-
1
-
-
84881095404
-
Measuring the cost of cybercrime
-
R. Anderson, C. Barton, R. B?hme, R. Clayton, M. Eeten, M. Levi, T. Moore, and S. Savage, "Measuring the Cost of Cybercrime," in 11th Workshop on the Economics of Information Security (WEIS'12), 2012
-
(2012)
11th Workshop on the Economics of Information Security (WEIS'12)
-
-
Anderson, R.1
Barton, C.2
Bhme, R.3
Clayton, R.4
Eeten, M.5
Levi, M.6
Moore, T.7
Savage, S.8
-
2
-
-
84903710215
-
-
revision 2 (Draft)
-
P. Cichonski, T. Millar, T. Grance, and K. Scarfone, "NIST Special Publication 800-61: Computer Security Incident Handling Guide," 2011, revision 2 (Draft)
-
(2011)
NIST Special Publication 800-61: Computer Security Incident Handling Guide
-
-
Cichonski, P.1
Millar, T.2
Grance, T.3
Scarfone, K.4
-
4
-
-
84876369615
-
-
European Network Information Security Agency (ENISA)
-
European Network and Information Security Agency (ENISA), "Good Practice Guide for Incident Management," 2010
-
(2010)
Good Practice Guide for Incident Management
-
-
-
5
-
-
84902655558
-
-
2nd ed. BCS, The Chartered Institute for IT
-
E. Brewster, R. Griffiths, A. Lawes, and J. Sansbury, IT Service Management: A Guide for Itil Foundation Exam Candidates, 2nd ed. BCS, The Chartered Institute for IT, 2012
-
(2012)
IT Service Management: A Guide for Itil Foundation Exam Candidates
-
-
Brewster, E.1
Griffiths, R.2
Lawes, A.3
Sansbury, J.4
-
8
-
-
84903696261
-
Security Incident handling and reporting: A study of the difference between theory and practice
-
T. L. Orderl?ken, "Security Incident handling and reporting: A study of the difference between theory and practice," Gj?ik University College, 2005
-
(2005)
Gjoøik University College
-
-
Orderloøkken, T.L.1
-
9
-
-
64749084618
-
A framework for incident response management in the petroleum industry
-
M. G. Jaatun, E. Albrechtsen, M. B. Line, I. A. Toøndel, and O. H. Longva, "A framework for incident response management in the petroleum industry," International Journal of Critical Infrastructure Protection, vol. 2, pp. 26-37, 2009
-
(2009)
International Journal of Critical Infrastructure Protection
, vol.2
, pp. 26-37
-
-
Jaatun, M.G.1
Albrechtsen, E.2
Line, M.B.3
Toøndel, I.A.4
Longva, O.H.5
-
10
-
-
48249133620
-
A study of information security practice in a critical infrastructure application
-
ser. Lecture Notes in Computer Science, C. Rong, M. G. Jaatun, F. E. Sandnes, L. T. Yang, and J. Ma, Eds Springer Berlin Heidelberg
-
M. G. Jaatun, E. Albrechtsen, M. Line, S. O. Johnsen, I. Waeroø O. H. Longva, and I. A. Toøndel, "A study of information security practice in a critical infrastructure application," in Autonomic and Trusted Computing, ser. Lecture Notes in Computer Science, C. Rong, M. G. Jaatun, F. E. Sandnes, L. T. Yang, and J. Ma, Eds. Springer Berlin Heidelberg, 2008, vol. 5060, pp. 527-539 [Online]. Available:
-
(2008)
Autonomic and Trusted Computing
, vol.5060
, pp. 527-539
-
-
Jaatun, M.G.1
Albrechtsen, E.2
Line, M.3
Johnsen, S.O.4
Waeroø, I.5
Longva, O.H.6
Toøndel, I.A.7
-
11
-
-
77957923047
-
Creating an itil inspired incident management approach: Roots, response, and results
-
IEEE/IFIP
-
J. Cusick and G. Ma, "Creating an itil inspired incident management approach: Roots, response, and results," in Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP, 2010, pp. 142-148
-
(2010)
