-
4
-
-
55249084997
-
The case research strategy in studies of information systems
-
I. Benbasat, D.K. Goldstein, and M. Mead The case research strategy in studies of information systems MIS Quarterly 11 3 1987 369 386
-
(1987)
MIS Quarterly
, vol.11
, Issue.3
, pp. 369-386
-
-
Benbasat, I.1
Goldstein, D.K.2
Mead, M.3
-
8
-
-
84862282704
-
-
D.L. Cooke, M. Dubetz, R. Heshmati, S. Iftody, E. McKimmon, and J. Powers A reference guide for learning from incidents in radiation treatment 2006 www.ihe.ca/documents/HTA-FR22.pdf
-
(2006)
A Reference Guide for Learning from Incidents in Radiation Treatment
-
-
Cooke, D.L.1
Dubetz, M.2
Heshmati, R.3
Iftody, S.4
McKimmon, E.5
Powers, J.6
-
9
-
-
0346705821
-
Successfully completing case study research: Combining rigour, relevance and pragmatism
-
P. Darke, G. Shanks, and M. Broadbent Successfully completing case study research: combining rigour, relevance and pragmatism Information Systems Journal 8 1998 273 289
-
(1998)
Information Systems Journal
, vol.8
, pp. 273-289
-
-
Darke, P.1
Shanks, G.2
Broadbent, M.3
-
10
-
-
23044525969
-
Current directions in IS security research: Towards soci-organizational perspectives
-
G. Dhillon, and J. Backhouse Current directions in IS security research: towards soci-organizational perspectives Information Systems Journal 11 2 2001 127 153
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
12
-
-
84862276697
-
Organizations should build an incident response team
-
V. Jaikumar Organizations should build an incident response team ComputerWorld Canada 9 16 2002
-
(2002)
ComputerWorld Canada
, vol.9
, Issue.16
-
-
Jaikumar, V.1
-
16
-
-
0000504475
-
The link between individual and organizational learning
-
D.H. Kim The link between individual and organizational learning Sloan Management Review 35 1993 37 50
-
(1993)
Sloan Management Review
, vol.35
, pp. 37-50
-
-
Kim, D.H.1
-
17
-
-
0343472276
-
-
K.-P. Kossakowski, J. Allen, C. Alberts, C. Cohen, G. Ford, and B. Fraser Responding to intrusions 1999 http://www.potaroo.net/t4/docs/sim006.pdf
-
(1999)
Responding to Intrusions
-
-
Kossakowski, K.-P.1
Allen, J.2
Alberts, C.3
Cohen, C.4
Ford, G.5
Fraser, B.6
-
21
-
-
33746748784
-
On Incident Handling and Response: A state-of-the-art approach
-
DOI 10.1016/j.cose.2005.09.006, PII S0167404805001574
-
S. Mitropolous, D. Patsos, and C. Douligeris On incident handling and response: a state-of-the-art approach Computers and Security 25 2006 351 370 (Pubitemid 44160526)
-
(2006)
Computers and Security
, vol.25
, Issue.5
, pp. 351-370
-
-
Mitropoulos, S.1
Patsos, D.2
Douligeris, C.3
-
24
-
-
33947223504
-
Investigative response: After the breach
-
DOI 10.1016/j.cose.2006.08.012, PII S016740480600143X
-
C.J. Novak Investigative response: after the breach Computers and Security 26 2 2007 183 185 (Pubitemid 46415620)
-
(2007)
Computers and Security
, vol.26
, Issue.2
, pp. 183-185
-
-
Novak, C.J.1
-
25
-
-
84862276694
-
-
SANS Institute. Computer security incident handling step by step
-
SANS Institute. Computer security incident handling step by step. Available from: http://www.sans.org; n.d.
-
-
-
-
28
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
M. Siponen Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods Information and Organization 15 2005
-
(2005)
Information and Organization
, vol.15
-
-
Siponen, M.1
-
29
-
-
84862288478
-
Forming an incident response team
-
University of Queensland Brisbane, Australia
-
D. Smith Forming an incident response team Proceedings of the FIRST Annual Conference July 1994 University of Queensland Brisbane, Australia
-
(1994)
Proceedings of the FIRST Annual Conference
-
-
Smith, D.1
-
30
-
-
0037390323
-
Conducting incident post mortems
-
DOI 10.1016/S1361-3723(03)04012-0, PII S1361372303040120
-
P. Stephenson Conducting incident post mortems Computer Fraud and Security 4 3 2003 16 19 Elsevier (Pubitemid 36442642)
-
(2003)
Computer Fraud and Security
, vol.2003
, Issue.4
, pp. 16-19
-
-
Stephenson, P.1
-
34
-
-
84974872728
-
Interpretive case studies in IS research: Nature and method
-
G. Walsham Interpretive case studies in IS research: nature and method European Journal of Information Systems 4 1995 74 81
-
(1995)
European Journal of Information Systems
, vol.4
, pp. 74-81
-
-
Walsham, G.1
-
36
-
-
77949522891
-
Preparation, detection, and analysis: The diagnostic work of IT security incident response
-
R. Werlinger Preparation, detection, and analysis: the diagnostic work of IT security incident response Information Management and Computer Security 18 1 2010 26 42
-
(2010)
Information Management and Computer Security
, vol.18
, Issue.1
, pp. 26-42
-
-
Werlinger, R.1
-
39
-
-
0003673547
-
-
3rd ed. Sage Publications Thousand Oaks
-
R. Yin Case study research 3rd ed. 2003 Sage Publications Thousand Oaks
-
(2003)
Case Study Research
-
-
Yin, R.1
|