A. Jacobsson. (2006). Security Consistency in Information Ecosystems: Structuring the Risk Environment on the Internet, Journal of Information System Security (2)1. 3-26.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.1
, pp. 3-26
-
-
Carlsson, B.1
Jacobsson, A.2
-
34
-
-
0019536066
-
Information as a corporate asset
-
Cattela, R. C. (1981).Information as a Corporate Asset, Information & Management (4). 29-37.
-
(1981)
Information & Management
, vol.4
, pp. 29-37
-
-
Cattela, R.C.1
-
35
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
Cavusoglu, H., M. Birendra, and S. Raghunathan. (2004a). The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers, International Journal of Electronic Commerce (9)1. 69-104.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Birendra, M.2
Raghunathan, S.3
-
36
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H., M. Birendra, and S. Raghunathan. (2005). The Value of Intrusion Detection Systems in Information Technology Security Architecture, Information Systems Research (16)1. 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Birendra, M.2
Raghunathan, S.3
-
38
-
-
84888302174
-
How secure is your password? an analysis of e-commerce passwords and their crack times
-
Cazier, J. and B. D. Medlin. (2006). How Secure Is Your Password? An Analysis of E-Commerce Passwords and Their Crack Times, Journal of Information System Security (2)3. 69-82.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.3
, pp. 69-82
-
-
Cazier, J.1
Medlin, B.D.2
-
39
-
-
39749171832
-
An economic model of privacy: A property rights approach to regulatory choices for online personalization
-
Chellappa, R. K. and S. Shivendu. (2007). An Economic Model of Privacy: A Property Rights Approach to Regulatory Choices for Online Personalization, Journal of Management Information Systems (24)3. 193-225.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.3
, pp. 193-225
-
-
Chellappa, R.K.1
Shivendu, S.2
-
40
-
-
70349346926
-
Management of information security: Challenges and research directions
-
Choobineh, J., G. Dhillon, M. R. Grimaila, and J. Rees. (2007). Management of Information Security: Challenges and Research Directions, Communications of the Association for Information Systems (20. 958-971.
-
(2007)
Communications of the Association for Information Systems
, vol.20
, pp. 958-971
-
-
Choobineh, J.1
Dhillon, G.2
Grimaila, M.R.3
Rees, J.4
-
42
-
-
70349354773
-
Improvements in database concurrency control with locking
-
Croker, A. (1987). Improvements in Database Concurrency Control with Locking, Journal of Management Information Systems (4)2. 74-92.
-
(1987)
Journal of Management Information Systems
, vol.4
, Issue.2
, pp. 74-92
-
-
Croker, A.1
-
43
-
-
23044529606
-
Exploring the supply-side of IT Outsourcing: Evaluating the emerging role of application service providers
-
Currie, W. and P. Seltsikas. (2001). Exploring the Supply-Side of IT Outsourcing: Evaluating the Emerging Role of Application Service Providers, European Journal of Information Systems (10). 123-134.
-
(2001)
European Journal of Information Systems
, vol.10
, pp. 123-134
-
-
Currie, W.1
Seltsikas, P.2
-
44
-
-
67349284545
-
Towards a best fit between organizational security countermeasures and information systems misuse behaviors
-
DArcy, J. and A. Hovav. (2007). Towards a Best Fit Between Organizational Security Countermeasures and Information Systems Misuse Behaviors, Journal of Information System Security (3)2. 3-30.
-
(2007)
Journal of Information System Security
, vol.3
, Issue.2
, pp. 3-30
-
-
Darcy, J.1
Hovav, A.2
-
46
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Sep
-
Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, Management Information Systems Quarterly, Sep.
-
(1989)
Management Information Systems Quarterly
-
-
Davis, F.D.1
-
47
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon, G. and J. Backhouse. (2001). Current Directions in IS Security Research: Towards Socio-Organizational Perspectives, Information Systems Journal (11)2. 127-153.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
48
-
-
84888308167
-
To opt on, or to opt out? this is the question: A case study
-
Dhillon, G. and S. Chapman. (2007). To Opt On, or to Opt Out? ThIs Is the Question: A Case Study, Journal of Information System Security (2) 2. 46-55.
-
(2007)
Journal of Information System Security
, vol.2
, Issue.2
, pp. 46-55
-
-
Dhillon, G.1
Chapman, S.2
-
49
-
-
33744830087
-
Value-focused assessment of information system security in organizations
-
Dhillon, G. and G. Torkzadeh. (2006). Value-Focused Assessment of Information System Security in Organizations, Information Systems Journal (16). 293-314.
-
(2006)
Information Systems Journal
, vol.16
, pp. 293-314
-
-
Dhillon, G.1
Torkzadeh, G.2
-
50
-
-
33645133251
-
An extended privacy calculus model for e-commerce transactions
-
Dinev, T. and P. Hart. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems Research (17)1. 61-80.
-
(2006)
Information Systems Research
, vol.17
, Issue.1
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
51
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protecting information technologies
-
Dinev, T. and Q. Hu. (2007). The Centrality of Awareness in the Formation of User Behavioral Intention toward Protecting Information Technologies, Journal of the Association for Information Systems (8) 7. 386-408.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
52
-
-
50849153670
-
Countdown services: Fire and its aftermath in a computer bureau
-
Duffy, N. M. (1980). Countdown Services: Fire and its Aftermath in a Computer Bureau, Information & Management (3). 103-111.
-
(1980)
Information & Management
, vol.3
, pp. 103-111
-
-
Duffy, N.M.1
-
53
-
-
0022052513
-
Using database machines in embedded computer systems
-
Egyhazy, C. (1985). Using Database Machines in Embedded Computer Systems, Information & Management (8). 197-203.
