-
4
-
-
0036398120
-
Policy enforcement in the workplace
-
David, J. (2002). Policy enforcement in the workplace. Computers and Security, 21(6), 506513.
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 506513
-
-
David, J.1
-
5
-
-
0042985337
-
-
Ernst and Young LLP, Presentation Services
-
Ernst and Young LLP. (2002). Global information security survey. Presentation Services.
-
(2002)
Global Information Security Survey
-
-
-
6
-
-
84898196282
-
Using security assessment interviews to predict organizational security status
-
Las Vegas, NV
-
Fagnot, I. J., & Stanton, J. M. (2006). Using security assessment interviews to predict organizational security status. The Security Conference, Las Vegas, NV.
-
(2006)
The Security Conference
-
-
Fagnot, I.J.1
Stanton, J.M.2
-
7
-
-
84898103441
-
Computer system sabotage in critical infrastructure sectors
-
Insider hreat study, Software Engineering Institute, Carnegie-Mellon University
-
Keeney, M.M., Kowalski, E.F., Cappelli, D.M., Moore, A.P., Shimeall, T.J., and Rogers, S.N. (2005). Insider hreat study: Computer system sabotage in critical infrastructure sectors. National Threat Assessment Center, United States Secret Service; CERT® Program, Software Engineering Institute, Carnegie-Mellon University.
-
(2005)
National Threat Assessment Center, United States Secret Service; CERT® Program
-
-
Keeney, M.M.1
Kowalski, E.F.2
Cappelli, D.M.3
Moore, A.P.4
Shimeall, T.J.5
Rogers, S.N.6
-
8
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic, A. G., & Clark, G. J. (2004). Why there aren't more information security research studies. Information & Management, 41, 597-607.
-
(2004)
Information & Management
, vol.41
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, G.J.2
-
11
-
-
0035387175
-
Transforming the "weakest link": A human/computer interaction approach to usable and effective security
-
Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the "weakest link": A human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122-131.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
12
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E. E. (2002). A framework for understanding and predicting insider attacks. Computers and Security, 21(6), 526-531.
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
13
-
-
84898163827
-
-
Paper presented at the 2005 American Anthropological Association Annual Meetings, Washington, DC
-
Stam, K., Guzman, I., Fagnot, I., & Stanton, J. (2005). What's your password? The experience of fieldworkers using ethnographic methods to study information technology in work organizations. Paper presented at the 2005 American Anthropological Association Annual Meetings, Washington, DC.
-
(2005)
What's Your Password? The Experience of Fieldworkers Using Ethnographic Methods to Study Information Technology In Work Organizations
-
-
Stam, K.1
Guzman, I.2
Fagnot, I.3
Stanton, J.4
-
15
-
-
17844366573
-
An analysis of end user security behaviors
-
Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). An analysis of end user security behaviors. Computers and Security, 24, 124-133.
-
(2005)
Computers and Security
, vol.24
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
16
-
-
84898288035
-
The madness of crowds: Employees beliefs about information security in relation to security outcomes
-
Las Vegas, NV
-
Stanton, J. M., Yamodo-Fagnot, I., & Stam, K. R. (2005). The madness of crowds: Employees beliefs about information security in relation to security outcomes. The Security Conference, Las Vegas, NV.
-
(2005)
The Security Conference
-
-
Stanton, J.M.1
Yamodo-Fagnot, I.2
Stam, K.R.3
-
17
-
-
84898236267
-
information systems security governance research: A behavioral perspective
-
Albany, NY
-
Sushma, M., & Dhillon, G. (2006). information systems security governance research: A behavioral perspective. NYS Cyber Security Conference (NYS CSIS), Albany, NY.
-
(2006)
NYS Cyber Security Conference (NYS CSIS)
-
-
Sushma, M.1
Dhillon, G.2
-
18
-
-
35048892579
-
-
Presented at The Second NSF/NIJ Symposium on Intelligence and Security Informatics (ISI), Tucson, AZ
-
Symonenko, S., Liddy, E. D., Yilmazel, O., Del Soppo, R., Brown, E., & Downey, M. (2004). Semantic analysis for monitoring insider threats. Presented at The Second NSF/NIJ Symposium on Intelligence and Security Informatics (ISI). Tucson, AZ.
-
(2004)
Semantic Analysis For Monitoring Insider Threats
-
-
Symonenko, S.1
Liddy, E.D.2
Yilmazel, O.3
Del Soppo, R.4
Brown, E.5
Downey, M.6
|