-
1
-
-
76649107801
-
The insider threat
-
Aldhizer G. The insider threat. Intern Audit 2008, 65(2):71-73.
-
(2008)
Intern Audit
, vol.65
, Issue.2
, pp. 71-73
-
-
Aldhizer, G.1
-
2
-
-
77249085149
-
How internet users' privacy concerns have evolved since 2002
-
Antón A., Earp J.B., Young J. How internet users' privacy concerns have evolved since 2002. IEEE Security and Privacy 2010, 8:21-27.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 21-27
-
-
Antón, A.1
Earp, J.B.2
Young, J.3
-
3
-
-
73449102898
-
Costs of enterprise resource planning system implementation - and then some
-
Babey E. Costs of enterprise resource planning system implementation - and then some. New Dir High Educ 2006, 136:21-33.
-
(2006)
New Dir High Educ
, vol.136
, pp. 21-33
-
-
Babey, E.1
-
4
-
-
77954717694
-
Assurance for federated identity management
-
Baldwin A., Mont M.C., Beres Y., Shiu S. Assurance for federated identity management. J Computer Sec 2010, 18(4):519-550.
-
(2010)
J Computer Sec
, vol.18
, Issue.4
, pp. 519-550
-
-
Baldwin, A.1
Mont, M.C.2
Beres, Y.3
Shiu, S.4
-
5
-
-
34548482723
-
Enhancing IT governance practices: a model and case study of an organization's efforts
-
Bowen P.L., Cheung M.D., Rohde F.H. Enhancing IT governance practices: a model and case study of an organization's efforts. Int J Account Inf Syst 2007, 8:191-221.
-
(2007)
Int J Account Inf Syst
, vol.8
, pp. 191-221
-
-
Bowen, P.L.1
Cheung, M.D.2
Rohde, F.H.3
-
7
-
-
0041707991
-
Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems
-
Bradford M., Florin J. Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems. Int J Account Inf Syst 2003, 4(3):205-225.
-
(2003)
Int J Account Inf Syst
, vol.4
, Issue.3
, pp. 205-225
-
-
Bradford, M.1
Florin, J.2
-
8
-
-
70449717568
-
The effect of ERP system implementations on the management of earnings and earnings release dates
-
Brazel J., Dang L. The effect of ERP system implementations on the management of earnings and earnings release dates. J Inf Syst 2008, 22(2):1-21.
-
(2008)
J Inf Syst
, vol.22
, Issue.2
, pp. 1-21
-
-
Brazel, J.1
Dang, L.2
-
9
-
-
33745692304
-
Toward a biometric security layer in accounting systems
-
Chandra A., Calderon T.G. Toward a biometric security layer in accounting systems. J Inf Syst 2003, 17(2):51-70.
-
(2003)
J Inf Syst
, vol.17
, Issue.2
, pp. 51-70
-
-
Chandra, A.1
Calderon, T.G.2
-
10
-
-
46749150468
-
Case study research in accounting
-
Cooper D.J., Morgan W. Case study research in accounting. Account Horizons 2008, 22(2):159-178.
-
(2008)
Account Horizons
, vol.22
, Issue.2
, pp. 159-178
-
-
Cooper, D.J.1
Morgan, W.2
-
11
-
-
84900555761
-
The adoption of single sign-on and multifactor authentication in organisations - a critical evaluation using TOE framework
-
D'Costa-Alphonso M., Lane M. The adoption of single sign-on and multifactor authentication in organisations - a critical evaluation using TOE framework. Issues Informing Sci Inf Technol 2010, 7:161-189.
-
(2010)
Issues Informing Sci Inf Technol
, vol.7
, pp. 161-189
-
-
D'Costa-Alphonso, M.1
Lane, M.2
-
12
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 1989, 13(3):319-339.
-
(1989)
MIS Q
, vol.13
, Issue.3
, pp. 319-339
-
-
Davis, F.D.1
-
13
-
-
84936823933
-
User acceptance of computer technology: a comparison of two theoretical models
-
Davis F.D., Bagozzi R.P., Warshaw P.R. User acceptance of computer technology: a comparison of two theoretical models. Manag Sci 1989, 35(8):982-1003.
-
(1989)
Manag Sci
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
14
-
-
3943076943
-
The context for change: organization, technology, and environment
-
Lexington Books, New York (NY), F. Tornatzky (Ed.)