-
(1985)
Information & Management
, vol.8
, pp. 197-203
-
-
Egyhazy, C.1
-
54
-
-
70349346927
-
Influence of the web vendors interventions on privacy-related behaviors in e- commerce
-
Faja, S. and S. Trimi. (2003). Influence of the Web Vendors Interventions on Privacy-Related Behaviors in E- Commerce, Communications of the Association for Information Systems (17). 2-68.
-
(2003)
Communications of the Association for Information Systems
, vol.17
, pp. 2-68
-
-
Faja, S.1
Trimi, S.2
-
55
-
-
33748632891
-
Moderating effects of task type on wireless technology acceptance
-
Fang, X. et al. (2005). Moderating Effects of Task Type on Wireless Technology Acceptance, Journal of Management Information Systems (22)3. 123-157.
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.3
, pp. 123-157
-
-
Fang, X.1
Al, E.2
-
56
-
-
70349351913
-
Moving towards mobile third generation telecommunication standards: The good and bad of the anytime/anywhere solutions
-
Article 3
-
Fjermestad, J. et al. (2006). Moving Towards Mobile Third Generation Telecommunication Standards: The Good and Bad of the Anytime/Anywhere Solutions, Communications of the Association for Information Systems (17). Article 3. 2-33.
-
(2006)
Communications of the Association for Information Systems
, vol.17
, pp. 2-33
-
-
Fjermestad, J.1
Al, E.2
-
57
-
-
0040661360
-
Security-related behavior of pc users in organizations
-
Frank, J., B. Shamir, and W. Briggs. (1991). Security-Related Behavior of PC Users in Organizations, Information & Management (21). 127-135.
-
(1991)
Information & Management
, vol.21
, pp. 127-135
-
-
Frank, J.1
Shamir, B.2
Briggs, W.3
-
58
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-Or, E. and A. Ghose. (2005). The Economic Incentives for Sharing Security Information, Information Systems Research (16)2. 186-208.
-
(2005)
Information Systems Research
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
59
-
-
34247541615
-
Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information
-
Garfinkel, R., R. Gopal, and S. Thompson. (2007). Releasing Individually Identifiable Microdata with Privacy Protection against Stochastic Threat: An Application to Health Information, Information Systems Research (18)1. 23-41.
-
(2007)
Information Systems Research
, vol.18
, Issue.1
, pp. 23-41
-
-
Garfinkel, R.1
Gopal, R.2
Thompson, S.3
-
60
-
-
0005766289
-
Morality and computers: Attitudes and differences in moral judgments
-
Gattiker, U. and H. Kelley. (1999). Morality and Computers: Attitudes and Differences in Moral Judgments, Information Systems Research (10)3. 233-254.
-
(1999)
Information Systems Research
, vol.10
, Issue.3
, pp. 233-254
-
-
Gattiker, U.1
Kelley, H.2
-
61
-
-
0001823869
-
Security concerns of system users. A study of perceptions of the adequacy of security
-
Goodhue, D. L. and D. W. Straub. (1991). Security Concerns of System Users. A Study of Perceptions of the Adequacy of Security, Information & Management (20). 13-27.
-
(1991)
Information & Management
, vol.20
, pp. 13-27
-
-
Goodhue, D.L.1
Straub, D.W.2
-
62
-
-
84892397221
-
Botnets: The anatomy of a case
-
Goel, S., A. Baykal, and D. Pon. (2005). Botnets: The Anatomy of a Case, Journal of Information System Security (1)3. 45-60.
-
(2005)
Journal of Information System Security
, vol.1
, Issue.3
, pp. 45-60
-
-
Goel, S.1
Baykal, A.2
Pon, D.3
-
63
-
-
70349361004
-
Managing information security: Demystifying the audit process for security officers
-
Goel, S., D. Pon, and H. Weistroffer. (2006). Managing Information Security: Demystifying the Audit Process for Security Officers, Journal of Information System Security (2)2. 25-44.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.2
, pp. 25-44
-
-
Goel, S.1
Pon, D.2
Weistroffer, H.3
-
64
-
-
81055156821
-
Global sourcing of it sources and information security: Prudence before playing
-
article 50
-
Goodman, S. E., and R. Ramer. (2007). Global Sourcing of IT Sources and Information Security: Prudence before Playing, Communications of the Association for Information System (20) article 50. 812-823.
-
(2007)
Communications of the Association for Information System
, vol.20
, pp. 812-823
-
-
Goodman, S.E.1
Ramer, R.2
-
66
-
-
1242331022
-
Digital signature: Use and modification to achieve success in next generational e-business processes
-
Gupta, A., Y. A. Tung, and J. R. Marsden. (2004). Digital Signature: Use and Modification to Achieve Success in Next Generational E-business Processes, Information & Management (41). 561-575.
-
(2004)
Information & Management
, vol.41
, pp. 561-575
-
-
Gupta, A.1
Tung, Y.A.2
Marsden, J.R.3
-
67
-
-
84888294731
-
Building user authentication in an -organizational information system
-
Halonen, R. (2006). Building User Authentication in an -Organizational Information System, Journal of Information System Security (2)3. 49-68.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.3
, pp. 49-68
-
-
Halonen, R.1
-
68
-
-
0017552931
-
A forecast of the future of computation
-
Hammer, C. (1977). A Forecast of the Future of Computation, Information & Management (1). 3-10.
-
(1977)
Information & Management
, vol.1
, pp. 3-10
-
-
Hammer, C.1
-
69
-
-
0024056671
-
Is todays office receiving full value from its computers?
