-
1
-
-
33751160564
-
A framework for information technology outsourcing risk management
-
Aubert, B. A., Party, M., & Rivard, S. (2005). A framework for information technology outsourcing risk management. The DATABASE for Advances in Information Systems, 36(4), 8-29.
-
(2005)
The DATABASE for Advances in Information Systems
, vol.36
, Issue.4
, pp. 8-29
-
-
Aubert, B.A.1
Party, M.2
Rivard, S.3
-
2
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(44), 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.44
, pp. 375-414
-
-
Baskerville, R.1
-
3
-
-
84855791493
-
Best practices in IT risk management
-
Baskerville, R. (2005). Best practices in IT risk management. Cutter Benchmark Review, 5(12), 5-12.
-
(2005)
Cutter Benchmark Review
, vol.5
, Issue.12
, pp. 5-12
-
-
Baskerville, R.1
-
5
-
-
84905579112
-
A Systems Perspective on Security Risk Identification: Methodology and Illustrations from City Councils
-
Washington, DC, USA, ISCRAM
-
Berghmans, P., Van Den Eede, G, & Van de Walle, B. (2008). A Systems Perspective on Security Risk Identification: Methodology and Illustrations from City Councils. Proceedings of the 5 International ISCRAM Conference, Washington, DC, USA, ISCRAM.
-
(2008)
Proceedings of the 5 International ISCRAM Conference
-
-
Berghmans, P.1
van den Eede, G.2
van de Walle, B.3
-
6
-
-
77955444113
-
Security considerations in outsourcing IT services
-
Blackley, J. A., & Leach, J. (1996). Security considerations in outsourcing IT services. Information Security Technical Report, 1(3), 3-4.
-
(1996)
Information Security Technical Report
, vol.1
, Issue.3
, pp. 3-4
-
-
Blackley, J.A.1
Leach, J.2
-
7
-
-
84934979622
-
Public management information systems: Theory and prescription (Special issue)
-
Bozeman, B., & Bretschneider, S. (1986). Public management information systems: Theory and prescription (Special issue). Public Administration Review, 46, 475-487.
-
(1986)
Public Administration Review
, vol.46
, pp. 475-487
-
-
Bozeman, B.1
Bretschneider, S.2
-
8
-
-
38049073364
-
Achieving advanced electronic government services: An examination of obstacles and implications from an international perspective
-
Bloomington, IN
-
Brown, M. M., & Brudney, J. L. (2001). Achieving advanced electronic government services: An examination of obstacles and implications from an international perspective, The National Public Management Research Conference, Bloomington, IN.
-
(2001)
The National Public Management Research Conference
-
-
Brown, M.M.1
Brudney, J.L.2
-
10
-
-
1642413541
-
IT Doesn't Matter
-
Carr, N. G. (2003). IT Doesn't Matter. Harvard Business Review, 81(5), 5-12.
-
(2003)
Harvard Business Review
, vol.81
, Issue.5
, pp. 5-12
-
-
Carr, N.G.1
-
11
-
-
70549101146
-
Outsourcing, bureaucracy and public value: Reappraising the notion of the contract state
-
Cordella, A., & Willcocks, L. (2009). Outsourcing, bureaucracy and public value: Reappraising the notion of the "contract state". Government Information Quarterly, 27, 82-88.
-
(2009)
Government Information Quarterly
, vol.27
, pp. 82-88
-
-
Cordella, A.1
Willcocks, L.2
-
12
-
-
21344439470
-
Outsourcing in the private and public sectors: An unpredictable IT strategy
-
Currie, W. (1996). Outsourcing in the private and public sectors: An unpredictable IT strategy. European Journal of Information Systems, 4, 226-236.
-
(1996)
European Journal of Information Systems
, vol.4
, pp. 226-236
-
-
Currie, W.1
-
13
-
-
27544496330
-
IT Governance Structures, Processes and Relational Mechanisms: Achieving IT/Business Alignment in aMajor Belgian Financial Group
-
Waikoloa, Big Island Hawaii, Jan 3-6, 2005
-
De Haes, S., & Van Grembergen, W. (2005). IT Governance Structures, Processes and Relational Mechanisms: Achieving IT/Business Alignment in aMajor Belgian Financial Group. Proceedings of the 38th Annual Hawaii International Conference, Waikoloa, Big Island Hawaii, Jan 3-6, 2005.