-
DePietro R., Wiarda E., Fleischer M. The context for change: organization, technology, and environment. The processes of technological innovation 1990, 151-175. Lexington Books, New York (NY). F. Tornatzky (Ed.).
-
(1990)
The processes of technological innovation
, pp. 151-175
-
-
DePietro, R.1
Wiarda, E.2
Fleischer, M.3
-
15
-
-
1242287852
-
Guest Editorial: the challenge of managing information security
-
Dhillon G. Guest Editorial: the challenge of managing information security. Int J of Info Mgmt 2004, 24:3-4.
-
(2004)
Int J of Info Mgmt
, vol.24
, pp. 3-4
-
-
Dhillon, G.1
-
16
-
-
0036696722
-
Knowledge management in practice: three contemporary case studies
-
Dilnutt R. Knowledge management in practice: three contemporary case studies. Int J Account Inf Syst 2002, 3:75-81.
-
(2002)
Int J Account Inf Syst
, vol.3
, pp. 75-81
-
-
Dilnutt, R.1
-
17
-
-
84900562627
-
The impact of governance on identity management programs
-
Available:. Accessed:29.09.2013]
-
Etges R. The impact of governance on identity management programs. ISACA J 2011, 5:1-4. [Available:http://www.isaca.org/Journal/Past-Issues/2011/Volume-5/Pages/The-Impact-of-Governance-on-Identity-Management-Programs.aspx. Accessed:29.09.2013].
-
(2011)
ISACA J
, vol.5
, pp. 1-4
-
-
Etges, R.1
-
18
-
-
0004180877
-
-
University of North Carolina Press, Chapel Hill (NC), J. Feagin, A. Orum, G. Sjoberg (Eds.)
-
A case for case study 1991, University of North Carolina Press, Chapel Hill (NC). J. Feagin, A. Orum, G. Sjoberg (Eds.).
-
(1991)
A case for case study
-
-
-
19
-
-
70349243055
-
Estimating the market impact of security breach announcements on firm values
-
Goel S., Shawky H.A. Estimating the market impact of security breach announcements on firm values. Inf Manag 2009, 46:404-410.
-
(2009)
Inf Manag
, vol.46
, pp. 404-410
-
-
Goel, S.1
Shawky, H.A.2
-
20
-
-
79961163255
-
A review of ERP research: a future agenda for accounting information systems
-
Grabski S.V., Leech S.A., Schmidt P.J. A review of ERP research: a future agenda for accounting information systems. J Inf Syst 2011, 25:37-78.
-
(2011)
J Inf Syst
, vol.25
, pp. 37-78
-
-
Grabski, S.V.1
Leech, S.A.2
Schmidt, P.J.3
-
21
-
-
84900526925
-
Managing identities in hybrid worlds
-
Gregory P.H. Managing identities in hybrid worlds. Info Sec. 2013, 15(3):14-19. [http://media.techtarget.com/deu/april_ism_109109.html].
-
(2013)
Info Sec.
, vol.15
, Issue.3
, pp. 14-19
-
-
Gregory, P.H.1
-
22
-
-
84900547467
-
Making the case for enterprise IAM centralized access control
-
Griffeth D. Making the case for enterprise IAM centralized access control. Technical guide on managing identities and access control 2010, 3-4. [http://viewer.media.bitpipe.com/1276198763_637/1293124694_93/1217_ISM_eB_ManagingIdentityAccess.pdf].
-
(2010)
Technical guide on managing identities and access control
, pp. 3-4
-
-
Griffeth, D.1
-
23
-
-
0034240041
-
Design and specification of role based access control policies
-
Hitchens M., Varadharajan V. Design and specification of role based access control policies. Software IEEE Proc 2000, 147(4):117-129.
-
(2000)
Software IEEE Proc
, vol.147
, Issue.4
, pp. 117-129
-
-
Hitchens, M.1
Varadharajan, V.2
-
24
-
-
84900533473
-
-
[Available: Accessed:20.08.13], InCommon
-
InCommon InCommon Federation [Available: http://www.incommonfederation.org/federation/. Accessed:20.08.13].
