-
1
-
-
67649708310
-
The information security digital divide between information security managers and users
-
Albrechtsen, E. and Hovden, J. 2009. "The information security digital divide between information security managers and users" Computers & Security (28:6), pp 476-490.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 476-490
-
-
Albrechtsen, E.1
Hovden, J.2
-
2
-
-
78650904382
-
-
ABS (Australian Bureau of Statistics)
-
ABS (Australian Bureau of Statistics). 2001. 1321.0-Small Business in Australia.
-
(2001)
1321.0-Small Business in Australia
-
-
-
4
-
-
77956602562
-
Improving Information Security Risk Analysis Practices for Small-and Medium-Sized Enterprises: A Research Agenda Setting Knowledge Free
-
Beachboard. J., Cole, A., Mellor, M. and Hernandez, S. 2008. "Improving Information Security Risk Analysis Practices for Small-and Medium-Sized Enterprises: A Research Agenda Setting Knowledge Free" Journal of Issues in Informing Science and Information Technology (5).
-
(2008)
Journal of Issues in Informing Science and Information Technology
, vol.5
-
-
Beachboard, J.1
Cole, A.2
Mellor, M.3
Hernandez, S.4
-
5
-
-
2342598277
-
Computer Security Impaired by Legitimate Users
-
Besnard, D. and Arief, B. 2004. "Computer Security Impaired by Legitimate Users" Computers & Security (23:1), pp 253-264.
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
6
-
-
78049400376
-
-
BIS (2008), Department of Business, Innovation and Skills, UK
-
BIS (2008) 2008 Information Security Breaches, Department of Business, Innovation and Skills, UK.
-
(2008)
Information Security Breaches
-
-
-
7
-
-
84864555061
-
Exploring Organisational Security Culture: Developing A Comprehensive Research Model
-
Las Vegas, USA
-
Chia, P.A., Maynard, S.B. and Ruighaver, A.B. 2002. "Exploring Organisational Security Culture: Developing A Comprehensive Research Model" Proceedings of IS ONE World Conference, Las Vegas, USA.
-
(2002)
Proceedings of IS ONE World Conference
-
-
Chia, P.A.1
Maynard, S.B.2
Ruighaver, A.B.3
-
8
-
-
67649551429
-
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
-
D'Arcy, J., Hovav, A. and Galletta, D.F. 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach" Information Systems Research (20:1), pp 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.F.3
-
10
-
-
78650889566
-
Approaches to IT Security in Small and Medium Enterprises
-
Perth, Australia
-
Dimopoulos, V., Furnell, S.M., Jennex, M. and Kritharas, I. 2004, "Approaches to IT Security in Small and Medium Enterprises" Proceedings of the 2nd Australian Information Security Management Conference, Perth, Australia.
-
(2004)
Proceedings of the 2nd Australian Information Security Management Conference
-
-
Dimopoulos, V.1
Furnell, S.M.2
Jennex, M.3
Kritharas, I.4
-
11
-
-
84869100091
-
Promoting Security Awareness and Training within Small Organisations
-
Geelong, Australia
-
Furnell, S.M., Gennatou, M. and Dowland, P.S. 2000. "Promoting Security Awareness and Training within Small Organisations" Proceedings of the 1st Australian Information Security Management Workshop, Geelong, Australia.
-
(2000)
Proceedings of the 1st Australian Information Security Management Workshop
-
-
Furnell, S.M.1
Gennatou, M.2
Dowland, P.S.3
-
13
-
-
33749667570
-
An Empirical Investigation of Antecedents of Internet Abuse in the Workplace
-
Seattle, USA
-
Galletta, D.F. and Polak, P. 2003. "An Empirical Investigation of Antecedents of Internet Abuse in the Workplace". Proceedings of AIS SIG-HCI Workshop. Seattle, USA.
-
(2003)
Proceedings of AIS SIG-HCI Workshop.
-
-
Galletta, D.F.1
Polak, P.2
-
14
-
-
15744404682
-
Management of risk in the information age
-
Gerber, M. and von Solms, R. 2005. "Management of risk in the information age" Computers & Security (24:1), pp 16-30.
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 16-30
-
-
Gerber, M.1
von Solms, R.2
-
15
-
-
24144453387
-
Information systems security issues and decisions for small businesses
-
Gupta, A. and Hammond, R. 2005. "Information systems security issues and decisions for small businesses" Information Management & Computer Security (13:4), pp 297-310.
-
(2005)
Information Management & Computer Security
, vol.13
, Issue.4
, pp. 297-310
-
-
Gupta, A.1
Hammond, R.2
-
16
-
-
84869117288
-
-
Seminar Presentation, Institute of Business Information Management, Tampere University of Technology, Finland
-
Helokunnas, T. and Iivonen, I. 2003. Information Security Culture in Small and Medium Size Enterprises, Seminar Presentation, Institute of Business Information Management, Tampere University of Technology, Finland.
-
(2003)
Information Security Culture in Small and Medium Size Enterprises
-
-
Helokunnas, T.1
Iivonen, I.2
-
18
-
-
0002390117
-
Cultural constraints in management theories
-
Hofstede, G. 1991. "Cultural constraints in management theories" The Executive (7:1), pp 81-94.
