메뉴 건너뛰기




Volumn 65, Issue , 2002, Pages 453-467

Redefining information systems security: Viable information systems

Author keywords

Cybernetics; Information systems; Information systems security; Viable information systems

Indexed keywords

CYBERNETICS; INFORMATION SYSTEMS; INFORMATION USE;

EID: 84904252076     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (22)
  • 2
    • 0013324190 scopus 로고
    • Risk analysis: An interpretive feasibility tool in justifying information systems security
    • Baskerville, R. (1991). Risk analysis: an interpretive feasibility tool in justifying information systems security. European Journal of Information Systems, 1(2), pp.121-130.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 4
    • 0021194887 scopus 로고
    • The Viable System Model: Its provenance, development, methodology and pathology
    • Beer, S. (1984). The Viable System Model: its provenance, development, methodology and pathology. Journal of Operational Research Society, 35, pp.7-26.
    • (1984) Journal of Operational Research Society , vol.35 , pp. 7-26
    • Beer, S.1
  • 6
    • 0004054258 scopus 로고
    • nd Edition) John Wiley, Chichester, England
    • nd Edition) John Wiley, Chichester, England.
    • (1981) Brain of the Firm
    • Beer, S.1
  • 7
    • 0041946398 scopus 로고    scopus 로고
    • Designing a viable organization
    • Elsevier Science Ltd
    • Brocklesby, J. and Cummings, S. (1996). Designing a viable organization. Long Range Planning, 29(1), Elsevier Science Ltd.
    • (1996) Long Range Planning , vol.29 , Issue.1
    • Brocklesby, J.1    Cummings, S.2
  • 14
    • 8644292339 scopus 로고    scopus 로고
    • Achieving an integrated design: The way forward for information security
    • Ellof, J. and von Solms, S. (eds), Chapman & Hall, London
    • Hitchings, J. (1996). Achieving an integrated design: the way forward for information security. In Ellof, J. and von Solms, S. (eds), Information Security - the Next Decade, IFIP SEC'95, Chapman & Hall, London.
    • (1996) Information Security - the Next Decade
    • Hitchings, J.1
  • 17
    • 0004637331 scopus 로고
    • A framework and a suite of methods for business process reengineering
    • In Grover, V. and Kettinger, W.J. (eds), IDEA Group Publishing, Harrisburg, USA
    • Mayer, R.J., Benjamin, P.C., Caraway, B.E. and Painter, M.K. (1995). A framework and a suite of methods for business process reengineering. In Grover, V. and Kettinger, W.J. (eds), Business process change: concepts, methods and technologies. IDEA Group Publishing, Harrisburg, USA.
    • (1995) Business Process Change: Concepts, Methods and Technologies
    • Mayer, R.J.1    Benjamin, P.C.2    Caraway, B.E.3    Painter, M.K.4
  • 18
  • 19
    • 0037547184 scopus 로고    scopus 로고
    • A new framework for information security to avoid information anarchy
    • Ellof, J. and von Solms, S. (eds.), Chapman & Hall, London
    • Parker, D. (1996). A new framework for information security to avoid information anarchy. In Ellof, J. and von Solms, S. (eds.), Information Security - the Next Decade, IFIP SEC'95, Chapman & Hall, London.
    • (1996) Information Security - the Next Decade
    • Parker, D.1
  • 22
    • 84904304182 scopus 로고    scopus 로고
    • A holistic approach to IT security
    • Ellof, J. and von Solms, S. (eds.), Chapman & Hall, London
    • Yngstrom, L. (1996). A holistic approach to IT security. In Ellof, J. and von Solms, S. (eds.), Information Security - the Next Decade, IFIP SEC'95, Chapman & Hall, London.
    • (1996) Information Security - the Next Decade
    • Yngstrom, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.