-
InCommon Federation
-
-
-
25
-
-
84900546273
-
-
[Available, Accessed:22.08.2013], Institute of Internal Auditors
-
Institute of Internal Auditors Global technology audit guide [Available, Accessed:22.08.2013]. http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/Privacy/DownloadableDocuments/GTAG9IdentAccessMgmt.pdf.
-
Global technology audit guide
-
-
-
26
-
-
84900525397
-
-
[Available: Accessed:21.08.13], Internet2 Middleware Initiative
-
Internet2 Middleware Initiative Identity and access management [Available: http://www.internet2.edu/pubs/200703-IS-MW.pdf. Accessed:21.08.13].
-
Identity and access management
-
-
-
28
-
-
79955133521
-
-
[Arlington, (VA)]
-
Jones L., Antón A.I., Earp J.B. Towards understanding user perceptions of digital identity technologies, sixth workshop on privacy in the electronic society (WPES'07) 2007, 91-98. [Arlington, (VA)].
-
(2007)
Towards understanding user perceptions of digital identity technologies, sixth workshop on privacy in the electronic society (WPES'07)
, pp. 91-98
-
-
Jones, L.1
Antón, A.I.2
Earp, J.B.3
-
29
-
-
84900543939
-
Identity and access management: its role in Sarbanes-Oxley compliance
-
Kaur H. Identity and access management: its role in Sarbanes-Oxley compliance. ISACA J 2011, 6:1-6.
-
(2011)
ISACA J
, vol.6
, pp. 1-6
-
-
Kaur, H.1
-
30
-
-
63449130886
-
The changing face of identity management
-
Kho N. The changing face of identity management. Econtent 2009, 32(3):20-25.
-
(2009)
Econtent
, vol.32
, Issue.3
, pp. 20-25
-
-
Kho, N.1
-
31
-
-
37249058273
-
An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry
-
Lee C.P., Shim J.P. An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry. Euro J Inf Syst 2007, 16(6):712-724.
-
(2007)
Euro J Inf Syst
, vol.16
, Issue.6
, pp. 712-724
-
-
Lee, C.P.1
Shim, J.P.2
-
32
-
-
34548228236
-
Segregation of duties in ERP
-
Lightle S.S., Vallario C.W. Segregation of duties in ERP. Intern Audit 2003, 60(5):27.
-
(2003)
Intern Audit
, vol.60
, Issue.5
, pp. 27
-
-
Lightle, S.S.1
Vallario, C.W.2
-
34
-
-
84892818245
-
Identity and access management: transforming e-security into a catalyst for competitive advantage
-
McQuaide B. Identity and access management: transforming e-security into a catalyst for competitive advantage. Inf Syst Control J 2003, 4.
-
(2003)
Inf Syst Control J
, pp. 4
-
-
McQuaide, B.1
-
35
-
-
34247495636
-
Antecedents and consequences of internet use in procurement: an empirical investigation of U.S. manufacturing firms
-
Mishra A.N., Konana P., Barua A. Antecedents and consequences of internet use in procurement: an empirical investigation of U.S. manufacturing firms. Inf Syst Res 2007, 18:103-120.
-
(2007)
Inf Syst Res
, vol.18
, pp. 103-120
-
-
Mishra, A.N.1
Konana, P.2
Barua, A.3
-
36
-
-
35748967138
-
Enterprise resource planning (ERP) systems: an empirical analysis of benefits
-
O'Leary D. Enterprise resource planning (ERP) systems: an empirical analysis of benefits. J Emerg Technol Account 2004, 1:63-72.
-
(2004)
J Emerg Technol Account
, vol.1
, pp. 63-72
-
-
O'Leary, D.1
-
40
-
-
70450256774
-
Breaking the code: how credit-card data went out the wireless door
-
p. A1 [Available:. Accessed:21.08.13]
-
Pereira J. Breaking the code: how credit-card data went out the wireless door. Wall Str J 2007, p. A1 [Available: http://online.wsj.com/article/SB117824446226991797.html. Accessed:21.08.13].
-
(2007)
Wall Str J
-
-
Pereira, J.1
-
41
-
-
84885382276
-
Top 10 security and privacy topics for IT auditors
-
[Available: Accessed:20.08.13]
-
Rai S., Chukwuma P. Top 10 security and privacy topics for IT auditors. ISACA J 2011, 6:1-5. [Available:http://www.isaca.org/Journal/Past-Issues/2010/Volume-2?pages?Top-10Security-and-Privacy-Topics-for-IT-Auditors1.aspx. Accessed:20.08.13].