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference
-
-
de Haes, S.1
van Grembergen, W.2
-
14
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: Towards socio-organizational perspectives. Information Systems Journal, 11(2), 127.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127
-
-
Dhillon, G.1
Backhouse, J.2
-
15
-
-
33744830087
-
Value-focused assessment of information system security in organizations
-
Dhillon, G., & Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems Journal, 16(3), 293-314.
-
(2006)
Information Systems Journal
, vol.16
, Issue.3
, pp. 293-314
-
-
Dhillon, G.1
Torkzadeh, G.2
-
16
-
-
27344447595
-
Information systems outsourcing: A survey and analysis of the literature
-
Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. (2004) Information systems outsourcing: A survey and analysis of the literature. ACM SIGMIS Database, 35, 6-102.
-
(2004)
ACM SIGMIS Database
, vol.35
, pp. 6-102
-
-
Dibbern, J.1
Goles, T.2
Hirschheim, R.3
Jayatilaka, B.4
-
18
-
-
0003113895
-
The risk of outsourcing IT
-
Earl, M. J. (1996). The risk of outsourcing IT. Sloan Management Review, 37(3), 26-32.
-
(1996)
Sloan Management Review
, vol.37
, Issue.3
, pp. 26-32
-
-
Earl, M.J.1
-
19
-
-
0642264602
-
A security framework for information systems outsourcing
-
Fink, D. (1994). A security framework for information systems outsourcing. Information Management & Computer Security, 2, 3-8.
-
(1994)
Information Management & Computer Security
, vol.2
, pp. 3-8
-
-
Fink, D.1
-
20
-
-
66149159220
-
Risk of insider threats in information technology outsourcing: Can deceptive techniques be applied?
-
Gaonjur, P., & Bokhoree, C. (2006). Risk of insider threats in information technology outsourcing: Can deceptive techniques be applied? Proceedings of Security and Management, 522.
-
(2006)
Proceedings of Security and Management
, vol.522
-
-
Gaonjur, P.1
Bokhoree, C.2
-
21
-
-
84904291635
-
"IEC 27002:2005." Information technology. Security techniques
-
Retrieved from
-
ISO, B. (2005). "IEC 27002:2005." Information technology. Security techniques. Code of practice for information security management. Retrieved from http://www.iso.org/iso/catalogue_detail?csnumber=42103.
-
(2005)
Code of Practice for Information Security Management
-
-
Iso, B.1
-
22
-
-
33749496395
-
A framework for outsourcing IS/IT security services
-
Karyda, M., Mitrou, E., & Quirchmayr, G. (2006). A framework for outsourcing IS/IT security services. Information Management & Computer Security, 14, 402-415.
-
(2006)
Information Management & Computer Security
, vol.14
, pp. 402-415
-
-
Karyda, M.1
Mitrou, E.2
Quirchmayr, G.3
-
24
-
-
1242265180
-
Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors
-
Khalfan, A. M. (2004). Information security considerations in IS/IT outsourcing projects: A descriptive case study of two sectors. International Journal of Information Management, 24, 29-42.
-
(2004)
International Journal of Information Management
, vol.24
, pp. 29-42
-
-
Khalfan, A.M.1
-
26
-
-
70349118618
-
A review of the IT outsourcing literature: Insights for practice
-
Lacity, M. C., Khan, S. A., & Willcocks, L. P. (2009). A review of the IT outsourcing literature: Insights for practice. The Journal of Strategic Information Systems, 18, 130-146.
-
(2009)
The Journal of Strategic Information Systems
, vol.18
, pp. 130-146
-
-
Lacity, M.C.1
Khan, S.A.2
Willcocks, L.P.3
-
27
-
-
39749085754
-
IT outsourcing for Egovernment: Lessons from IT outsourcing projects initiated by agricultural organizations of the Korean government
-
Waikoloa, Big Island Hawaii, Jan 3-6, 2007
-
Moon, J., Jung, G., Chung, M., & Choe, Y. (2007). IT outsourcing for Egovernment: Lessons from IT outsourcing projects initiated by agricultural organizations of the Korean government. Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007), Waikoloa, Big Island Hawaii, Jan 3-6, 2007.