-
(1991)
The Executive
, vol.7
, Issue.1
, pp. 81-94
-
-
Hofstede, G.1
-
19
-
-
33750513188
-
Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
-
Kraemer, S. and Carayon, P. 2007. "Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists" Applied Ergonomics (38), pp 143-154.
-
(2007)
Applied Ergonomics
, vol.38
, pp. 143-154
-
-
Kraemer, S.1
Carayon, P.2
-
21
-
-
67650166189
-
Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
-
Lee, Y. and Larson, K.R. 2009. "Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software" European Journal of Information Systems (18), pp 177-187.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 177-187
-
-
Lee, Y.1
Larson, K.R.2
-
22
-
-
43149107471
-
A behavioral theory of insider-threat risks: A system dynamics approach
-
Article 7
-
Martinez-Moyano, I.J., Rich, E., Contrad, S., Andersen, D.F. and Stewart, T.R. 2008. "A behavioral theory of insider-threat risks: A system dynamics approach" ACM Transactions on Modeling and Computer Simulation (18:2), Article 7.
-
(2008)
ACM Transactions on Modeling and Computer Simulation
, vol.18
, Issue.2
-
-
Martinez-Moyano, I.J.1
Rich, E.2
Contrad, S.3
Andersen, D.F.4
Stewart, T.R.5
-
24
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Myyry, L., Siponen, M., Pahnila, S., Vertianen, T. and Vance, A. 2009. "What levels of moral reasoning and values explain adherence to information security rules? An empirical study European Journal of Information Systems (18), pp 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vertianen, T.4
Vance, A.5
-
25
-
-
73149093371
-
ICT business management for SMEs
-
December 11. PWC (Price Waterhouse Coopers). 2008. "Safeguarding the New Currency of Business" Price Waterhouse Coopers
-
O'Halloran, J. (2003), "ICT business management for SMEs" Computer Weekly, December 11. PWC (Price Waterhouse Coopers). 2008. "Safeguarding the New Currency of Business" Price Waterhouse Coopers.
-
(2003)
Computer Weekly
-
-
O'Halloran, J.1
-
29
-
-
84869118395
-
-
Symantec, Computerworld, Retrieved 12th May, 2010, from
-
Symantec. 2009. "2009 Global Small and Mid-sized Business (SMB) Security and Storage survey" Computerworld, Retrieved 12th May, 2010, from http://www.computerworld.com.au/article/302806/symantec_survey_reveals_more_than_half_small_midsize d_businesses_australia_new_zealand_experience
-
(2009)
2009 Global Small and Mid-sized Business (SMB) Security and Storage survey
-
-
-
30
-
-
33750923703
-
Cultivating an organizational information security culture
-
Thomson, K., Von Solms, R. and Louw, L. 2006. "Cultivating an organizational information security culture" Computers Fraud & Security (10), pp 7-11.
-
(2006)
Computers Fraud & Security
, vol.10
, pp. 7-11
-
-
Thomson, K.1
von Solms, R.2
Louw, L.3
-
31
-
-
84937310044
-
The influence of national culture on organizational culture: A comparative study between 10 countries
-
Van Muijen, J.J. and Koopman, P.L. 1994. "The influence of national culture on organizational culture: A comparative study between 10 countries" European Journal of Work and Organizational Psychology (4:4), pp 367-380.
-
(1994)
European Journal of Work and Organizational Psychology
, vol.4
, Issue.4
, pp. 367-380
-
-
van Muijen, J.J.1
Koopman, P.L.2
-
33
-
-
0001440837
-
The effects of culture on ethical decision-making: An application of Hofstede's typology
-
Vitell, S. J., Nwachukwu, S. L., and Barnes, J. H. 1993. "The effects of culture on ethical decision-making: An application of Hofstede's typology" Journal of Business Ethics (12), pp 753-760.
-
(1993)
Journal of Business Ethics
, vol.12
, pp. 753-760
-
-
Vitell, S.J.1
Nwachukwu, S.L.2
Barnes, J.H.3
-
34
-
-
73549100231
-
The Emergence of Interpretivism in IS Research
-
Walsham, G. 1995. "The Emergence of Interpretivism in IS Research" Information Systems Research, (6:4), pp. 376-394.
-
(1995)
Information Systems Research
, vol.6
, Issue.4
, pp. 376-394
-
-
Walsham, G.1
-
35
-
-
84868012356
-
Integrating organizational, social, and individual perspectives in Web 2.0-based workplace elearning
-
Wang, M. 2009. "Integrating organizational, social, and individual perspectives in Web 2.0-based workplace elearning" Information Systems Frontiers (9:4), pp 343-358.
-
(2009)
Information Systems Frontiers
, vol.9
, Issue.4
, pp. 343-358
-
-
Wang, M.1
-
36
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
Warkentin, M., and Willison, R. 2009. "Behavioral and policy issues in information systems security: The insider threat" European Journal of Information Systems (18), pp 101-105.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
|