-
1
-
-
33645607715
-
Abstraction and refinement of layered security policy
-
M.D. Abrams, S. Jajodia, H.J. Podell, Berlin: IEEE Computer Society Press New York, NY
-
M.D. Abrams, and D. Bailey Abstraction and refinement of layered security policy M.D. Abrams, S. Jajodia, H.J. Podell, Information Security - An Integrated Collection of Essays. Berlin: 1995 IEEE Computer Society Press New York, NY
-
(1995)
Information Security - An Integrated Collection of Essays
-
-
Abrams, M.D.1
Bailey, D.2
-
2
-
-
27944501654
-
Ethnographic content analysis
-
D.L. Altheide Ethnographic content analysis Qualitative Sociology 10 1987 65 77
-
(1987)
Qualitative Sociology
, vol.10
, pp. 65-77
-
-
Altheide, D.L.1
-
3
-
-
33847749523
-
HIPAA's effect on web site privacy policies
-
A.I. Anton, J.B. Eart, M.W. Vail, N. Jain, C.M. Gheen, and J.M. Frink HIPAA's effect on web site privacy policies IEEE Security & Privacy 5 1 2007 45 52
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.1
, pp. 45-52
-
-
Anton, A.I.1
Eart, J.B.2
Vail, M.W.3
Jain, N.4
Gheen, C.M.5
Frink, J.M.6
-
6
-
-
0032018960
-
Users' criteria for relevance evaluation: A cross-situational comparison
-
C. Barry, and L. Schamber Users' criteria for relevance evaluation: a cross-situational comparison Information Processing and Management 34 1998 219 236
-
(1998)
Information Processing and Management
, vol.34
, pp. 219-236
-
-
Barry, C.1
Schamber, L.2
-
9
-
-
12244306739
-
An information security meta-policy for emergent organizations
-
R. Baskerville, and M. Siponen An information security meta-policy for emergent organizations Logistics Information Management 15 5/6 2002 337 346
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 337-346
-
-
Baskerville, R.1
Siponen, M.2
-
10
-
-
6244307334
-
Population policy: Personal notes
-
B. Berelson Population policy: personal notes Population Studies 25 2 1971 173 182
-
(1971)
Population Studies
, vol.25
, Issue.2
, pp. 173-182
-
-
Berelson, B.1
-
11
-
-
0038312467
-
Political Institutions and policy choices: Evidence from the United States
-
T. Besley, and A. Case Political Institutions and policy choices: evidence from the United States Journal of Economic Literature 41 1 2003 7 73
-
(2003)
Journal of Economic Literature
, vol.41
, Issue.1
, pp. 7-73
-
-
Besley, T.1
Case, A.2
-
12
-
-
78650021739
-
Are student newspapers as readable, interesting and thorough as community newspapers? A content analysis of student and community daily newspapers
-
Quebec, Canada, August 5-8, 1992
-
Bodle, J.V., 1992. Are student newspapers as readable, interesting and thorough as community newspapers? A content analysis of student and community daily newspapers. In: Proceedings of 75th Annual Meeting of the Association for Education in Journalism and Mass Communication Montreal. Quebec, Canada, August 5-8, 1992.
-
(1992)
Proceedings of 75th Annual Meeting of the Association for Education in Journalism and Mass Communication Montreal
-
-
Bodle, J.V.1
-
13
-
-
0000214225
-
Technology transfer and public policy: A review of research and theory
-
B. Bozeman Technology transfer and public policy: a review of research and theory Research Policy 29 4-5 2000 627 655
-
(2000)
Research Policy
, vol.29
, Issue.45
, pp. 627-655
-
-
Bozeman, B.1
-
14
-
-
0037826345
-
Finally! Comparative over-time mapping of party policy movement
-
Budge, I., Hans-Dieter, K., Volkens, A., Bara, J., Tanenbaum, E., Fording, R.C., Hearl, D.J., Kim, H.M., McDonald, M.D., Mendes, S.M. (Eds.) Oxford University Press, Oxford
-
Budge, I., Hans-Dieter, K., 2001. Finally! Comparative over-time mapping of party policy movement. In: Budge, I., Hans-Dieter, K., Volkens, A., Bara, J., Tanenbaum, E., Fording, R.C., Hearl, D.J., Kim, H.M., McDonald, M.D., Mendes, S.M. (Eds.), Map-ping Policy Preferences. Estimates for Parties, Electors, and Governments 1945-1998. Oxford University Press, Oxford, pp. 19-50.