Network Operations and Management Symposium Workshops (NOMS Wksps)
, vol.2010
, pp. 142-148
-
-
Cusick, J.1
Ma, G.2
-
12
-
-
77949522891
-
Preparation, detection, and analysis: The diagnostic work of IT security incident response
-
R. Werlinger, K. Muldner, K. Hawkey, and K. Beznosov, "Preparation, detection, and analysis: the diagnostic work of IT security incident response," Information Management &Computer Security, vol. 18, no. 1, pp. 26-42, 2010
-
(2010)
Information Management &Computer Security
, vol.18
, Issue.1
, pp. 26-42
-
-
Werlinger, R.1
Muldner, K.2
Hawkey, K.3
Beznosov, K.4
-
13
-
-
84862303039
-
Incident response teams-Challenges in supporting the organisational security function
-
A. Ahmad, J. Hadgkiss, and A. Ruighaver, "Incident response teams-Challenges in supporting the organisational security function," Computers &Security, 2012
-
(2012)
Computers &Security
-
-
Ahmad, A.1
Hadgkiss, J.2
Ruighaver, A.3
-
14
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Apr
-
T. Herath and H. R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organisations," Eur J Inf Syst, vol. 18, no. 2, pp. 106-125, Apr 2009 [Online]. Available: http://dx.doi.org/ 10.1057/ejis.2009.6
-
(2009)
Eur J Inf Syst
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
15
-
-
78650100295
-
Towards incident handling in the cloud: Challenges and approaches
-
ser. CCSW '10. New York, NY, USA: ACM
-
B. Grobauer and T. Schreck, "Towards incident handling in the cloud: Challenges and approaches," in Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, ser. CCSW '10. New York, NY, USA: ACM, 2010, pp. 77-86 [Online]. Available: http://doi.acm.org/10.1145/1866835.1866850
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
, pp. 77-86
-
-
Grobauer, B.1
Schreck, T.2
-
18
-
-
0003673547
-
-
4th ed., ser. Applied Social Research Method Series SAGE Publications
-
R. K. Yin, Case Study Research Design and Methods, 4th ed., ser. Applied Social Research Method Series. SAGE Publications, 2009, vol. 5
-
(2009)
Case Study Research Design and Methods
, vol.5
-
-
Yin, R.K.1
-
20
-
-
33846313618
-
The qualitative interview in IS research: Examining the craft
-
M. D. Myers and M. Newman, "The qualitative interview in IS research: Examining the craft," Information and organization, vol. 17, no. 1, pp. 2-26, 2007
-
(2007)
Information and Organization
, vol.17
, Issue.1
, pp. 2-26
-
-
Myers, M.D.1
Newman, M.2
-
22
-
-
34548184227
-
A general inductive approach for analyzing qualitative evaluation data
-
D. R. Thomas, "A General Inductive Approach for Analyzing Qualitative Evaluation Data," American Journal of Evaluation, vol. 27, no. 2, pp. 237-246, 2006
-
(2006)
American Journal of Evaluation
, vol.27
, Issue.2
, pp. 237-246
-
-
Thomas, D.R.1
-
23
-
-
84888884622
-
CISOs and organisational culture: Their own worst enemy?
-
D. Ashenden and A. Sasse, "CISOs and organisational culture: Their own worst enemy?" Computers &Security, vol. 39, pp. 396-405, 2013
-
(2013)
Computers &Security
, vol.39
, pp. 396-405
-
-
Ashenden, D.1
Sasse, A.2
-
24
-
-
84897419985
-
Working to rule, or working safely? Part 1: A state of the art review
-
A. Hale and D. Borys, "Working to rule, or working safely? Part 1: A state of the art review," Safety Science, 2012 [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0925753512001312
-
(2012)
Safety Science
-
-
Hale, A.1
Borys, D.2
|