-
3
-
-
78651583898
-
-
Open Office, accessed 2 December
-
Open Office, available at http://www.openoffice.org (accessed 2 December 2009).
-
(2009)
-
-
-
4
-
-
0002425683
-
The analytic hierarchy process-a survey of the method and its applications
-
F. Zahedi, "The analytic hierarchy process-a survey of the method and its applications", Interfaces, vol.16, no. 4, pp. 96-108, 1986.
-
(1986)
Interfaces
, vol.16
, Issue.4
, pp. 96-108
-
-
Zahedi, F.1
-
5
-
-
0026155802
-
On the Buzzword 'Security Policy
-
Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California
-
D.F. Sterne, "On the Buzzword 'Security Policy,'" Proc. IEEE Computer Society Symp. Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, California, pp. 219-230, 1991.
-
(1991)
Proc. IEEE Computer Society Symp
, pp. 219-230
-
-
Sterne, D.F.1
-
6
-
-
0342571877
-
A Formal Framework to Support Multiple Security Policies
-
Ottawa, Communication Security Establishment Press
-
W.E. Kuhnhauser and M.K. Ostrowski, "A Formal Framework to Support Multiple Security Policies," Proc. 7th Canadian Computer Security Symposium. Ottawa, Communication Security Establishment Press, pp. 1-19. 1995.
-
(1995)
Proc. 7th Canadian Computer Security Symposium
, pp. 1-19
-
-
Kuhnhauser, W.E.1
Ostrowski, M.K.2
-
8
-
-
49249083359
-
Information security becomes a business priority
-
R. Filipek, "Information security becomes a business priority", Internal Auditor, vol. 64, no.1, pp.18, 2007.
-
(2007)
Internal Auditor
, vol.64
, Issue.1
, pp. 18
-
-
Filipek, R.1
-
10
-
-
0036999868
-
Computer attack trends challenge Internet security
-
A. Householder, K. Houle, and C. Dougherty, "Computer attack trends challenge Internet security", Computer IEEE, vol. 35, no. 4, pp. 5-7, 2002.
-
(2002)
Computer IEEE
, vol.35
, Issue.4
, pp. 5-7
-
-
Householder, A.1
Houle, K.2
Dougherty, C.3
-
12
-
-
84990029315
-
The Economics of Investment in Information Security
-
L.A. Gordon and M. P. Loeb, "The Economics of Investment in Information Security", ACM Transactions on Information and System Security, vol. 5, no. 4, pp. 438-457, 2002.
-
(2002)
ACM Transactions On Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
13
-
-
30344453851
-
How much security is enough to stop a thief? The economics of outsider theft via computer systems networks
-
Guadeloupe
-
S.E. Schecter and D.S. Michael, "How much security is enough to stop a thief? The economics of outsider theft via computer systems networks", Proceedings of theFinancial Cryptography Conference, Guadeloupe. pp. 122-137, 2003.
-
(2003)
Proceedings of TheFinancial Cryptography Conference
, pp. 122-137
-
-
Schecter, S.E.1
Michael, D.S.2
-
14
-
-
84870529816
-
Information security culture
-
Cairo, Egypt
-
A. Martins and J. Eloff, "Information security culture", IFIP TC11, 17th international conference on information security (SEC2002), Cairo, Egypt, pp. 203-214, 2002.
-
(2002)
IFIP TC11, 17th International Conference On Information Security (SEC2002)
, pp. 203-214
-
-
Martins, A.1
Eloff, J.2
-
15
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
M.E. Thomson and R. von Solms, "Information security awareness: educating your users effectively", Information Management and Computer Security, vol. 6, no. 4, pp. 167-173, 1998.
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
von Solms, R.2
-
18
-
-
34547568567
-
Prioritization of e-Government strategies using a SWOT-AHP analysis: The case of Turkey
-
Kahraman, Cengiz, Demirel, N. Cetin, Demirel and Tufan, "Prioritization of e-Government strategies using a SWOT-AHP analysis: the case of Turkey", European Journal of Information Systems, vol. 16, no. 3, pp. 284-298, 2007.
-
(2007)
European Journal of Information Systems
, vol.16
, Issue.3
, pp. 284-298
-
-
Kahraman, C.1
Demirel, N.C.2
Demirel3
Tufan4
-
19
-
-
36148947128
-
Using AHP and TOPSIS approaches in customer-driven product design process
-
M.C. Lin, C.C. Wang, M.S. Chen and C.A. Chang, Using AHP and TOPSIS approaches in customer-driven product design process, Computers in Industry, vol. 59, no. 1, pp. 17-31, 2008.
-
(2008)
Computers In Industry
, vol.59
, Issue.1
, pp. 17-31
-
-
Lin, M.C.1
Wang, C.C.2
Chen, M.S.3
Chang, C.A.4
-
20
-
-
70349596950
-
Selection of ERP suppliers using AHP tools in the clothing industry
-
C. Unal and G.G. Mucella, "Selection of ERP suppliers using AHP tools in the clothing industry", International Journal of Clothing Science and Technology, vol. 21, no. 4, pp. 239-251, 2009.
-
(2009)
International Journal of Clothing Science and Technology
, vol.21
, Issue.4
, pp. 239-251
-
-
Unal, C.1
Mucella, G.G.2
-
21
-
-
72049105575
-
Applying AHP to select drugs to be produced by anticipation in a chemotherapy compounding unit
-
L.A. Vidal, E. Sahin, N. Martelli, M. Berhoune and B. Bonan, "Applying AHP to select drugs to be produced by anticipation in a chemotherapy compounding unit", Expert Systems with Applications, vol. 37, no. 2, pp. 1528-1534, 2010.