-
Hammer, C. (1988). Is Todays Office Receiving Full Value from its Computers? Information & Management (15). 15-23.
-
(1988)
Information & Management
, vol.15
, pp. 15-23
-
-
Hammer, C.1
-
70
-
-
33744529638
-
Evolutionary neural networks for anomaly detection based on the behavior of a program
-
Han, S., and S. Cho. (2006). Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program, IEEE Transactions on Systems, Man, and Cybernetics -Part B: Cybernetics. (36)3. 559-570.
-
(2006)
IEEE Transactions on Systems, Man, and Cybernetics -Part B: Cybernetics
, vol.36
, Issue.3
, pp. 559-570
-
-
Han, S.1
Cho, S.2
-
71
-
-
38349195111
-
Overcoming online information privacy concerns: An information-processing theory approach
-
Hann, I. et al. (2007). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach, Journal of Management Information Systems (24)2. 13-42.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.2
, pp. 13-42
-
-
Hann, I.1
Al, E.2
-
72
-
-
0000917858
-
The effect of code of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington, S. (1996). The Effect of Code of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions, Management Information Systems Quarterly (20)3. 257-278.
-
(1996)
Management Information Systems Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.1
-
73
-
-
0038442927
-
Payments and banking with mobile personal devices
-
Herzberg, A. (2003). Payments and Banking with Mobile Personal Devices, Communications of the ACM (46)5. 53-58.
-
(2003)
Communications of the ACM
, vol.46
, Issue.5
, pp. 53-58
-
-
Herzberg, A.1
-
74
-
-
33847712553
-
The value of privacy assurance: An exploratory field experiment
-
Hui, K., H. H. Teo, and S. T. Lee. (2007). The Value of Privacy Assurance: An Exploratory Field Experiment, Management Information Systems Quarterly (31)1. 19-33.
-
(2007)
Management Information Systems Quarterly
, vol.31
, Issue.1
, pp. 19-33
-
-
Hui, K.1
Teo, H.H.2
Lee, S.T.3
-
75
-
-
84876477338
-
-
IBM, current as of Nov
-
IBM. (2006). IBM Information Security Reference Model, web.esaugumas.lt/storage/conference2006/IBM-ISF%20presentation. %2016-17%20Nov%202006%20(RRT). pps (current as of Nov. 7, 2008).
-
(2006)
, vol.7
, pp. 2008
-
-
-
76
-
-
0000460271
-
Software piracy and software security measures in business schools
-
Im, J. H. and P. D. V. Epps. (1992). Software Piracy and Software Security Measures in Business Schools, Information & Management (23). 193-203.
-
(1992)
Information & Management
, vol.23
, pp. 193-203
-
-
Im, J.H.1
Epps, P.D.V.2
-
77
-
-
85026967297
-
Anything you search can be used against you in a court of law: Data mining in search archives
-
Article 29
-
Ives, B. and V. Krotov. (2006). Anything You Search Can Be Used against You in a Court of Law: Data Mining in Search Archives, Communications of the Association for Information Systems (18). Article 29. 1-28.
-
(2006)
Communications of the Association for Information Systems
, vol.18
, pp. 1-28
-
-
Ives, B.1
Krotov, V.2
-
78
-
-
33744779400
-
Biometrics: A tool for information security
-
Jain, A. K., A. Ross, and S. Pankanti. (2006). Biometrics: A Tool for Information Security, IEEE Transactions on Information Forensics and Security (1)2. 125-143.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
79
-
-
84876478293
-
-
Home Page , current as of Nov. 7, 2008
-
JISSEC. (2008). Home Page www.jissec.org (current as of Nov. 7, 2008).
-
(2008)
-
-
-
80
-
-
2342465798
-
Computer infectors. prevention, detection, and recovery
-
Joseph, G. W. and J. E. Blanton. (1992). Computer Infectors. Prevention, Detection, and Recovery, Information & Management (23). 205-216.
-
(1992)
Information & Management
, vol.23
, pp. 205-216
-
-
Joseph, G.W.1
Blanton, J.E.2
-
82
-
-
33748577182
-
The effects of trust-assuring arguments on consumer trust in internet stores: Application of toulmins model of argumentation
-
Kim, D. and I. Benbasat. (2006). The Effects of Trust-Assuring Arguments on Consumer Trust in Internet Stores: Application of Toulmins Model of Argumentation, Information Systems Research (17)3. 286-300.
-
(2006)
Information Systems Research
, vol.17
, Issue.3
, pp. 286-300
-
-
Kim, D.1
Benbasat, I.2
-
83
-
-
19744375669
-
A Comparison of online trust building factors between potential customers and repeat customers
-
Kim, H-W., Y. Xu and K. Koh. (2004b). A Comparison of Online Trust Building Factors between Potential Customers and Repeat Customers, Journal of the Association for Information Systems (5) 10. 392-420.
-
(2004)
Journal of the Association for Information Systems
, vol.5
, Issue.10
, pp. 392-420
-
-
Kim, H.-W.1
Xu, Y.2
Koh, K.3
-
84
-
-
0036737203
-
Businesses as buildings: Metrics for the architectural quality of internet businesses
-
Kim, J. et al. (2002). Businesses as Buildings: Metrics for the Architectural Quality of Internet Businesses, Information Systems Research (13)3. 239-254.
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 239-254
-
-
Kim, J.1
Al, E.2
-
85
-
-
33845709033
-
Defense mechanisms of biological cells: A framework for network security thinking
-
Knapp, K. et al. (2003). Defense Mechanisms of Biological Cells: A Framework for Network Security Thinking, Communications of the Association for Information Systems (12). 701-719.