-
(2001)
Map-ping Policy Preferences. Estimates for Parties, Electors, and Governments 1945-1998
, pp. 19-50
-
-
Budge, I.1
Hans-Dieter, K.2
-
15
-
-
84880609979
-
Best practices in exploratory factor analysis: Four recommendations for getting the most from your analysis
-
A.B. Costello, and J.W. Osborne Best practices in exploratory factor analysis: four recommendations for getting the most from your analysis Practical Assessment, Research & Evaluation 10 7 2005
-
(2005)
Practical Assessment, Research & Evaluation
, vol.10
, Issue.7
-
-
Costello, A.B.1
Osborne, J.W.2
-
17
-
-
0004131215
-
-
Cambridge University Press Cambridge, United Kingdom
-
W.A. Dembski The Design Inference 1998 Cambridge University Press Cambridge, United Kingdom
-
(1998)
The Design Inference
-
-
Dembski, W.A.1
-
20
-
-
33744830087
-
Value focused assessment of information system security in organizations
-
G. Dhillon, and G. Torkzadeh Value focused assessment of information system security in organizations Information Systems Journal 16 3 2006
-
(2006)
Information Systems Journal
, vol.16
, Issue.3
-
-
Dhillon, G.1
Torkzadeh, G.2
-
22
-
-
25144436981
-
Do information security policies reduce the incidence of security breaches: An exploratory analysis
-
N.F. Doherty, and H. Fulford Do information security policies reduce the incidence of security breaches: an exploratory analysis Information Resources Management 18 4 2005 21 39
-
(2005)
Information Resources Management
, vol.18
, Issue.4
, pp. 21-39
-
-
Doherty, N.F.1
Fulford, H.2
-
23
-
-
0033888206
-
The problem of information overload in business organizations: A review on the literature
-
A. Edmunds, and A. Morris The problem of information overload in business organizations: a review on the literature International Journal of Information Management 20 2000 17 28
-
(2000)
International Journal of Information Management
, vol.20
, pp. 17-28
-
-
Edmunds, A.1
Morris, A.2
-
26
-
-
70349303945
-
Measuring network security using dynamic bayesian network
-
October 27, 2008, Alexandria, Virginia, USA
-
Frigault, M., Wang, L., Singhal, A., Jajodia, S., 2008. Measuring network security using dynamic bayesian network. In: Proceedings of the 4th ACM Workshop on Quality of Protection, October 27, 2008, Alexandria, Virginia, USA.
-
(2008)
Proceedings of the 4th ACM Workshop on Quality of Protection
-
-
Frigault, M.1
Wang, L.2
Singhal, A.3
Jajodia, S.4
-
27
-
-
37849020734
-
Macroeconomic modeling for monetary policy evaluation
-
J. Galí, and M. Gertler Macroeconomic modeling for monetary policy evaluation The Journal of Economic Perspectives 21 4 2007 25 46
-
(2007)
The Journal of Economic Perspectives
, vol.21
, Issue.4
, pp. 25-46
-
-
Galí, J.1
Gertler, M.2
-
29
-
-
34247387359
-
Biological models of security for virus propagation in computer networks
-
S. Goel, and S.F. Bush Biological models of security for virus propagation in computer networks Login 29 6 2004 49 59
-
(2004)
Login
, vol.29
, Issue.6
, pp. 49-59
-
-
Goel, S.1
Bush, S.F.2
-
30
-
-
70349361004
-
Managing information security: Demystifying the audit process for security officers
-
S. Goel, D. Pon, and J. Menzies Managing information security: demystifying the audit process for security officers Journal of Information System Security 2 2 2006 25 45
-
(2006)
Journal of Information System Security
, vol.2
, Issue.2
, pp. 25-45
-
-
Goel, S.1
Pon, D.2
Menzies, J.3
-
33
-
-
84992276264
-
Environmental Indicators: A Systematic Approach to Measuring and Reporting on Environmental Policy Performance in the Context of Sustainable Development
-
Hammond, A., Adriaanse, A., Rodenburg, E., Bryant, D., Woodward, R., 1995. Environmental Indicators: A Systematic Approach to Measuring and Reporting on Environmental Policy Performance in the Context of Sustainable Development. World Resources Institute. < http://www.pdf.wri.org/environmentalindicators- bw.pdf >.
