-
2
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avižienis, A.; Laprie, J.-C; Randell, B. and Landwehr C. (2004). Basic Concepts and Taxonomy of Dependable and Secure Computing. In IEEE Transactions on Dependable and Secure Computing, 1 (1), 11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avižienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
4
-
-
70350757761
-
Privacy and security: Usable security: How to get it
-
Butler, L. (2009). Privacy and Security: Usable Security: How to Get It. In Communications of the ACM, 52 (11), 25-27.
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
, pp. 25-27
-
-
Butler, L.1
-
5
-
-
0242650673
-
Taxonomy-based risk identification
-
Carnegie Mellon University
-
Carr, M. J.; Konda, S. L.; Monarch, I.; Ulrich, F. C. and Walker, C. F. (1993). Taxonomy-Based Risk Identification. Technical Report CMU/SEI-93-TR-6, Carnegie Mellon University.
-
(1993)
Technical Report CMU/SEI-93-TR-6
-
-
Carr, M.J.1
Konda, S.L.2
Monarch, I.3
Ulrich, F.C.4
Walker, C.F.5
-
6
-
-
84902749199
-
The handbook of research synthesis and meta-analysis
-
New York, NY, USA
-
Cooper, H.; Hedges, L. V. and Valentine, J. C. (2009). The Handbook of Research Synthesis and Meta-Analysis. 2nd Edition. Russell Sage Foundation, New York, NY, USA.
-
(2009)
2nd Edition. Russell Sage Foundation
-
-
Cooper, H.1
Hedges, L.V.2
Valentine, J.C.3
-
7
-
-
27344447595
-
Information systems outsourcing: A survey and analysis of the literature
-
Dibbern, J.; Goles, T.; Hirschheim, R. and Jayatilaka, B. (2004). Information Systems Outsourcing: A Survey and Analysis of the Literature, In The Data Base for Advances in Information Systems, 35 (4), 6-102.
-
(2004)
The Data Base for Advances in Information Systems
, vol.35
, Issue.4
, pp. 6-102
-
-
Dibbern, J.1
Goles, T.2
Hirschheim, R.3
Jayatilaka, B.4
-
8
-
-
0003113895
-
The risks of outsourcing IT
-
Earl, M. (1996). The Risks of Outsourcing IT, Sloan Management Review, 37 (3), 26-32.
-
(1996)
Sloan Management Review
, vol.37
, Issue.3
, pp. 26-32
-
-
Earl, M.1
-
11
-
-
69549098245
-
The evolution of risk in information systems offshoring: The impact of home country risk, firm learning, and competitive dynamics
-
Hahn, E. D.; Doh, J. and Bunyaratavej, K. (2009). The Evolution of Risk in Information Systems Offshoring: The Impact of Home Country Risk, Firm Learning, and Competitive Dynamics. In MIS Quarterly, 33 (3), 597-616.
-
(2009)
MIS Quarterly
, vol.33
, Issue.3
, pp. 597-616
-
-
Hahn, E.D.1
Doh, J.2
Bunyaratavej, K.3
-
13
-
-
70349118618
-
A review of the IT outsourcing literature: Insights for practice
-
Lacity, M. C.; Khan, S. A. and Willcocks, L. P. (2009). A Review of the IT outsourcing Literature: Insights for Practice, The Journal of Strategic Information Systems, 18 (3), 130-146.
-
(2009)
The Journal of Strategic Information Systems
, vol.18
, Issue.3
, pp. 130-146
-
-
Lacity, M.C.1
Khan, S.A.2
Willcocks, L.P.3
-
14
-
-
33845367600
-
A systems approach to conduct an effective literature review in support of information systems research
-
Levy, Y. and Ellis, T. J. (2006) A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research. In Informing Science Journal, 9, 181-212.
-
(2006)
Informing Science Journal
, vol.9
, pp. 181-212
-
-
Levy, Y.1
Ellis, T.J.2
-
16
-
-
77952500117
-
A generic metamodel for IT security: Attack modeling for distributed systems
-
Miede, A.; Nedyalkov, N.; Gottron, C.; König, A.; Repp, N. and Steinmetz, R. (2010). A Generic Metamodel for IT Security: Attack Modeling for Distributed Systems. In Proceedings of the Fifth International Conference on Availability, Reliability, and Security (ARES 2010), 430-437.
-
(2010)
Proceedings of the Fifth International Conference on Availability, Reliability, and Security (ARES 2010)
, pp. 430-437
-
-
Miede, A.1
Nedyalkov, N.2
Gottron, C.3
König, A.4
Repp, N.5
Steinmetz, R.6
-
17
-
-
18644364302
-
The Q-sort method: Assessing reliability and construct validity of questionnaire items at a pre-testing stage
-
Nahm, A.; Solís-Galván, L. E.; Rao, S. S. and Ragu-Nathan, T. S. (2002). The Q-Sort Method: Assessing Reliability and Construct Validity of Questionnaire Items at a Pre-Testing Stage. In Journal of Modern Applied Statistical Methods, 1 (1), 114-125.
-
(2002)
Journal of Modern Applied Statistical Methods
, vol.1
, Issue.1
, pp. 114-125
-
-
Nahm, A.1
Solís-Galván, L.E.2
Rao, S.S.3
Ragu-Nathan, T.S.4
-
20
-
-
0003885423
-
-
8th edition. Addison-Wesley, Boston, MA, USA
-
Sommerville, I. (2006). Software Engineering. 8th edition. Addison-Wesley, Boston, MA, USA.
-
(2006)
Software Engineering
-
-
Sommerville, I.1
-
21
-
-
15744400789
-
Risk identification: Basic stage in risk management
-
Tchankova, L. (2002). Risk Identification: Basic Stage in Risk Management. In Environmental Management and Health 13 (3), 290-297.
-
(2002)
Environmental Management and Health
, vol.13
, Issue.3
, pp. 290-297
-
-
Tchankova, L.1
-
22
-
-
84870674396
-
Reconstructing the giant: On the importance of rigour in documenting the literature search process
-
Verona (Italy)
-
vom Brocke, J.; Simons, A.; Niehaves, B.; Riemer, K.; Plattfaut, R. and Cleven, A. (2009). Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process. In Proceedings of the 17th European Conference on Information Systems (ECIS), Verona (Italy).
-
(2009)
Proceedings of the 17th European Conference on Information Systems (ECIS)
-
-
Vom Brocke, J.1
Simons, A.2
Niehaves, B.3
Riemer, K.4
Plattfaut, R.5
Cleven, A.6
-
23
-
-
84856366972
-
Cloud computing: A classification, business models, and research directions
-
Weinhardt, C.; Anandasivam, A.; Blau, B.; Borissov, N.; Meinl, T.; Michalk, W. and Stößer, J. (2009). Cloud Computing: A Classification, Business Models, and Research Directions. Business & Information Systems Engineering, 5 (1), 391-399.
-
(2009)
Business & Information Systems Engineering
, vol.5
, Issue.1
, pp. 391-399
-
-
Weinhardt, C.1
Anandasivam, A.2
Blau, B.3
Borissov, N.4
Meinl, T.5
Michalk, W.6
Stößer, J.7
|