-
(2003)
Communications of the Association for Information Systems
, vol.12
, pp. 701-719
-
-
Knapp, K.1
Al, E.2
-
86
-
-
0011784143
-
Data management in executive information systems
-
Koh, C. E. and H. J. Watson. (1998). Data Management in Executive Information Systems, Information & Management (33). 301-312.
-
(1998)
Information & Management
, vol.33
, pp. 301-312
-
-
Koh, C.E.1
Watson, H.J.2
-
87
-
-
84888291479
-
A conceptual model for integrative information systems security
-
Korzyk, A., J. W. Sutherland, and H. Weistroffer. (2006). A Conceptual Model for Integrative Information Systems Security, Journal of Information System Security (2)1. 44-59.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.1
, pp. 44-59
-
-
Korzyk, A.1
Sutherland, J.W.2
Weistroffer, H.3
-
88
-
-
1242263532
-
Why there arent more information security research studies
-
Kotulic, A. G. and J. G. Clark. (2004). Why There Arent More Information Security Research Studies, Information & Management (41). 597-607.
-
(2004)
Information & Management
, vol.41
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
89
-
-
1442328144
-
Business use of internet-based information systems: The case of korea
-
Lee, S. (2003). Business Use of Internet-Based Information Systems: The Case of Korea, European Journal of Information Systems (12). 168-181.
-
(2003)
European Journal of Information Systems
, vol.12
, pp. 168-181
-
-
Lee, S.1
-
90
-
-
1442303690
-
Development of a measure for the information technology infrastructure construct
-
Lewis, B. R. and T. A. Byrd. (2003). Development of a Measure for the Information Technology Infrastructure Construct, European Journal of Information Systems (12). 93-109.
-
(2003)
European Journal of Information Systems
, vol.12
, pp. 93-109
-
-
Lewis, B.R.1
Byrd, T.A.2
-
91
-
-
71549165527
-
An empirical assessment of the information resource management construct
-
Lewis B., C. A. Snyder, R. K. Rainer, Jr. (1995). An Empirical Assessment of the Information Resource Management Construct, Journal of Management Information Systems (12)1. 199-223.
-
(1995)
Journal of Management Information Systems
, vol.12
, Issue.1
, pp. 199-223
-
-
Lewis, B.1
Snyder, C.A.2
Rainer Jr, R.K.3
-
92
-
-
36549085110
-
An active learning based TCM-KNN algorithm for supervised network intrusion detection
-
DOI 10.1016/j.cose.2007.10.002, PII S0167404807001101
-
Li, Y. and L. Guo. (2007). An Active Learning Based TCM-KNN Algorithm for Supervised Network Intrusion Detection, Computers & Security (26) 7-8. 459-467. (Pubitemid 350191973)
-
(2007)
Computers and Security
, vol.26
, Issue.7-8
, pp. 459-467
-
-
Li, Y.1
Guo, L.2
-
93
-
-
33748519577
-
Privacy protection in data mining: A perturbation approach for categorical data
-
Li, X. and S. Sarkar. (2004). Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data, Information Systems Research (17)3. 254-270.
-
(2004)
Information Systems Research
, vol.17
, Issue.3
, pp. 254-270
-
-
Li, X.1
Sarkar, S.2
-
95
-
-
84974774507
-
Towards operational measures of computer security
-
Littlewood, B. et al. (1993). Towards Operational Measures of Computer Security, Journal of Computer Security 2(3). 211-229.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.3
, pp. 211-229
-
-
Littlewood, B.1
Al, E.2
-
96
-
-
0000133760
-
Threats to information systems: Todays reality, yesterdays understanding
-
Loch, K. D., H. C. Carr, and M. E. Warkentin. (1992). Threats to Information Systems: Todays Reality, Yesterdays Understanding, Management Information Systems Quarterly (16)2. 173-186.
-
(1992)
Management Information Systems Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.C.2
Warkentin, M.E.3
-
98
-
-
34250013494
-
E-commerce adoption in brunei darussalam: A quantitative analysis of factors influencing its adoption
-
Looi, H. C. (2005). E-Commerce Adoption in Brunei Darussalam: A Quantitative Analysis of Factors Influencing its Adoption, Communications of the Association for Information Systems (15). 61-81.
-
(2005)
Communications of the Association for Information Systems
, vol.15
, pp. 61-81
-
-
Looi, H.C.1
-
99
-
-
0022235191
-
Social security administrations progress in modernizing its computer operations
-
Lucas, H. C. (1985). Social Security Administrations Progress in Modernizing its Computer Operations, Information & Management (9). 283-290.
-
(1985)
Information & Management
, vol.9
, pp. 283-290
-
-
Lucas, H.C.1
-
101
-
-
13244298307
-
Internet users information privacy concerns (IUIPC): The construct, the scale, and a causal model
-
Malhotra N., S. S. Kim, and J. Agarwal. (2004). Internet Users Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research (15)4. 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.1
Kim, S.S.2
Agarwal, J.3
-
102
-
-
70349350219
-
Anchoring information security governance research: Sociological groundings and future directions
-
McFadzean, E., J. Ezingeard, and D. Birchall. (2006). Anchoring Information Security Governance Research: Sociological Groundings and Future Directions, Journal of Information System Security (2)3. 3-47.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.3
, pp. 3-47
-
-
McFadzean, E.1
Ezingeard, J.2
Birchall, D.3
-
103
-
-
33749316921
-
Adding clicks to bricks: A case study of e-commerce adoption by a catalan small retailer
-
Molla, A., R. Heeks, and I. Balcells. (2006). Adding Clicks to Bricks: A Case Study of E-Commerce Adoption by a Catalan Small Retailer, European Journal of Information Systems (15). 424-438.