-
(1995)
World Resources Institute
-
-
Hammond, A.1
Adriaanse, A.2
Rodenburg, E.3
Bryant, D.4
Woodward, R.5
-
34
-
-
0037244299
-
Improving the clarity of journal abstracts in psychology: The case for structure
-
J. Hartley Improving the clarity of journal abstracts in psychology: the case for structure Science Communication 24 2003 366 379
-
(2003)
Science Communication
, vol.24
, pp. 366-379
-
-
Hartley, J.1
-
35
-
-
84933481818
-
Are structured abstracts easier to read than traditional ones?
-
J. Hartley, and M. Sydes Are structured abstracts easier to read than traditional ones? Journal of Research in Reading 20 1997 122 136
-
(1997)
Journal of Research in Reading
, vol.20
, pp. 122-136
-
-
Hartley, J.1
Sydes, M.2
-
38
-
-
0036299585
-
Security surveys spring crop
-
S. Hinde Security surveys spring crop Computers and Security 21 4 2002 310 321
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 310-321
-
-
Hinde, S.1
-
39
-
-
0001105213
-
A content analysis of ethical policy statements regarding marketing activities
-
R.E. Hite, J.A. Bellizzi, and C. Fraser A content analysis of ethical policy statements regarding marketing activities Journal of Business Ethics 7 10 1988 771 776
-
(1988)
Journal of Business Ethics
, vol.7
, Issue.10
, pp. 771-776
-
-
Hite, R.E.1
Bellizzi, J.A.2
Fraser, C.3
-
40
-
-
0036330173
-
Information security policy-what do international information security standards say?
-
K. Hone, and J.H.P. Eloff Information security policy-what do international information security standards say? Computers & Security 21 5 2002 402 409
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Hone, K.1
Eloff, J.H.P.2
-
41
-
-
0036613095
-
What makes an effective information security policy?
-
K. Hone, and J.H.P. Eloff What makes an effective information security policy? Network Security 6 2002 14 16
-
(2002)
Network Security
, vol.6
, pp. 14-16
-
-
Hone, K.1
Eloff, J.H.P.2
-
42
-
-
0036330173
-
Information security policy-what do international information security standards say?
-
K. Hone, and J.H.P. Eloff Information security policy-what do international information security standards say? Computers & Security 21 5 2002 402 409
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 402-409
-
-
Hone, K.1
Eloff, J.H.P.2
-
43
-
-
33745838617
-
An empirical study of information security policy on information security elevation in Taiwan
-
K.-S. Hong, Y.-P. Chi, L.R. Chao, and J.-H. Tang An empirical study of information security policy on information security elevation in Taiwan Information Management & Computer Security 14 2 2006 104 115
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.2
, pp. 104-115
-
-
Hong, K.-S.1
Chi, Y.-P.2
Chao, L.R.3
Tang, J.-H.4
-
44
-
-
3042641443
-
-
Ph.D. diss., University of North Texas, 1986. Abstract in Dissertation Abstracts International
-
Horton, N.S., 1986. Young adult literature and censorship: A content analysis of seventy-eight young adult books. Ph.D. diss., University of North Texas, 1986. Abstract in Dissertation Abstracts International 47 (11A), 4038.
