-
4
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard D., and Arief B. Computer security impaired by legitimate users. Computers & Security 23 (2004) 253-264
-
(2004)
Computers & Security
, vol.23
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
5
-
-
0346788758
-
Paradox lost? Firm-level evidence on the returns to information systems
-
Brynjolfsson E., and Hitt L. Paradox lost? Firm-level evidence on the returns to information systems. Management Science 42 4 (1996) 541-558
-
(1996)
Management Science
, vol.42
, Issue.4
, pp. 541-558
-
-
Brynjolfsson, E.1
Hitt, L.2
-
8
-
-
0036398120
-
Policy enforcement in the workplace
-
David J. Policy enforcement in the workplace. Computers and Security 21 6 (2002) 506-513
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 506-513
-
-
David, J.1
-
9
-
-
12444282670
-
Securing knowledge in organizations: Lessons from the defence and intelligence sectors
-
Desouza K.C., and Vanapalli G.K. Securing knowledge in organizations: Lessons from the defence and intelligence sectors. International Journal of Information Management 25 (2005) 85-98
-
(2005)
International Journal of Information Management
, vol.25
, pp. 85-98
-
-
Desouza, K.C.1
Vanapalli, G.K.2
-
11
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon G., and Backhouse J. Information system security management in the new millennium. Communications of the ACM 43 7 (2000) 125-128
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
12
-
-
70449576952
-
Realizing benefits of an information security program
-
Dhillon G. Realizing benefits of an information security program. Business Process Management Journal 10 3 (2004) 21-22
-
(2004)
Business Process Management Journal
, vol.10
, Issue.3
, pp. 21-22
-
-
Dhillon, G.1
-
13
-
-
33744830087
-
Value-focused assessment of information system security in organizations
-
Dhillon G., and Torkzadeh G. Value-focused assessment of information system security in organizations. Information Systems Journal 16 3 (2006) 293-314
-
(2006)
Information Systems Journal
, vol.16
, Issue.3
, pp. 293-314
-
-
Dhillon, G.1
Torkzadeh, G.2
-
14
-
-
0042692977
-
The impact of inadequacies in the treatment of organizational issues on information systems development projects
-
Doherty N.F., King M., and Al-Mushayt O. The impact of inadequacies in the treatment of organizational issues on information systems development projects. Information and Management 41 1 (2003) 49-62
-
(2003)
Information and Management
, vol.41
, Issue.1
, pp. 49-62
-
-
Doherty, N.F.1
King, M.2
Al-Mushayt, O.3
-
15
-
-
25144436981
-
Do information security policies reduce the incidence of security breaches: An exploratory analysis
-
Doherty N.F., and Fulford H. Do information security policies reduce the incidence of security breaches: An exploratory analysis. Information Resources Management Journal 18 4 (2005) 21-38
-
(2005)
Information Resources Management Journal
, vol.18
, Issue.4
, pp. 21-38
-
-
Doherty, N.F.1
Fulford, H.2
-
17
-
-
0001903311
-
The coming of the new organization
-
Drucker P.F. The coming of the new organization. Harvard Business Review 66 1 (1988) 45-53
-
(1988)
Harvard Business Review
, vol.66
, Issue.1
, pp. 45-53
-
-
Drucker, P.F.1
-
18
-
-
0042363355
-
The application of information security policies in large UK-based organizations
-
Fulford H., and Doherty N.F. The application of information security policies in large UK-based organizations. Information Management and Computer Security 11 3 (2003) 106-114
-
(2003)
Information Management and Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
22
-
-
0041482688
-
Corporate system security: Towards an integrated management approach
-
Higgins H.N. Corporate system security: Towards an integrated management approach. Information Management and Computer Security 7 5 (1999) 217-222
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.5
, pp. 217-222
-
-
Higgins, H.N.1
-
23
-
-
0036299585
-
Security surveys spring crop
-
Hinde S. Security surveys spring crop. Computers and Security 21 4 (2002) 310-321
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 310-321
-
-
Hinde, S.1
-
24
-
-
0036330173
-
Information security policy-What do international security standards say
-
