-
2
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys, 25(4), pp. 375-414, 1993.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
3
-
-
11144276637
-
-
Bundesamt fur Sicherheit in der Informationstechnik (Institute for Security in Information Technologies), material on the web site accessed May 2005
-
BSI (2003) IT Baseline Protection Manual. Bundesamt fur Sicherheit in der Informationstechnik (Institute for Security in Information Technologies), material on the web site http://www.bsi.bund.de/english/gshb/index.htm. accessed May 2005.
-
(2003)
IT Baseline Protection Manual
-
-
-
5
-
-
77956599124
-
-
Information Security: Technical, Legal and Social Issues by Alexandris, Kiountouzis & Trapezanoglou, published by the Greek Computer Society
-
Katsikas, S. (1995) Risk Management in Information Systems. In Information Security: Technical, Legal and Social Issues by Alexandris, Kiountouzis & Trapezanoglou, published by the Greek Computer Society.
-
(1995)
Risk Management in Information Systems
-
-
Katsikas, S.1
-
6
-
-
15944410399
-
An approach to security requirements engineering for a high assurance system
-
Irvine, C.E. et al. (2002) An Approach to Security Requirements Engineering for a High Assurance System. Requirements Engineering, 7, 192-206.
-
(2002)
Requirements Engineering
, vol.7
, pp. 192-206
-
-
Irvine, C.E.1
-
7
-
-
0011476534
-
Shifting IS security responsibility from user organisations to vendor/publisher organisations
-
Wood, C.C. (1995) Shifting IS Security Responsibility from User Organisations to Vendor/Publisher Organisations. Computers & Security, 14, pp. 283-284.
-
(1995)
Computers & Security
, vol.14
, pp. 283-284
-
-
Wood, C.C.1
-
8
-
-
84904354504
-
New directions on IS security methods: The process view
-
Gritzalis, D. et al. (eds.), Kluwer Academic Publishers
-
Siponen, M. (2003) New directions on IS security methods: The process view. In: Security and Privacy in the Age of Uncertainty, Gritzalis, D. et al. (eds.), Kluwer Academic Publishers, 325-336.
-
(2003)
Security and Privacy in the Age of Uncertainty
, pp. 325-336
-
-
Siponen, M.1
-
12
-
-
84947444879
-
Security management: An information system setting
-
Batten, L., Seberry, J. (eds.), Springer-Verlag LNCS 2384
-
Warren, M.J. & Batten, L.M. Security Management: An Information System Setting. In: Proceedings of the ACISP 2002 Conference, Batten, L., Seberry, J. (eds.), Springer-Verlag LNCS 2384, 257-270, 2002.
-
(2002)
Proceedings of the ACISP 2002 Conference
, pp. 257-270
-
-
Warren, M.J.1
Batten, L.M.2
-
13
-
-
77956562814
-
Integrating security into systems development
-
Gritzalis, D. et al. (eds.), Kluwer Academic Publishers
-
Evertsson, U, Orthberg, U. & Yngström, L. Integrating Security into Systems Development. In: Security and Privacy in the Age of Uncertainty, Gritzalis, D. et al. (eds.), Kluwer Academic Publishers, 313-324,2003.
-
(2003)
Security and Privacy in the Age of Uncertainty
, pp. 313-324
-
-
Evertsson, U.1
Orthberg, U.2
Yngström, L.3
-
14
-
-
8644292339
-
Achieving an integrated design: The way forward for information security
-
Ellof, J. and von Solms, S. (eds) Chapman & Hall
-
Hitchings, J. Achieving an Integrated Design: The Way Forward for Information Security. In: Information Security - the next decade, Ellof, J. and von Solms, S. (eds), pp. 369-383, Chapman & Hall, 1995.
-
(1995)
Information Security - The Next Decade
, pp. 369-383
-
-
Hitchings, J.1
-
16
-
-
77956602624
-
-
SBA material on the web site accessed May 2005
-
SBA (2005) IT Security By Analysis, material on the web site http://www.dfs.se/products/sbaeng/. accessed May 2005.
-
(2005)
IT Security by Analysis
-
-
-
17
-
-
0036067283
-
The information security management toolbox - Taking the pain out of security management
-
Vermeulen. C., and Von Solms. R. (2002) The information security management toolbox - taking the pain out of security management. Information Management & Computer Security, 10 (3), 119-125.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.3
, pp. 119-125
-
-
Vermeulen, C.1
Von Solms, R.2
-
19
-
-
77956584130
-
Systems engineering - Application and management of the systems engineering process
-
ISO/IEC 26702
-
ISO/IEC 26702. Systems engineering - application and management of the systems engineering process. Technical report, International Standards Organisation, 2007.
-
(2007)
Technical Report, International Standards Organisation
-
-
-
20
-
-
77956579067
-
Systems engineering standards and models compared
-
Vancouver, Columbia
-
Sheard, S. A. and Lake, J. G, 1998, Systems Engineering Standards and Models Compared, Proceedings of 8th Symposium of INCOSE, Vancouver, Columbia.
-
(1998)
Proceedings of 8th Symposium of INCOSE
-
-
Sheard, S.A.1
Lake, J.G.2
-
21
-
-
33646904221
-
IEEE 1220: For practical systems engineering
-
May
-
Doran, T (2005) IEEE 1220: For Practical Systems Engineering. Computer May 2006 (vol. 39 no. 5).
-
(2005)
Computer
, vol.39
, Issue.5
-
-
Doran, T.1
-
22
-
-
0030418114
-
Implementing systems engineering into an ongoing programme American society of mechanical engineers
-
Engineering Systems
-
Altomare, P M, (1996) Implementing systems engineering into an ongoing programme American Society of Mechanical Engineers, Dynamic Systems and Control Division, v 60, p 77-79, Engineering Systems
-
(1996)
Dynamic Systems and Control Division
, vol.60
, pp. 77-79
-
-
Altomare, P.M.1
-
24
-
-
33644658584
-
Information technology - Security techniques - Information security management systems - Requirements
-
ISO/IEC 27001
-
ISO/IEC 27001. Information technology - security techniques - information security management systems - requirements. Technical report, International Standards Organisation
-
Technical Report, International Standards Organisation
-
-
-
25
-
-
33744996371
-
-
Ernst & Young. Available from [Accessed 8th February 2010]
-
Ernst & Young. (2008) Global Information Security Survey: Moving beyond compliance. Ernst & Young. Available from: http://www.ey.com [Accessed 8th February 2010]
-
(2008)
Global Information Security Survey: Moving Beyond Compliance
-
-
-
26
-
-
77956609524
-
-
The ISO Survey of Certifications Available from [Accessed 8th February 2010]
-
The ISO Survey of Certifications. (2008) ISO Central Secretariat. Available from: http://www.onac.org.co/portaVimages/stories/ISO-Survey2008.pdf [Accessed 8th February 2010].
-
(2008)
ISO Central Secretariat
-
-
|