-
(1986)
Young Adult Literature and Censorship: A Content Analysis of Seventy-eight Young Adult Books
, vol.47
, Issue.11 A
, pp. 4038
-
-
Horton, N.S.1
-
46
-
-
0032630277
-
Information dimension, information overload, and decision quality
-
M.I. Hwang, and J.W. Lin Information dimension, information overload, and decision quality Journal of Information Science 25 3 1999 213 218
-
(1999)
Journal of Information Science
, vol.25
, Issue.3
, pp. 213-218
-
-
Hwang, M.I.1
Lin, J.W.2
-
50
-
-
4544286640
-
Privacy policies as decision-making tools: An evaluation of online privacy notices
-
ACM New York, NY
-
C. Jensen, and C. Potts Privacy policies as decision-making tools: an evaluation of online privacy notices Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vienna, Austria, April 24-29, 2004). CHI '04 2004 ACM New York, NY 471 478
-
(2004)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vienna, Austria, April 24-29, 2004). CHI '04
, pp. 471-478
-
-
Jensen, C.1
Potts, C.2
-
51
-
-
78650016435
-
-
Paper Presented at the Annual Meeting of the International Communication Association, Marriott Hotel, San Diego, CA
-
Jin, Y., Cameron, G.T., 2003. A Content Analysis of Direct Marketing Emails. Paper Presented at the Annual Meeting of the International Communication Association, Marriott Hotel, San Diego, CA.
-
(2003)
A Content Analysis of Direct Marketing Emails
-
-
Jin, Y.1
Cameron, G.T.2
-
53
-
-
62949118066
-
Method effects in his survey research: An assessment and recommendation
-
W.R. King, C.Z. Liu, M.H. Haney, and J. He Method effects in his survey research: an assessment and recommendation Communications of the AIS 20 1 2007
-
(2007)
Communications of the AIS
, vol.20
, Issue.1
-
-
King, W.R.1
Liu, C.Z.2
Haney, M.H.3
He, J.4
-
54
-
-
1242263532
-
Why there aren't more information security research studies
-
A.G. Kotulic, and G.J. Clark Why there aren't more information security research studies Information & Management 41 5 2004 597 607
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, G.J.2
-
57
-
-
46049112694
-
Annual report readability, current earnings, and earnings persistence
-
Feng Li Annual report readability, current earnings, and earnings persistence Journal of Accounting and Economics 45 2-3 2008 221 247
-
(2008)
Journal of Accounting and Economics
, vol.45
, Issue.23
, pp. 221-247
-
-
Li, F.1
-
59
-
-
0347036686
-
Human participants - Respondents and researchers
-
P. Malaviya, D.R. John, B. Sternthal, and J. Barnes Human participants - respondents and researchers Journal of Consumer Psychology 10 1-2 2001 115 121
-
(2001)
Journal of Consumer Psychology
, vol.10
, Issue.12
, pp. 115-121
-
-
Malaviya, P.1
John, D.R.2
Sternthal, B.3
Barnes, J.4
-
60
-
-
0003160744
-
Structure improves content and peer review of abstracts. Scientific meetings
-
N. McIntosh, G. Duc, and G. Sedin Structure improves content and peer review of abstracts. Scientific meetings European Science Editing 25 1999 43 47
-
(1999)
European Science Editing
, vol.25
, pp. 43-47
-
-
McIntosh, N.1
Duc, G.2
Sedin, G.3
-
61
-
-
10844290435
-
Consumers' protection of online privacy and identity
-
G.R. Milne, A.J. Rohm, and S. Bahl Consumers' protection of online privacy and identity Journal of Consumer Affairs 38 2 2004 217 232
-
(2004)
Journal of Consumer Affairs
, vol.38
, Issue.2
, pp. 217-232
-
-
Milne, G.R.1
Rohm, A.J.2
Bahl, S.3
-
64
-
-
85013137337
-
Information security policy framework: Best practices for security policy in the E-commerce age
-
M.E. Palmer, C. Robinson, J.C. Patilla, and E.P. Moser Information security policy framework: best practices for security policy in the E-commerce age Security Management Practices 10 2 2001 13 17
-
(2001)
Security Management Practices
, vol.10
, Issue.2
, pp. 13-17
-
-
Palmer, M.E.1
Robinson, C.2
Patilla, J.C.3
Moser, E.P.4
-
68
-
-
78650002574
-
-
Security Awareness - Implementing an Effective Strategy (retrieved3.01.06)
-
Russell, C., 2002. Security Awareness - Implementing an Effective Strategy. < http://www.sans.org/aware/sec-aware.phg > (retrieved 3.01.06).