Hone K., and Eloff J.H.P. Information security policy-What do international security standards say. Computers & Security 21 5 (2002) 402-409
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Hone, K.1
Eloff, J.H.P.2
-
25
-
-
0036613095
-
What makes an effective information security policy
-
Hone K., and Eloff J.H.P. What makes an effective information security policy. Network Security 20 6 (2002) 14-16
-
(2002)
Network Security
, vol.20
, Issue.6
, pp. 14-16
-
-
Hone, K.1
Eloff, J.H.P.2
-
26
-
-
33745838617
-
An empirical study of information security policy on information security elevation on Taiwan
-
Hong K., Chi Y., Chao L., and Tang J. An empirical study of information security policy on information security elevation on Taiwan. Information Management and Computer Security 14 2 (2006) 104-115
-
(2006)
Information Management and Computer Security
, vol.14
, Issue.2
, pp. 104-115
-
-
Hong, K.1
Chi, Y.2
Chao, L.3
Tang, J.4
-
28
-
-
0038825669
-
Knowledge management and sustainable competitive advantages: The impact of dynamic contextual training
-
Johannessen J.-A., and Olsen B. Knowledge management and sustainable competitive advantages: The impact of dynamic contextual training. International Journal of Information Management 23 (2003) 277-289
-
(2003)
International Journal of Information Management
, vol.23
, pp. 277-289
-
-
Johannessen, J.-A.1
Olsen, B.2
-
29
-
-
18844431067
-
Information security policies: A contextual perspective
-
Karyda M., Kiountouzis E., and Kokolakis S. Information security policies: A contextual perspective. Computers & Security 24 3 (2005) 246-260
-
(2005)
Computers & Security
, vol.24
, Issue.3
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
30
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic A.J., and Clark J.G. Why there aren't more information security research studies. Information and Management 41 5 (2004) 597-607
-
(2004)
Information and Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.J.1
Clark, J.G.2
-
31
-
-
0029545652
-
A new model for information security policies
-
Lindup K.R. A new model for information security policies. Computers & Security 14 (1995) 691-695
-
(1995)
Computers & Security
, vol.14
, pp. 691-695
-
-
Lindup, K.R.1
-
32
-
-
33846020003
-
An analysis of copyright policies for distance learning materials at major research universities
-
Loggie K.A., Barron A.E., Gulitz E., Hohlfield T.N., Kromrey J.D., and Venable M. An analysis of copyright policies for distance learning materials at major research universities. Journal of Interactive Online Learning 5 3 (2006) 224-231
-
(2006)
Journal of Interactive Online Learning
, vol.5
, Issue.3
, pp. 224-231
-
-
Loggie, K.A.1
Barron, A.E.2
Gulitz, E.3
Hohlfield, T.N.4
Kromrey, J.D.5
Venable, M.6
-
33
-
-
3242801473
-
Techno-change management: Using IT to drive organizational change
-
Markus M.L. Techno-change management: Using IT to drive organizational change. Journal of Information Technology 19 1 (2004) 4-20
-
(2004)
Journal of Information Technology
, vol.19
, Issue.1
, pp. 4-20
-
-
Markus, M.L.1
-
34
-
-
18844425009
-
Fostering entrepreneurship: Changing role of government and higher education governance in Hong Kong
-
Mok K.H. Fostering entrepreneurship: Changing role of government and higher education governance in Hong Kong. Research Policy 34 (2005) 537-554
-
(2005)
Research Policy
, vol.34
, pp. 537-554
-
-
Mok, K.H.1
-
35
-
-
0002495427
-
Policies, procedures and standards: An approach for implementation
-
Moule B., and Giavara L. Policies, procedures and standards: An approach for implementation. Information Management and Computer Security 3 3 (1995) 7-16
-
(1995)
Information Management and Computer Security
, vol.3
, Issue.3
, pp. 7-16
-
-
Moule, B.1
Giavara, L.2
-
36
-
-
19944365607
-
In the eye of the beholder: A visualization-based approach to information security
-
de Paula R., Ding X., Dourish P., Nies K., Pillet B., Redmiles D.F., et al. In the eye of the beholder: A visualization-based approach to information security. International Journal of Human-Computer Studies 63 (2005) 5-24
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 5-24
-
-
de Paula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.F.6
-
38
-
-
0000842614
