-
3
-
-
1642568964
-
Manage people to protect data
-
Andress, M. (2000), "Manage people to protect data", InfoWorld, Vol. 22, No. 46.
-
(2000)
InfoWorld
, vol.22
, Issue.46
-
-
Andress, M.1
-
5
-
-
84861367831
-
After the storm, reform
-
available at (accessed 19 October 2004)
-
Berinato, S. (2003), "After the storm, reform", CIO Magazine, available at: www.cio.com/archive/121503/securityfuture.html (accessed 19 October 2004).
-
(2003)
CIO Magazine
-
-
Berinato, S.1
-
7
-
-
74449090955
-
Enterprise strategies: Advice for a secure enterprise: Implement the basics and see that everyone uses them
-
November
-
Borck, J.R. (2000), "Enterprise strategies: advice for a secure enterprise: implement the basics and see that everyone uses them", InfoWorld, Vol. 22, No. 46, November.
-
(2000)
InfoWorld
, vol.22
, Issue.46
-
-
Borck, J.R.1
-
8
-
-
0004144860
-
-
A National Standard for Canada (CAN/CSA-Q850-97), available at Q850 CAN/CSA
-
CAN/CSA Q850 (1997), Risk Management: Guideline for Decision Makers, A National Standard for Canada (CAN/CSA-Q850-97), available at: http://riskreports.com/standards.html.
-
(1997)
Risk Management: Guideline for Decision Makers
-
-
-
9
-
-
69049092843
-
-
available at Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA
-
Caralli, R.A. and Wilson, W.R. (2003), The Challenges of Security Management, Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA, available at: www.cert.org/archive/pdf/Esmchallenges.pdf.
-
(2003)
The Challenges of Security Management
-
-
Caralli, R.A.1
Wilson, W.R.2
-
10
-
-
84964129375
-
The principles of socio-technical design
-
Cherns, A. (1976), "The principles of socio-technical design" in Human Relations, Vol. 2, No. 9, pp. 783-92.
-
(1976)
Human Relations
, vol.2
, Issue.9
, pp. 783-792
-
-
Cherns, A.1
-
11
-
-
17144374173
-
-
ISACA, 1997, available at Information Systems, Audit, and Control Foundation, Rolling Meadows, IL
-
COBIT (2000), Control Objectives for Information and Related Technology: Management Guidelines, Information Systems, Audit, and Control Foundation, Rolling Meadows, IL, ISACA, 1997, available at: www.isaca.org/cobit.htm.
-
(2000)
Control Objectives for Information and Related Technology: Management Guidelines
-
-
-
12
-
-
33644586451
-
-
ISACA, 1997, available at Information Systems, Audit, and Control Foundation, Rolling Meadows, IL COBIT
-
COBIT (2002), Control Objectives for Information and Related Technology, Information Systems, Audit, and Control Foundation, Rolling Meadows, IL, ISACA, 1997, available at: www.isaca.org/cobit.htm.
-
(2002)
Control Objectives for Information and Related Technology
-
-
-
14
-
-
15744402565
-
-
available at (accessed 20 January 2004) Delloitte and Touche
-
Delloitte & Touche (2002), Management Briefing - Information Security, available at: www.deloitte.com/dtt/cda/doc/content/info_security(1).pdf (accessed 20 January 2004).
-
(2002)
Management Briefing - Information Security
-
-
-
16
-
-
23044525969
-
Current direction in IS security research: Toward socio-technical perspectives
-
Dhillon, G. and Backhouse, J. (2001), "Current direction in IS security research: toward socio-technical perspectives" in Information System, Vol. 11, No. 2, pp. 127-53.
-
(2001)
Information System
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
17
-
-
64949182767
-
Employing the social-technical perspective in identifying security management systems in organisations
-
Dzazali, S., Ainin, S. and Zolait, A.H.S. (2009), "Employing the social-technical perspective in identifying security management systems in organisations" in International Journal of Business Information Systems, Vol. 4, No. 4, pp. 419-39.