-
(2006)
European Journal of Information Systems
, vol.15
, pp. 424-438
-
-
Molla, A.1
Heeks, R.2
Balcells, I.3
-
104
-
-
84888308191
-
Towards a global framework for corporate and enterprise digital policy management
-
Morin, J-H. and M. Pawlak. (2006). Towards a Global Framework for Corporate and Enterprise Digital Policy Management, Journal of Information System Security (2)2. 15-24.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.2
, pp. 15-24
-
-
Morin, J.-H.1
Pawlak, M.2
-
105
-
-
64949173653
-
Security issues and capabilities of mobile brokerage services and infrastructures
-
Muntermann, J. and R. Heiko. (2006). Security Issues and Capabilities of Mobile Brokerage Services and Infrastructures, Journal of Information System Security (2)1. 27-43.
-
(2006)
Journal of Information System Security
, vol.2
, Issue.1
, pp. 27-43
-
-
Muntermann, J.1
Heiko, R.2
-
106
-
-
0018519452
-
Cryptographic transformation of data relationships
-
Murray, T. J. (1979). Cryptographic Transformation of Data Relationships, Information & Management (2). 95-98.
-
(1979)
Information & Management
, vol.2
, pp. 95-98
-
-
Murray, T.J.1
-
108
-
-
84888302909
-
The effect of spam and privacy concerns on e-mail users behavior
-
Park, I. et al. (2007). The Effect of Spam and Privacy Concerns on E-Mail Users Behavior, Journal of Information System Security (3)1. 39-62.
-
(2007)
Journal of Information System Security
, vol.3
, Issue.1
, pp. 39-62
-
-
Park, I.1
Al, E.2
-
109
-
-
0036469651
-
Wanted: More network-security graduates and research
-
Paulson, L. D. (2002). Wanted: More Network-Security Graduates and Research, Computer (35)2. 22-24.
-
(2002)
Computer
, vol.35
, Issue.2
, pp. 22-24
-
-
Paulson, L.D.1
-
110
-
-
33847764616
-
Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
-
Pavlou, P. A., H. Liang, and Y. Xue. (2007). Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective, Management Information Systems Quarterly (31)1. 105-136.
-
(2007)
Management Information Systems Quarterly
, vol.31
, Issue.1
, pp. 105-136
-
-
Pavlou, P.A.1
Liang, H.2
Xue, Y.3
-
111
-
-
0036116939
-
On the security of open source software
-
Payne, C. (2002). On the Security of Open Source Software, Information Systems Journal (12). 61-78.
-
(2002)
Information Systems Journal
, vol.12
, pp. 61-78
-
-
Payne, C.1
-
112
-
-
2342631845
-
Regulation and information security: Can Y2K lessons help us?
-
Payne, J. E. (2004) Regulation and Information Security: Can Y2K Lessons Help Us?, IEEE Security and Privacy Magazine (2)2. 58-61.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.2
, pp. 58-61
-
-
Payne, J.E.1
-
113
-
-
36348954757
-
The Ephemerizer: Making data disappear
-
Perlman, R. (2005). The Ephemerizer: Making Data Disappear, Journal of Information System Security (1)1. 51-68.
-
(2005)
Journal of Information System Security
, vol.1
, Issue.1
, pp. 51-68
-
-
Perlman, R.1
-
114
-
-
39749104751
-
A design science research methodology for information systems research
-
Peffers, K. et al. (2007). A Design Science Research Methodology for Information Systems Research, Journal of Management Information Systems (24)3. 45-77.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.3
, pp. 45-77
-
-
Peffers, K.1
Al, E.2
-
115
-
-
4544230176
-
Identifying and evaluating the universe of outlets for information systems research: Ranking the journals
-
Peffers, K. and Y. Tang. (2003). Identifying and Evaluating the Universe of Outlets for Information Systems Research: Ranking the Journals, The Journal of Information Technology Theory and Application (5)1. 63-84.
-
(2003)
The Journal of Information Technology Theory and Application
, vol.5
, Issue.1
, pp. 63-84
-
-
Peffers, K.1
Tang, Y.2
-
117
-
-
0041983746
-
Management tradeoffs in anti-virus strategies
-
Post, G. and A. Kagan. (2000). Management Tradeoffs in Anti-Virus Strategies, Information & Management (37). 13-24.
-
(2000)
Information & Management
, vol.37
, pp. 13-24
-
-
Post, G.1
Kagan, A.2
-
118
-
-
84888294258
-
Methodology to assess the impact of investments in security tools and products
-
Ramachandran, S. and G. W. White. (2005). Methodology to Assess the Impact of Investments in Security Tools and Products, Journal of Information System Security (1)2. 3-25.
-
(2005)
Journal of Information System Security
, vol.1
, Issue.2
, pp. 3-25
-
-
Ramachandran, S.1
White, G.W.2
-
119
-
-
0036567901
-
Key dimension of business-to-consumer web sites
-
Rangnathan, C. and S. Ganapathy. (2002). Key Dimension of Business-to-Consumer Web Sites, Information & Management (39). 457-465.
-
(2002)
Information & Management
, vol.39
, pp. 457-465
-
-
Rangnathan, C.1
Ganapathy, S.2
-
120
-
-
1142292685
-
Trust in web-based electronic commerce security
-
Ratnasingham, P. (1998). Trust in Web-Based Electronic Commerce Security, Information Management and Computer Security (6)4. 162-166. (Pubitemid 128623422)
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.4
, pp. 162-166
-
-
Ratnasingham, P.1
-
121
-
-
84888308485
-
A framework to facilitate forensic investigation of falsely advertised bgp routes
-
Ray, I., E. Kim, and D. Massey. (2007). A Framework to Facilitate Forensic Investigation of Falsely Advertised BGP Routes, Journal of Information System Security (3)2. 32-65.