-
How information gives you competitive advantage
-
Porter M.E., and Millar V. How information gives you competitive advantage. Harvard Business Review 63 4 (1985) 149-160
-
(1985)
Harvard Business Review
, vol.63
, Issue.4
, pp. 149-160
-
-
Porter, M.E.1
Millar, V.2
-
40
-
-
33846624345
-
Using ISO 17799; 2005 Information Security Management: A STOPE view with six sigma approach
-
Saleh M.S., Alrabiah A., and Saad H.B. Using ISO 17799; 2005 Information Security Management: A STOPE view with six sigma approach. International Journal of Network Management 17 1 (2007) 85-97
-
(2007)
International Journal of Network Management
, vol.17
, Issue.1
, pp. 85-97
-
-
Saleh, M.S.1
Alrabiah, A.2
Saad, H.B.3
-
41
-
-
33947581075
-
Discovering new business models for knowledge-intensive organizations
-
Sheehan N.T., and Stabell C.B. Discovering new business models for knowledge-intensive organizations. Strategy & Leadership 25 2 (2007) 22-29
-
(2007)
Strategy & Leadership
, vol.25
, Issue.2
, pp. 22-29
-
-
Sheehan, N.T.1
Stabell, C.B.2
-
43
-
-
30744438863
-
An analysis of traditional IS security approaches: implications for research and practice
-
Siponen M.T. An analysis of traditional IS security approaches: implications for research and practice. European Journal of Information Systems 14 3 (2005) 303-315
-
(2005)
European Journal of Information Systems
, vol.14
, Issue.3
, pp. 303-315
-
-
Siponen, M.T.1
-
44
-
-
63849112605
-
A study of the impact of information technology on firm performance: A flexible production function approach
-
10.1111/j.1365-2575.2007.00274.x
-
Sircar S., and Choi J. A study of the impact of information technology on firm performance: A flexible production function approach. Information Systems Journal (2007) 10.1111/j.1365-2575.2007.00274.x
-
(2007)
Information Systems Journal
-
-
Sircar, S.1
Choi, J.2
-
45
-
-
3042812983
-
The ten deadly sins of information security management
-
von Solms B., and von Solms R. The ten deadly sins of information security management. Computers & Security 23 (2004) 371-376
-
(2004)
Computers & Security
, vol.23
, pp. 371-376
-
-
von Solms, B.1
von Solms, R.2
-
47
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub D.W., and Welke R.J. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22 4 (1998) 441-470
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-470
-
-
Straub, D.W.1
Welke, R.J.2
-
48
-
-
70449552643
-
World University Rankings
-
THES, November 5, supplement. Available at: Accessed December, 2007
-
THES. (2007). World University Rankings, November 5, 2007. The times higher education supplement. Available at: http://www.timeshighereducation.co.uk/Magazines/THES/graphics/WorldRanki ngs2007.pdf Accessed December, 2007.
-
(2007)
The times higher education
-
-
-
49
-
-
0037399543
-
Competitive intelligence in the knowledge economy: What is in it for South African manufacturing enterprises
-
du Toit A.S.A. Competitive intelligence in the knowledge economy: What is in it for South African manufacturing enterprises. International Journal of Information Management 23 (2003) 111-120
-
(2003)
International Journal of Information Management
, vol.23
, pp. 111-120
-
-
du Toit, A.S.A.1
-
52
-
-
24644439555
-
Information security policy's impact on reporting security incidents
-
Wiant T.L. Information security policy's impact on reporting security incidents. Computers & Security 24 6 (2005) 448-459
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 448-459
-
-
Wiant, T.L.1
-
53
-
-
1242265154
-
In defense of the realm: Understanding threats to information security
-
Whitman. In defense of the realm: Understanding threats to information security. International Journal of Information Management 24 (2004) 3-4
-
(2004)
International Journal of Information Management
, vol.24
, pp. 3-4
-
-
Whitman1
-
54
-
-
44349154221
-
Information technology and the changing fabric of organization
-
Zammuto R.F., Griffith T.L., Majchrzak A., Dougherty D.J., and Faraj S. Information technology and the changing fabric of organization. Organization Science 18 5 (2007) 749-762
-
(2007)
Organization Science
, vol.18
, Issue.5
, pp. 749-762
-
-
Zammuto, R.F.1
Griffith, T.L.2
Majchrzak, A.3
Dougherty, D.J.4
Faraj, S.5
|