-
(2007)
Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS 2007)
-
-
Moon, J.1
Jung, G.2
Chung, M.3
Choe, Y.4
-
28
-
-
82955172801
-
-
[Doctoral dissertation] Linköping University, Department of Management and Engineering
-
Oscarson, P. (2007). Actual and Perceived Information Systems Security. [Doctoral dissertation] Linköping University, Department of Management and Engineering.
-
(2007)
Actual and Perceived Information Systems Security
-
-
Oscarson, P.1
-
29
-
-
84876677497
-
OWASP Top 10 Project
-
OWASP, Retrieved from
-
OWASP (2009). OWASP Top 10 Project. OWASP. Retrieved from https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
-
(2009)
OWASP
-
-
-
30
-
-
0003106484
-
The core competence of the corporation
-
Prahalad, C., & Hamel, G. (1990). The core competence of the corporation. Harvard Business Review, 68(3), 79-91.
-
(1990)
Harvard Business Review
, vol.68
, Issue.3
, pp. 79-91
-
-
Prahalad, C.1
Hamel, G.2
-
31
-
-
0004223940
-
-
Cambridge, UK: Cambridge University Press
-
Reason, J. (1990). Human error. Cambridge, UK: Cambridge University Press.
-
(1990)
Human Error
-
-
Reason, J.1
-
32
-
-
85014614766
-
Three decades of risk research: Accomplishments and new challenges
-
Renn, O. (1998). Three decades of risk research: Accomplishments and new challenges. Journal of Risk Research, 1(1), 49-71.
-
(1998)
Journal of Risk Research
, vol.1
, Issue.1
, pp. 49-71
-
-
Renn, O.1
-
34
-
-
0031337118
-
Managing security for outsourcing contracts
-
Sherwood, J. (1997). Managing security for outsourcing contracts. Computers and Security, 16, 603-609.
-
(1997)
Computers and Security
, vol.16
, pp. 603-609
-
-
Sherwood, J.1
-
36
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
37
-
-
0003234820
-
Firm boundaries, technological innovation and strategic management
-
In L. Thomas (Ed.), Lexington, MA: Lexington Books
-
Teece, D. J. (1986). Firm boundaries, technological innovation and strategic management. In L. Thomas (Ed.), The economics of Strategic Planning (pp. 187-199), Lexington, MA: Lexington Books.
-
(1986)
The Economics of Strategic Planning
, pp. 187-199
-
-
Teece, D.J.1
-
38
-
-
79952761898
-
Differences between public and private IT outsourcing: Common themes in the literature
-
Montreal, Canada, Digital Government Society of North America
-
Vilvovsky, S. (2008). Differences between public and private IT outsourcing: Common themes in the literature, Proceedings of the 2008 international conference on Digital government research, Montreal, Canada, Digital Government Society of North America.
-
(2008)
Proceedings of the 2008 International Conference on Digital Government Research
-
-
Vilvovsky, S.1
-
39
-
-
84900609028
-
e-Government Survey 2008
-
United Nations, Retrieved December 28t 2009 from
-
United Nations (2008). e-Government Survey 2008, From e-Government to connected Governance. Retrieved December 28t 2009 from unpan1.un.org/intradoc/groups/public/documents/UN/UNPAN028607.pdf.
-
(2008)
From E-Government to Connected Governance
-
-
-
40
-
-
0012597186
-
Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA
-
Willcocks, L. P., Lacity, M. C., & Kern, T. (1999). Risk mitigation in IT outsourcing strategy revisited: Longitudinal case research at LISA. Journal of Strategic Information Systems, 8, 285-314.
-
(1999)
Journal of Strategic Information Systems
, vol.8
, pp. 285-314
-
-
Willcocks, L.P.1
Lacity, M.C.2
Kern, T.3
-
42
-
-
34250180194
-
E-government research: Reviewing the literature, limitations, and ways forward
-
Yildiz, M. (2007). E-government research: Reviewing the literature, limitations, and ways forward. Government Information Quarterly, 24, 646-665.
-
(2007)
Government Information Quarterly
, vol.24
, pp. 646-665
-
-
Yildiz, M.1
|