-
(2009)
International Journal of Business Information Systems
, vol.4
, Issue.4
, pp. 419-439
-
-
Dzazali, S.1
Ainin, S.2
Zolait, A.H.S.3
-
19
-
-
0034158883
-
Information security management: A hierarchical framework for various approaches
-
Eloff, M.M. and Solms, S.H. (2000), "Information security management: a hierarchical framework for various approaches" in Computers and Security, Vol. 19, No. 3, pp. 243-56.
-
(2000)
Computers and Security
, vol.19
, Issue.3
, pp. 243-256
-
-
Eloff, M.M.1
Solms, S.H.2
-
21
-
-
64949122788
-
Information security: A strategic issue
-
Hanley Management College, UK and Dataföreningen, Sweden, available at
-
Ezingeard, J.N. and Bowen-Schrire, M. (2003), "Information security: a strategic issue", A Conjoint Report Study, Hanley Management College, UK and Dataföreningen, Sweden, available at: www.henley.se.
-
(2003)
A Conjoint Report Study
-
-
Ezingeard, J.N.1
Bowen-Schrire, M.2
-
22
-
-
84861391996
-
Are we securing the right information?
-
Firth, D. (1993), "Are we securing the right information?" in Proceedings of the Tenth World Conference on Computer Security, COMPSEC'93, London, May, Elsevier Advanced Technology, pp. 68-73.
-
(1993)
Proceedings of the Tenth World Conference on Computer Security, COMPSEC'93, London, May, Elsevier Advanced Technology
, pp. 68-73
-
-
Firth, D.1
-
23
-
-
84861390230
-
-
available at IEEE database (accessed 15 February 2005)
-
Fletcher, S.K., Jansma, R.M., Lim, J.J., Halbgewachs, R., Murphy, M.D. and Wyss, G.D. (1995), "Software system risk management and assurance", available at: IEEE database (accessed 15 February 2005).
-
(1995)
Software system risk management and assurance
-
-
Fletcher, S.K.1
Jansma, R.M.2
Lim, J.J.3
Halbgewachs, R.4
Murphy, M.D.5
Wyss, G.D.6
-
24
-
-
0042363355
-
The application of information security policies in large UK-based organisations: An exploratory investigation
-
Fulford, H. and Doherty, N.F. (2003), "The application of information security policies in large UK-based organisations: an exploratory investigation" in Information Management & Computer Security, Vol. 11, No. 3, pp. 106-14.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
25
-
-
0034318873
-
Practical approaches to creating a security culture
-
Gaunt, N. (2000), "Practical approaches to creating a security culture" in International Journal of Medical Information, Vol. 60, No. 2, pp. 151-7.
-
(2000)
International Journal of Medical Information
, vol.60
, Issue.2
, pp. 151-157
-
-
Gaunt, N.1
-
26
-
-
3242808612
-
-
available at
-
Gordon, L.A., Loeb, G.M., Lucyshyn, W. and Richardson, R. (2004), 9th Annual FBI/CSI Computer Crime and Security Survey 2004, available at: http://GoCSI.com.
-
(2004)
9th Annual FBI/CSI Computer Crime and Security Survey 2004
-
-
Gordon, L.A.1
Loeb, G.M.2
Lucyshyn, W.3
Richardson, R.4
-
28
-
-
0345327795
-
An integrated system theory of information security management
-
Hong, K.S., Chi, Y.P., Chao, L.R. and Tang, J.H. (2003), "An integrated system theory of information security management" in Information Management & Computer Security, Vol. 11, No. 5, pp. 243-448.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.5
, pp. 243-448
-
-
Hong, K.S.1
Chi, Y.P.2
Chao, L.R.3
Tang, J.H.4
-
29
-
-
15744399767
-
The impact of denial-of-service attack announcements on the market value of firms
-
Hovav, A. and D'Arcy, J. (2003), "The impact of denial-of-service attack announcements on the market value of firms" in Risk Management & Insurance Review, Vol. 6, No. 2, p. 97.
-
(2003)
Risk Management & Insurance Review
, vol.6
, Issue.2
, pp. 97
-
-
Hovav, A.1
D'Arcy, J.2
-
31
-
-
25644456506
-
-
IT Governance Institute, available at (accessed 11 August 2004) ITGI
-
ITGI (2003), "Board briefing on IT governance", IT Governance Institute, available at: www.itgi.org (accessed 11 August 2004).
