-
1
-
-
0038835976
-
Major IS concerns of entrepreneurial organizations
-
Alpar, P., and Ein-Dor, P. "Major IS Concerns of Entrepreneurial Organizations," Information & Management (20), 1991, pp. 1 - 11.
-
(1991)
Information & Management
, Issue.20
, pp. 1-11
-
-
Alpar, P.1
Ein-Dor, P.2
-
2
-
-
33749607171
-
Computer security in small business: An empirical study
-
Jan
-
Bradbard, A. D., Norris, R. D., and Kahai, H. P. "Computer Security in Small Business: An Empirical Study," Journal of Small Business Management (28:1), Jan 1990, pp. 9- 18.
-
(1990)
Journal of Small Business Management
, vol.28
, Issue.1
, pp. 9-18
-
-
Bradbard, A.D.1
Norris, R.D.2
Kahai, H.P.3
-
3
-
-
0002681615
-
Determinants of success for computer usage in small business
-
Mar
-
Delone, W. H. "Determinants of Success for Computer Usage in Small Business," MIS Quarterly (12), Mar 1988, pp. 51 - 61.
-
(1988)
MIS Quarterly
, Issue.12
, pp. 51-61
-
-
Delone, W.H.1
-
4
-
-
33744996371
-
-
Accessed 18 Nov 2005
-
Ernst and Young "Global Information Security Survey 2004," 2004. Accessed 18 Nov 2005, http://www.ey.com/global/download.nsf/International/ 2004-Global-Information-Security-Survey/$file/2004-Global-Information- Security-Survey-2004.pdf
-
(2004)
Global Information Security Survey 2004
-
-
Ernst1
Young2
-
5
-
-
33847149105
-
-
Accessed 18 Feb 2006
-
Ernst and Young "Global Information Security Survey 2005," 2005. Accessed 18 Feb 2006, http://www.ey.com/global/download.nsf/International/ Global-Information-Security-Survey-2005/$file/EY-Global-Information- Security-survey-2005.pdf
-
(2005)
Global Information Security Survey 2005
-
-
Ernst1
Young2
-
7
-
-
0001823869
-
Security concerns of system users: A study of perceptions of the adequacy of security
-
Goodhue, D. L., and Straub, W. D. "Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security," Information & Management (20:1), 1991, pp. 13 - 27.
-
(1991)
Information & Management
, vol.20
, Issue.1
, pp. 13-27
-
-
Goodhue, D.L.1
Straub, W.D.2
-
9
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
Kankanhalli, A., Teo, H. H., Tan, C. Y., and Kwok, K. W. "An Integrative Study of Information Systems Security Effectiveness," International Journal of Information Management (23), 2003, pp. 139 - 159.
-
(2003)
International Journal of Information Management
, Issue.23
, pp. 139-159
-
-
Kankanhalli, A.1
Teo, H.H.2
Tan, C.Y.3
Kwok, K.W.4
-
10
-
-
15844405077
-
Information security threats and practices in small businesses
-
Keller, S., and Powell, A. "Information Security Threats and Practices in Small Businesses," Information Systems Management (22:2), Spring 2005, pp. 7 - 19. (Pubitemid 40420689)
-
(2005)
Information Systems Management
, vol.22
, Issue.2
, pp. 7-19
-
-
Keller, S.1
Powell, A.2
Horstmann, B.3
Predmore, C.4
Crawford, M.5
-
11
-
-
1242263532
-
Why there aren't more information security research studies?
-
May
-
Kotulic, A., and Jan, G. C. "Why There aren't More Information Security Research Studies?" Information & Management (41:5), May 2004, pp. 597 - 607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.1
Jan, G.C.2
-
12
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
June
-
Loch, K. D., and Carr, H. H. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly (16:2), June 1992, pp. 173 - 191.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-191
-
-
Loch, K.D.1
Carr, H.H.2
-
13
-
-
80053528032
-
Management information success in small business
-
Fall
-
Nazem, S. M. "Management Information Success in Small Business," International CIS Journal (1), Fall 1987, pp. 5 - 12.
-
(1987)
International CIS Journal
, Issue.1
, pp. 5-12
-
-
Nazem, S.M.1
-
14
-
-
1642568986
-
Small business computer security
-
Oct
-
Pendegraft, N., Morris, L., and Savage, K. "Small Business Computer Security," Journal of Small Business Management (25:4), Oct 1987, pp. 54 - 60.
-
(1987)
Journal of Small Business Management
, vol.25
, Issue.4
, pp. 54-60
-
-
Pendegraft, N.1
Morris, L.2
Savage, K.3
-
15
-
-
17644399080
-
Risk management guide for information technology systems
-
Stoneburner, G., Goguen, A., and Feringa, A. "Risk Management Guide for Information Technology Systems," National Institute of Standards and Technology, SP800-30, 2002.
-
(2002)
National Institute of Standards and Technology, SP800-30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
16
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, W. D. "Effective IS Security: An Empirical Study," Information Systems Research (1: 3), 1990, pp. 255 - 276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, W.D.1
-
17
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
March
-
Straub, W. D., and Nance, D. W. "Discovering and Disciplining Computer Abuse in Organizations: A Field Study," MIS Quarterly, (14:1), March 1990, pp. 45 - 60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, W.D.1
Nance, D.W.2
-
18
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
December
-
Straub, W. D., and Welke, R. J. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), December 1998, pp. 441 -469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, W.D.1
Welke, R.J.2
-
20
-
-
1242265154
-
Defense of the realm: Understanding the threats to information security
-
Whitman, M. E. "In Defense of the Realm: Understanding the Threats to Information Security," International Journal of Information Management (24), 2004b, pp. 43 - 57.
-
(2004)
International Journal of Information Management
, Issue.24
, pp. 43-57
-
-
Whitman, M.E.1
|