-
(2007)
Journal of Information System Security
, vol.3
, Issue.2
, pp. 32-65
-
-
Ray, I.1
Kim, E.2
Massey, D.3
-
122
-
-
84888296171
-
Information technology and systems II: Server administration networks
-
Reed, A. (2005). Information Technology and Systems II: Server Administration Networks, Communications of the Association for Information Systems (15). 642-660.
-
(2005)
Communications of the Association for Information Systems
, vol.15
, pp. 642-660
-
-
Reed, A.1
-
123
-
-
33846817469
-
Biometric attack vectors and defences
-
Roberts, C. (2007). Biometric Attack Vectors and Defences, Computers & Security (26) 1. 14-25.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 14-25
-
-
Roberts, C.1
-
124
-
-
36549062966
-
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
-
Rodwell, P. M., S. M. Furnell, and P. L. Reynolds. (2007). A Non-Intrusive Biometric Authentication Mechanism Utilising Physiological Characteristics of the Human Head, Computers & Security (26) 7-8. 468-478.
-
(2007)
Computers & Security
, vol.26
, Issue.7-8
, pp. 468-478
-
-
Rodwell, P.M.1
Furnell, S.M.2
Reynolds, P.L.3
-
126
-
-
0019534443
-
Confidentiality of information
-
Roos, H. (1981). Confidentiality of Information, Information & Management (4). 17-21.
-
(1981)
Information & Management
, vol.4
, pp. 17-21
-
-
Roos, H.1
-
127
-
-
0031095932
-
Evaluating security threats in mainframe and client/server environments
-
Ryan, S. D. and B. Bordoloi. (1997) Evaluating Security Threats in Mainframe and Client/Server Environments, Information & Management (32). 137-146.
-
(1997)
Information & Management
, vol.32
, pp. 137-146
-
-
Ryan, S.D.1
Bordoloi, B.2
-
128
-
-
0036909696
-
The security of confidential numerical data in databases
-
Sarathy R. and K. Muralidhar. (2002). The Security of Confidential Numerical Data in Databases, Information Systems Research (13)4. 389-403.
-
(2002)
Information Systems Research
, vol.13
, Issue.4
, pp. 389-403
-
-
Sarathy, R.1
Muralidhar, K.2
-
129
-
-
84888305837
-
Do anti-spam measures effectively cover the e-mail communication network? A formal approach
-
Schryen, G. (2007). Do Anti-Spam Measures Effectively Cover the E-Mail Communication Network? A Formal Approach, Journal of Information System Security (3)2. 66-90.
-
(2007)
Journal of Information System Security
, vol.3
, Issue.2
, pp. 66-90
-
-
Schryen, G.1
-
130
-
-
84876461746
-
-
Letter to AIS, Current as of Nov, 7 2008
-
Senior Scholars. (2006) Letter to AIS http://home.aisnet.org/ associations/7499/files/Senior%20Scholars%20Letter.pdf (Current as of Nov. 7, 2008).
-
(2006)
-
-
-
132
-
-
84888288567
-
WIDS: A wireless intrusion detection system for detecting man-in-the-middle attacks
-
Shanley, R. and G. Premkumar. (2005). WIDS: A Wireless Intrusion Detection System for Detecting Man-in-the-Middle Attacks, Journal of Information System Security (1)3. 18-44.
-
(2005)
Journal of Information System Security
, vol.1
, Issue.3
, pp. 18-44
-
-
Shanley, R.1
Premkumar, G.2
-
133
-
-
12244294780
-
A transactional-cycle approach to evidence management for dispute resolution
-
Shao, M., J. J. Hwang, and S. Wu. (2005). A Transactional-Cycle Approach to Evidence Management for Dispute Resolution, Information & Management (42). 607-618.
-
(2005)
Information & Management
, vol.42
, pp. 607-618
-
-
Shao, M.1
Hwang, J.J.2
Wu, S.3
-
134
-
-
0038682965
-
An ASEAN way to security cooperation in southeast asia?
-
Sharpe, S. (2003). An ASEAN Way to Security Cooperation in Southeast Asia? The Pacific Review (16)2 231-250.
-
(2003)
The Pacific Review
, vol.16
, Issue.2
, pp. 231-250
-
-
Sharpe, S.1
-
135
-
-
34147214790
-
Wireless evolution 2006: Cellular tv, wearable computing, and rfid
-
Article 24
-
Shim, J. P., U. Varshney, and S. Dekleva. (2006). Wireless Evolution 2006: Cellular TV, Wearable Computing, and RFID, Communications of the Association for Information Systems (18). Article 24. 1-37.
-
(2006)
Communications of the Association for Information Systems
, vol.18
, pp. 1-37
-
-
Shim, J.P.1
Varshney, U.2
Dekleva, S.3
-
136
-
-
70349350217
-
Cell phone tv, wireless networks in disaster management, ubiquitous computing, and adoption of future wireless applications
-
Article 29
-
Shim, J. P. et al. (2007). Cell Phone TV, Wireless Networks in Disaster Management, Ubiquitous Computing, and Adoption of Future Wireless Applications, Communications of the Association for Information Systems (20) Article 29. 1-27.
-
(2007)
Communications of the Association for Information Systems
, vol.20
, pp. 1-27
-
-
Shim, J.P.1
Al, E.2
-
137
-
-
30744438863
-
An analysis of the traditional is security approaches: Implications for research and practice
-
Siponen, M. T. (2005). An Analysis of the Traditional IS Security Approaches: Implications for Research and Practice, European Journal of Information Systems (14). 303-315.