-
(2003)
Board briefing on IT governance
-
-
-
34
-
-
1842594695
-
-
Pearson Education, Upper Saddle River, NJ, 3rd ed
-
Jessup, L. and Valacich, J. (2008), Information Systems Today: Managing in the Digital World, 3rd ed., Pearson Education, Upper Saddle River, NJ.
-
(2008)
Information Systems Today: Managing in the Digital World
-
-
Jessup, L.1
Valacich, J.2
-
35
-
-
84861372526
-
-
Malaysian Public Service Department (Jabatan Perkhidmatan Awam Malaysia) JPA
-
JPA (2005), Malaysian Public Service Department (Jabatan Perkhidmatan Awam Malaysia). Proceedings of Public Service Conference 2005.
-
(2005)
Proceedings of Public Service Conference 2005
-
-
-
36
-
-
0030485823
-
Evolutionary software development to support organisational and business process change: A case study account
-
Kawalek, P. and Leonard, J. (1996), "Evolutionary software development to support organisational and business process change: a case study account" in Journal of Information Technology, Vol. 11, pp. 185-98.
-
(1996)
Journal of Information Technology
, vol.11
, pp. 185-198
-
-
Kawalek, P.1
Leonard, J.2
-
37
-
-
84861416141
-
Does risk matter?
-
September, available at (accessed 27 March 2003)
-
Kloman, F. (2000), "Does risk matter?", Risk Management Report, September, available at: www.riskreports.com/htdocs/riskmatter.html (accessed 27 March 2003).
-
(2000)
Risk Management Report
-
-
Kloman, F.1
-
38
-
-
12344297038
-
-
Report Series No. 94-004, Department of Computer and Systems Science, Stockholm University
-
Kowalski, S. (1994), "IT security: a multi-disciplinary inquiry", Department of Computer and Systems Science, Stockholm University, Stockholm, Report Series No. 94-004.
-
(1994)
IT security: A multi-disciplinary inquiry
-
-
Kowalski, S.1
-
41
-
-
84861380073
-
-
Malaysian Administrative Modernization and Management Planning Unit, Malaysia Public Service ICT Strategic Plan Executive Summary, available at MAMPU
-
MAMPU (2005), HiLRA: Malaysian Public Service Information Security High Level Risk Assessment Guide, Malaysian Administrative Modernization and Management Planning Unit, Malaysia Public Service ICT Strategic Plan Executive Summary, available at: www.mampu.gov.my.
-
(2005)
HiLRA: Malaysian Public Service Information Security High Level Risk Assessment Guide
-
-
-
49
-
-
0036434179
-
Towards maturity of information security maturity criteria: Six lessons learned from software maturity criteria
-
Siponen, M. (2002), "Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria" in Information Management & Computer Security, Vol. 10, No. 5, pp. 210-24.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.5
, pp. 210-224
-
-
Siponen, M.1
-
50
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
Siponen, M. (2005), "Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods" in Information and Organization, Vol. 15, No. 4, pp. 339-75.
-
(2005)
Information and Organization
, vol.15
, Issue.4
, pp. 339-375
-
-
Siponen, M.1
-
51
-
-
0033657872
-
Information security - the third wave?
-
Solms, B. (2000), "Information security - the third wave?" in Computers and Security, Vol. 19, No. 7, pp. 615-20.
-
(2000)
Computers and Security
, vol.19
, Issue.7
, pp. 615-620
-
-
Solms, B.1
-
52
-
-
3042812983
-
The 10 deadly sins of information security
-
Solms, B. and Solms, R. (2004), "The 10 deadly sins of information security" in Computers and Security, Vol. 23, No. 5, pp. 371-6.
-
(2004)
Computers and Security
, vol.23
, Issue.5
, pp. 371-376
-
-
Solms, B.1
Solms, R.2
-
53
-
-
4244212052
-
Driving safely on the information superhighway
-
Solms, R. (1997), "Driving safely on the information superhighway" in Information Management & Computer Security, Vol. 5, No. 1, pp. 20-2.