-
(2002)
-
-
Russell, C.1
-
69
-
-
84937326418
-
Evaluation in complex policy systems
-
I. Sanderson Evaluation in complex policy systems Evaluation 6 4 2000 433 454
-
(2000)
Evaluation
, vol.6
, Issue.4
, pp. 433-454
-
-
Sanderson, I.1
-
70
-
-
0028513932
-
Access control: Principles and practice
-
R.S. Sandhu, and P. Samarati Access control: principles and practice IEEE Communications 32 9 1994 40 48
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
74
-
-
29144492869
-
In poor health: An assessment of privacy policies at direct-to-consumer web sites
-
K. Sheehan In poor health: an assessment of privacy policies at direct-to-consumer web sites Journal of Public Policy & Marketing 24 2 2005 273 283
-
(2005)
Journal of Public Policy & Marketing
, vol.24
, Issue.2
, pp. 273-283
-
-
Sheehan, K.1
-
75
-
-
79951860860
-
Techniques for enterprise network security metrics
-
April 13-15, 2009, Oak Ridge, Tennessee
-
Singhal, A., Ou, X., 2009. Techniques for enterprise network security metrics. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, April 13-15, 2009, Oak Ridge, Tennessee.
-
(2009)
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
-
-
Singhal, A.1
Ou, X.2
-
78
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
D.W. Straub, and R.J. Welke Coping with systems risk: security planning models for management decision making MIS Quarterly 22 4 1998 441 464
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
80
-
-
49149130858
-
An empirical study of consumer perception and comprehension of web site privacy policy
-
M.W. Vail, J.B. Earp, and A.I. Anton An empirical study of consumer perception and comprehension of web site privacy policy IEEE Transactions on Engineering Management 5 3 2008 442 454
-
(2008)
IEEE Transactions on Engineering Management
, vol.5
, Issue.3
, pp. 442-454
-
-
Vail, M.W.1
Earp, J.B.2
Anton, A.I.3
-
82
-
-
3042812983
-
The 10 deadly sins of information security management
-
B. von Solms, and R. von Solms The 10 deadly sins of information security management Computers & Security 23 5 2004 371 376
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 371-376
-
-
Von Solms, B.1
Von Solms, R.2
-
85
-
-
0039639238
-
Organizational computer security policy: The reality
-
A.R. Warman Organizational computer security policy: the reality European Journal of Information Systems 1 5 1992 305 310
-
(1992)
European Journal of Information Systems
, vol.1
, Issue.5
, pp. 305-310
-
-
Warman, A.R.1
-
87
-
-
3042726410
-
A content analysis of e-mail communication between patients and their providers: Patients get the message
-
C.B. White, C.A. Moyer, D.T. Stern, and S.J. Katz A content analysis of e-mail communication between patients and their providers: patients get the message Journal of the American Medical Information Association 11 4 2004 260 267
-
(2004)
Journal of the American Medical Information Association
, vol.11
, Issue.4
, pp. 260-267
-
-
White, C.B.1
Moyer, C.A.2
Stern, D.T.3
Katz, S.J.4
-
88
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
M. Whitman Enemy at the gate: threats to information security Communications of the ACM 46 2003 91 95
-
(2003)
Communications of the ACM
, vol.46
, pp. 91-95
-
-
Whitman, M.1
-
90
-
-
0018019231
-
Compression of individual sequences via variable-rate coding
-
J. Ziv, and A. Lempel Compression of individual sequences via variable-rate coding IEEE Transactions on Information Theory 24 1978 530 536
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 530-536
-
-
Ziv, J.1
Lempel, A.2
|