-
(2005)
European Journal of Information Systems
, vol.14
, pp. 303-315
-
-
Siponen, M.T.1
-
140
-
-
84876474983
-
-
current Nov
-
Slevin, C. (2007). After Cyber Attack, Rockies Are Set to Resume Online Ticket Sales, http://www.redorbit.com/news/technology/1114025/rockies-to-try- online-ticket-sales-again/index.html (current Nov. 7, 2008).
-
(2007)
After Cyber Attack
, vol.7
, pp. 2008
-
-
Slevin, C.1
-
141
-
-
2342568408
-
An exploratory study to identify the critical factors affecting the decision to establish internet-based interorganizational information systems
-
Soliman, K. S. and B. D. Janz. (2004). An Exploratory Study to Identify the Critical Factors Affecting the Decision to Establish Internet-Based Interorganizational Information Systems, Information & Management (41). 697-706.
-
(2004)
Information & Management
, vol.41
, pp. 697-706
-
-
Soliman, K.S.1
Janz, B.D.2
-
142
-
-
38149100813
-
RFID: A systematic analysis of privacy threat and a seven-point plan to address them
-
Spiekermann, S. and H. Ziekow. (2005). RFID: A Systematic Analysis of Privacy Threat and A Seven-point Plan to Address Them, Journal of Information System Security (1)3. 2-18.
-
(2005)
Journal of Information System Security
, vol.1
, Issue.3
, pp. 2-18
-
-
Spiekermann, S.1
Ziekow, H.2
-
143
-
-
84888295876
-
Challenges in Managing Information Security in Academic Institutions: Case of MDI India
-
Sridhar, V. and D. K. Ahuja. (2007). Challenges in Managing Information Security in Academic Institutions: Case of MDI India, Journal of Information System Security (3) 3. 51-78.
-
(2007)
Journal of Information System Security
, vol.3
, Issue.3
, pp. 51-78
-
-
Sridhar, V.1
Ahuja, D.K.2
-
145
-
-
50749134916
-
An alternative to emulation for micro-mainframe data exchange
-
Stephens, C. S. and C. A. Snyder. (1991). An Alternative to Emulation for Micro-Mainframe Data Exchange, Information & Management (20). 105-116.
-
(1991)
Information & Management
, vol.20
, pp. 105-116
-
-
Stephens, C.S.1
Snyder, C.A.2
-
146
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. W. (1990a). Effective IS Security: An Empirical Study, Information Systems Research (1)3. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
147
-
-
53349102510
-
Key information liability issues facing managers: Software piracy, proprietary databases, and individuals rights to privacy
-
Straub, D. W. (1990b). Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individuals Rights to Privacy, Management Information Systems Quarterly (14)2. 143-156.
-
(1990)
Management Information Systems Quarterly
, vol.14
, Issue.2
, pp. 143-156
-
-
Straub, D.W.1
-
148
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub, D. W. and W. D. Nance. (1990). Discovering and Disciplining Computer Abuse in Organizations: A Field Study, Management Information Systems Quarterly (14)1. 45-60.
-
(1990)
Management Information Systems Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
149
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W. and R. J. Welke. (1998). Coping with Systems Risk: Security Planning Models for Management Decision Making, Management Information Systems Quarterly (22)4. 441-469.
-
(1998)
Management Information Systems Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
150
-
-
50849154405
-
An assessment of alternative application development approaches
-
Sumner, M. R. (1986). An Assessment of Alternative Application Development Approaches, Information & Management (10). 197-206.
-
(1986)
Information & Management
, vol.10
, pp. 197-206
-
-
Sumner, M.R.1
-
151
-
-
33748594201
-
An information systems security risk assessment model under the dempster-shafer theory of belief functions
-
Sun L., R. P. Srivastava, and T. J. Mock. (2006). An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions, Journal of Management Information Systems (22)4. 109-142.
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.1
Srivastava, R.P.2
Mock, T.J.3
-
152
-
-
4243132179
-
Measuring user attitudes in MIS research: A review
-
Swanson, E. B. (1982). Measuring User Attitudes in MIS Research: A Review, OMEGA, (10)-157-165.
-
(1982)
OMEGA
, vol.10
, pp. 157-165
-
-
Swanson, E.B.1
-
153
-
-
0024606942
-
Information systems for security trading
-
Tam, K. Y. (1989). Information Systems for Security Trading, Information & Management (16). 105-114.
-
(1989)
Information & Management
, vol.16
, pp. 105-114
-
-
Tam, K.Y.1
-
155
-
-
33745839646
-
Multilevel security for information retrieval systems
-
Thuraisingham, B. (1993). Multilevel Security for Information Retrieval Systems, Information & Management (24). 93-103.
-
(1993)
Information & Management
, vol.24
, pp. 93-103
-
-
Thuraisingham, B.1
-
156
-
-
0029207994
-
Multilevel security for information retrieval systems II
-
Thuraisingham, B. (1995). Multilevel Security for Information Retrieval Systems II, Information & Management (28). 49-61.
-
(1995)
Information & Management
, vol.28
, pp. 49-61
-
-
Thuraisingham, B.1
-
157
-
-
0004096846
-
-
Cambridge University Press: Cambridge, UK
-
Toulmin, S. E. (1958). The Use of Argument. Cambridge University Press: Cambridge, UK.
-
(1958)
The Use of Argument
-
-
Toulmin, S.E.1
-
158
-
-
70349362902
-
On security metaphors and how they shape the emerging practice of secure information systems development
-
Tryfonas, T. (2007). On Security Metaphors and How They Shape the Emerging Practice of Secure Information Systems Development, Journal of Information System Security (3)3. 21-50.