-
(1997)
Information Management & Computer Security
, vol.5
, Issue.1
, pp. 20-22
-
-
Solms, R.1
-
54
-
-
69049085711
-
-
available at (accessed 24 July 2004)
-
Sommer (2003), "How to buy information security", available at: www.virtualcity.co.uk.hottobuy.htm (accessed 24 July 2004).
-
(2003)
How to buy information security
-
-
Sommer1
-
55
-
-
2542492057
-
-
available at (accessed 20 January 2005), Carnegie Mellon University, Pittsburgh, PA SSE-CMM
-
SSE-CMM (2003), System Security Engineering Capability Maturity Model V3.0, Carnegie Mellon University, Pittsburgh, PA, available at: www.sse-ccm.org/model/model.asp (accessed 20 January 2005).
-
(2003)
System Security Engineering Capability Maturity Model V3.0
-
-
-
56
-
-
0011587363
-
Information security program maturity grid
-
Stacey, T.R. (1996), "Information security program maturity grid" in Information System Security, Vol. 5, No. 1, pp. 22-33.
-
(1996)
Information System Security
, vol.5
, Issue.1
, pp. 22-33
-
-
Stacey, T.R.1
-
57
-
-
15744368808
-
Information security obedience: A definition
-
Thomson, K. and Solms, R. (2005), "Information security obedience: a definition" in Computers & Security, Vol. 24, pp. 69-75.
-
(2005)
Computers & Security
, vol.24
, pp. 69-75
-
-
Thomson, K.1
Solms, R.2
-
58
-
-
0002332952
-
The socio-technical perspective
-
Van de Ven, A., Joyce, W.F. (Eds.), Wiley, New York, NY
-
Trist, E. (1981), "The socio-technical perspective" in Van de Ven, A. and Joyce, W.F. (Eds.), Perspectives on Organisational Design and Behaviour, Wiley, New York, NY, pp. 19-75.
-
(1981)
Perspectives on Organisational Design and Behaviour
, pp. 19-75
-
-
Trist, E.1
-
59
-
-
0003725488
-
-
Pearson Education, Upper Saddle River, NJ, International edition
-
Turban, E., King, D., Lee, J. and Viehland, D. (2004) in Electronic Commerce 2004 - Managerial Perspective, International edition, Pearson Education, Upper Saddle River, NJ, pp. 1-34.
-
(2004)
Electronic Commerce 2004 - Managerial Perspective
, pp. 1-34
-
-
Turban, E.1
King, D.2
Lee, J.3
Viehland, D.4
-
60
-
-
33645209293
-
How software project risk affects project performance: An investigation of the dimensions of risk and an exploratory model
-
Wallace, L., Keil, M. and Rai, A. (2004), "How software project risk affects project performance: an investigation of the dimensions of risk and an exploratory model" in Decision Sciences, Vol. 35, No. 2, pp. 289-320.
-
(2004)
Decision Sciences
, vol.35
, Issue.2
, pp. 289-320
-
-
Wallace, L.1
Keil, M.2
Rai, A.3
-
61
-
-
2942588778
-
The role of motivation and risk behaviour in software development success
-
available at (accessed 7 February 2010)
-
Walsh, K.R. and Schneider, H. (2002), "The role of motivation and risk behaviour in software development success", Information Research, Vol. 7, No. 3, available at: http://informationr.net/ir/7-3/paper129.html (accessed 7 February 2010).
-
(2002)
Information Research
, vol.7
, Issue.3
-
-
Walsh, K.R.1
Schneider, H.2
-
63
-
-
84950138461
-
The concept of security: An agenda for comparative analysis
-
Zedner, L. (2003), "The concept of security: an agenda for comparative analysis" in Legal Studies, Vol. 23, March, pp. 154-76.
-
(2003)
Legal Studies
, vol.23
, pp. 154-176
-
-
Zedner, L.1
-
64
-
-
0003506109
-
-
Macmillan, New York, NY, 5th ed
-
Hair, J.F., Anderson, R., Tatham, R.L. and Black, W.C. (1998), Multivariate Data Analysis, 5th ed., Macmillan, New York, NY.
-
(1998)
Multivariate Data Analysis
-
-
Hair, J.F.1
Anderson, R.2
Tatham, R.L.3
Black, W.C.4
|