-
(2010)
Expert Systems With Applications
, vol.37
, Issue.2
, pp. 1528-1534
-
-
Vidal, L.A.1
Sahin, E.2
Martelli, N.3
Berhoune, M.4
Bonan, B.5
-
22
-
-
59949093013
-
Measuring performance of virtual learning environment system in higher education
-
W. Ho, H.E. Higson, P.K. Dey, X. Xu and R. Bahsoon, "Measuring performance of virtual learning environment system in higher education", Quality Assurance in Education, vol.17, no. 1, pp. 6-29, 2009.
-
(2009)
Quality Assurance In Education
, vol.17
, Issue.1
, pp. 6-29
-
-
Ho, W.1
Higson, H.E.2
Dey, P.K.3
Xu, X.4
Bahsoon, R.5
-
23
-
-
25144483067
-
Analytic hierarchy process: An overview of applications
-
O.S. Vaidya and S. Kumar, "Analytic hierarchy process: An overview of applications", European Journal of Operational Research, vol. 169, no. 1, pp. 1-29, 2006.
-
(2006)
European Journal of Operational Research
, vol.169
, Issue.1
, pp. 1-29
-
-
Vaidya, O.S.1
Kumar, S.2
-
24
-
-
0042363355
-
The application of information security policies in large UK-based organizations: An exploratory investigation
-
H. Fulford and N.F. Doherty, "The application of information security policies in large UK-based organizations: an exploratory investigation", Information Management & Computer Security, vol. 11, no. 3, pp. 106-114, 2003.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
25
-
-
67349254655
-
National information security policy and its implementation: A case study in Taiwan
-
C.Y. Ku, Y.W. Chang and D.C. Yen, "National information security policy and its implementation: A case study in Taiwan", Telecommunications Policy, vol. 33, no. 7, pp. 371-384, 2009.
-
(2009)
Telecommunications Policy
, vol.33
, Issue.7
, pp. 371-384
-
-
Ku, C.Y.1
Chang, Y.W.2
Yen, D.C.3
-
26
-
-
15844405077
-
Information security threats and practices in small businesses
-
K. Shannon, P. Anne, H. Ben, P. Chad and C. Matt, "Information security threats and practices in small businesses", Information Systems Management, vol. 22, no 2 pp. 7-19, 2005.
-
(2005)
Information Systems Management
, vol.22
, Issue.2
, pp. 7-19
-
-
Shannon, K.1
Anne, P.2
Ben, H.3
Chad, P.4
Matt, C.5
-
27
-
-
34948857053
-
Usable Set-up of Runtime Security Policies
-
A. Herzog and N. Shahmehri, "Usable Set-up of Runtime Security Policies", Information Management & Computer Security, vol. 15, no. 5, pp 394-407, 2007.
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.5
, pp. 394-407
-
-
Herzog, A.1
Shahmehri, N.2
-
28
-
-
34547121214
-
Applying ISO 17799:2005 in information security management
-
M.C. Lee and T. Chang, "Applying ISO 17799:2005 in information security management", International Journal of Services and Standards, vol. 3, no. 3, pp.352-373, 2007.
-
(2007)
International Journal of Services and Standards
, vol.3
, Issue.3
, pp. 352-373
-
-
Lee, M.C.1
Chang, T.2
-
29
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
T. Herath and H.R. Rao, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness", Decision Support Systems, vol. 47, no. 2, pp. 154-165, 2009.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
30
-
-
67649548424
-
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
-
S. Ransbotham and S. Mitra, "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise", Information Systems Research, vol. 20, no. 1, pp. 121-139, 2009.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 121-139
-
-
Ransbotham, S.1
Mitra, S.2
-
31
-
-
67651034131
-
Security Policy Management for Systems Employing Role Based Access Control Model
-
C. Huang, J. Sun, X. Wang and Y.J. Si, "Security Policy Management for Systems Employing Role Based Access Control Model", Information Technology Journal, vol. 8, no. 5, pp. 726-734, 2009.
-
(2009)
Information Technology Journal
, vol.8
, Issue.5
, pp. 726-734
-
-
Huang, C.1
Sun, J.2
Wang, X.3
Si, Y.J.4
-
32
-
-
78651572109
-
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance
-
C. Jin, J. Liu, and Q. Deng, "Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance", International Journal of Network Security, vol. 9, no. 2, pp. 156-163, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.2
, pp. 156-163
-
-
Jin, C.1
Liu, J.2
Deng, Q.3
-
33
-
-
70349589069
-
A Worm Propagation Model based on Scale Free Network Structures and People's Email Acquaintance Profiles
-
T. Komninos, P. Spirakis, Y.C. Stamatiou, G. Vavitsas, "A Worm Propagation Model based on Scale Free Network Structures and People's Email Acquaintance Profiles", International Journal of Computer Science and Network Security, vol. 7, no. 2, pp. 308-315, 2007.
-
(2007)
International Journal of Computer Science and Network Security
, vol.7
, Issue.2
, pp. 308-315
-
-
Komninos, T.1
Spirakis, P.2
Stamatiou, Y.C.3
Vavitsas, G.4
|