-
(2007)
Journal of Information System Security
, vol.3
, Issue.3
, pp. 21-50
-
-
Tryfonas, T.1
-
159
-
-
0018024415
-
Privacy protection in record-keeping systems
-
Turn, R. (1978). Privacy Protection in Record-Keeping Systems, Information & Management (1). 187-197.
-
(1978)
Information & Management
, vol.1
, pp. 187-197
-
-
Turn, R.1
-
160
-
-
15744381377
-
Adware/spyware: An update regarding pending litigation and legislation
-
Urbach, R. R. and G. A. Kibel. (2004). Adware/Spyware: An Update Regarding Pending Litigation and Legislation, Intellectual Property & Technology Law Journal, (16)7. 12-16.
-
(2004)
Intellectual Property & Technology Law Journal
, vol.16
, Issue.7
, pp. 12-16
-
-
Urbach, R.R.1
Kibel, G.A.2
-
162
-
-
2442601796
-
Wireless I: Mobile and wireless information systems: Applications, networks, and research problems
-
Varshney, U. (2003). Wireless I: Mobile and Wireless Information Systems: Applications, Networks, and Research Problems, Communications of the Association for Information Systems (12). 155-166.
-
(2003)
Communications of the Association for Information Systems
, vol.12
, pp. 155-166
-
-
Varshney, U.1
-
163
-
-
33747216149
-
Security policies and the software developer
-
Verdon, D. (2006). Security Policies and the Software Developer, IEEE Security and Privacy Magazine (4)4. 42-49.
-
(2006)
IEEE Security and Privacy Magazine
, vol.4
, Issue.4
, pp. 42-49
-
-
Verdon, D.1
-
164
-
-
33845916515
-
Perceived risk and trust associated with purchasing at electronic marketplaces
-
Verhagen, T., S. Meents, and Y. Tan. (2006), Perceived Risk and Trust Associated with Purchasing at Electronic Marketplaces, European Journal of Information Systems (15). 542-555.
-
(2006)
European Journal of Information Systems
, vol.15
, pp. 542-555
-
-
Verhagen, T.1
Meents, S.2
Tan, Y.3
-
165
-
-
33747053670
-
Information security: The fourth wave
-
von Solms, B. (2006). Information Security: The Fourth Wave, Computers & Security (25) 3. 165-168.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 165-168
-
-
Solms, B.1
-
166
-
-
0141917862
-
A framework for information security evaluation
-
von Solms, R. et al. (2005). A Framework for Information Security Evaluation, Information & Management (26). 143-153.
-
(2005)
Information & Management
, vol.26
, pp. 143-153
-
-
Von Solms, R.1
Al, E.2
-
167
-
-
0041150947
-
Information systems management issues in the republic of china for the 1990s
-
Wang, P. (1994). Information Systems Management Issues in the Republic of China for the 1990s, Information & Management (26). 341-352.
-
(1994)
Information & Management
, vol.26
, pp. 341-352
-
-
Wang, P.1
-
169
-
-
33749351964
-
Opportunities for computer crime: Considering systems risk from a criminological perspective
-
Willison, R. and J. Backhouse. (2006). Opportunities for Computer Crime: Considering Systems Risk from a Criminological Perspective, European Journal of Information Systems (15). 403-414.
-
(2006)
European Journal of Information Systems
, vol.15
, pp. 403-414
-
-
Willison, R.1
Backhouse, J.2
-
170
-
-
84876460680
-
-
Wise Geek, Current as of Nov.7
-
Wise Geek, What Is Information Security? www.wisegeek.com/what-is- information-security.htm (Current as of Nov.7, 2008).
-
(2008)
What Is Information Security?
-
-
-
171
-
-
0033893174
-
Secure group communications using key graphs
-
Wong, C. K., M. Gouda, and S. S. Lam. (2000). Secure Group Communications Using Key Graphs, IEEE/ACM Transactions on Networking (TON) (8)1. 16-30.
-
(2000)
IEEE/ACM Transactions on Networking (TON)
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
173
-
-
36549082411
-
Mining tcp/ip packets to detect stepping-stone intrusion
-
Yang, J. and S. S. Huang. (2007). Mining TCP/IP Packets to Detect Stepping-Stone Intrusion, Computers & Security (26) 7-8. 479-484.
-
(2007)
Computers & Security
, vol.26
, Issue.7-8
, pp. 479-484
-
-
Yang, J.1
Huang, S.S.2
-
174
-
-
84888305306
-
An evaluation of size-based traffic feature for intrusion detection
-
Ye, M., G. Premkumar, and D. Zhu. (2007). An Evaluation of Size-Based Traffic Feature for Intrusion Detection, Journal of Information System Security (3)1. 19-38.
-
(2007)
Journal of Information System Security
, vol.3
, Issue.1
, pp. 19-38
-
-
Ye, M.1
Premkumar, G.2
Zhu, D.3
-
175
-
-
34447298085
-
Threats and countermeasures for information system security: A cross-industry study
-
Yeh, Q. and A. J. Chang. (2007). Threats and Countermeasures for Information System Security: A Cross-Industry Study, Information & Management (44). 480-491.
-
(2007)
Information & Management
, vol.44
, pp. 480-491
-
-
Yeh, Q.1
Chang, A.J.2
-
176
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive responses
-
Yue W. and M. Cakanyildirim. (2007). Intrusion Prevention in Information Systems: Reactive and Proactive Responses, Journal of Management Information Systems (24)1. 329-353.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.1
Cakanyildirim, M.2
|