-
(2011)
ISACA J
, vol.6
, pp. 1-5
-
-
Rai, S.1
Chukwuma, P.2
-
43
-
-
84900548025
-
-
[Available: Accessed: 20.08.13]
-
Romer H. Security inside out [Available:http://www.oracle.com/us/products/059502.pdf. Accessed: 20.08.13].
-
Security inside out
-
-
Romer, H.1
-
44
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. Role-based access control models. Computer 1996, 29(2):38-47.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
45
-
-
85029268502
-
ERP systems and management accounting change: opportunities or impact
-
Scapens R.W., Jazayeri M. ERP systems and management accounting change: opportunities or impact. Eur Account Rev 2003, 12(1):201-233.
-
(2003)
Eur Account Rev
, vol.12
, Issue.1
, pp. 201-233
-
-
Scapens, R.W.1
Jazayeri, M.2
-
46
-
-
84995946668
-
Security for enterprise resource planning systems
-
She W., Thuraisingham B. Security for enterprise resource planning systems. Inf Syst Security 2007, 16:152-163.
-
(2007)
Inf Syst Security
, vol.16
, pp. 152-163
-
-
She, W.1
Thuraisingham, B.2
-
47
-
-
0346698201
-
-
Sage Publications, Thousand Oaks (CA), N. Denzin, Y. Lincoln (Eds.)
-
Stake R.E. Handbook of qualitative research 2000, Sage Publications, Thousand Oaks (CA). 2nd ed. N. Denzin, Y. Lincoln (Eds.).
-
(2000)
Handbook of qualitative research
-
-
Stake, R.E.1
-
53
-
-
1542382496
-
User acceptance of information technology: toward a unified view
-
Venkatesh V., Morris M.G., Davis G.B., Davis F.D. User acceptance of information technology: toward a unified view. MIS Q 2003, 27(3):425-478.
-
(2003)
MIS Q
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
54
-
-
70350127194
-
The imaginePA project: the first large-scale public sector ERP implementation
-
Wagner W., Antonucci Y.L. The imaginePA project: the first large-scale public sector ERP implementation. Inf Syst Manage 2009, 275-284.
-
(2009)
Inf Syst Manage
, pp. 275-284
-
-
Wagner, W.1
Antonucci, Y.L.2
-
55
-
-
14644433066
-
A flexible payment scheme and its role-based access control
-
Wang H., Cao J., Zhang Y. A flexible payment scheme and its role-based access control. IEEE Trans Knowl Data Eng 2005, 17(3):425-436.
-
(2005)
IEEE Trans Knowl Data Eng
, vol.17
, Issue.3
, pp. 425-436
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
56
-
-
41949138126
-
Biometrics in identity management systems
-
Wayman J.L. Biometrics in identity management systems. Security Privacy IEEE 2008, 6(2):30-37.
-
(2008)
Security Privacy IEEE
, vol.6
, Issue.2
, pp. 30-37
-
-
Wayman, J.L.1
-
58
-
-
3142546003
-
Information systems assurance for enterprise resource planning systems: unique risk considerations
-
Wright A., Wright S. Information systems assurance for enterprise resource planning systems: unique risk considerations. J Inf Syst 2002, 16:99-113.
-
(2002)
J Inf Syst
, vol.16
, pp. 99-113
-
-
Wright, A.1
Wright, S.2
-
60
-
-
18944378896
-
Post-adoption variation in usage and value of e-business by organizations: cross-country evidence from the retail industry
-
Zhu K., Kraemer K. Post-adoption variation in usage and value of e-business by organizations: cross-country evidence from the retail industry. Inf Syst Res 2005, 16(1):61-84.
-
(2005)
Inf Syst Res
, vol.16
, Issue.1
, pp. 61-84
-
-
Zhu, K.1
Kraemer, K.2
-
61
-
-
1442352635
-
Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors
-
Zhu K., Kraemer K., Sean Xu K. Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. Euro J Inf Syst 2003, 12(4):251-268.
-
(2003)
Euro J Inf Syst
, vol.12
, Issue.4
, pp. 251-268
-
-
Zhu, K.1
Kraemer, K.2
Sean Xu, K.3
|