-
3
-
-
6744247045
-
Logical Controls Specification: An approach to information system security
-
H. Klein & K. Kumar (eds, Amsterdam: North-Holland
-
Baskerville, R., (1989), Logical Controls Specification: An approach to information system security, In H. Klein & K. Kumar (eds.) systems development for human progress. Amsterdam: North-Holland.
-
(1989)
Systems Development For Human Progress
-
-
Baskerville, R.1
-
4
-
-
0027804413
-
Information Systems Security Design Methods: Implications for information Systems Development
-
December
-
Baskerville, R., (1993), Information Systems Security Design Methods: Implications for information Systems Development. ACM Computing Surveys 25, (4) December, pp. 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
5
-
-
33750392472
-
Structural Artifacts in Method Engineering: The Security Imperative
-
S. Brinkkemper & K. Lyytinen & R. Welke (Eds, London: Chapman & Hall
-
Baskerville, R. (1996). Structural Artifacts in Method Engineering: The Security Imperative. In S. Brinkkemper & K. Lyytinen & R. Welke (Eds.), Method Engineering (pp. 8-28). London: Chapman & Hall.
-
(1996)
Method Engineering
, pp. 8-28
-
-
Baskerville, R.1
-
8
-
-
0004190705
-
-
Addison-Wesley
-
Castano, S., Fugini, M., Martell, G., & Samarati, P., (1995), Database Security. Addison-Wesley.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martell, G.3
Samarati, P.4
-
9
-
-
84904260675
-
-
Code of Practice for Information Security Management, DISC PD003. British Standard Institution, London, UK
-
Code of Practice for Information Security Management, (1993), Department of Trade and Industry. DISC PD003. British Standard Institution, London, UK.
-
(1993)
Department of Trade and Industry
-
-
-
10
-
-
23044525969
-
Current directions in IS security research: Toward socio-organizational perspectives
-
Dhillon, G. and Backhouse, J., (2001), Current directions in IS security research: toward socio-organizational perspectives. Information Systems Journal. Vol 11, No 2.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
-
-
Dhillon, G.1
Backhouse, J.2
-
11
-
-
24644475561
-
Object-Oriented Modeling of Security Semantics
-
IEEE Computer Society Press
-
Ellmer, E., Pemul, G., Kappel, G., (1995), Object-Oriented Modeling of Security Semantics. In: Proceedings of the 1lth Annual Computer Society Applications Conference (ACSAC'95). IEEE Computer Society Press.
-
(1995)
Proceedings of the 1lth Annual Computer Society Applications Conference (ACSAC'95
-
-
Ellmer, E.1
Pemul, G.2
Kappel, G.3
-
13
-
-
0003999816
-
-
Cambridge University Press, UK
-
Hirschheim, R., Klein, H. K., & Lyytinen, K., (1995), Information Systems Development and Data Modelling: Conceptual and Philosophical Foundations. Cambridge University Press, UK.
-
(1995)
Information Systems Development and Data Modelling: Conceptual and Philosophical Foundations
-
-
Hirschheim, R.1
Klein, H.K.2
Lyytinen, K.3
-
16
-
-
0041674320
-
Levels of abstraction as a Conceptual Framework for an Information Systems
-
E. D. Falkenberg and P. Lindgreen (eds, North-Holland, Amsterdam
-
Iivari, J., (1989), Levels of abstraction as a Conceptual Framework for an Information Systems. In E. D. Falkenberg and P. Lindgreen (eds): Information System Concepts: An In-depth Analysis. North-Holland, Amsterdam.
-
(1989)
Information System Concepts: An In-depth Analysis
-
-
Iivari, J.1
-
17
-
-
55249117361
-
The PIOCO model for IS design
-
Iivari, J & Koskela, E., (1987), The PIOCO model for IS design, MIS Quarterly, Vol. 11, No. 3, pp. 401-419.
-
(1987)
MIS Quarterly
, vol.11
, Issue.3
, pp. 401-419
-
-
Iivari, J.1
Koskela, E.2
-
18
-
-
0003724305
-
Our Cases with Use Cases
-
Jaaksi, A., (1998), Our Cases with Use Cases. Joumal of Object-Oriented Programming, vol. 10, no. 9, pp. 58-65.
-
(1998)
Joumal of Object-Oriented Programming
, vol.10
, Issue.9
, pp. 58-65
-
-
Jaaksi, A.1
-
19
-
-
39749198338
-
-
Addison-Wesley Publishing Company
-
Jacobson, I., Christerson, P. Jonsson, Övergaard, G., (1992), A Use Case Driven Approach. Addison-Wesley Publishing Company.
-
(1992)
A Use Case Driven Approach
-
-
Jacobson, I.1
Christerson, P.J.2
Övergaard, G.3
-
21
-
-
0009350342
-
Methodology engineering: A Proposal for situation-specific Methodology construction
-
W.W. Cotterman & J.A. Senn (eds
-
Kumar, K. & Welke, R.J., (1992), Methodology engineering: A Proposal for situation-specific Methodology construction. In W.W. Cotterman & J.A. Senn (eds): Challenges andStrategies for research in systems development, pp. 257-269.
-
(1992)
Challenges AndStrategies For Research In Systems Development
, pp. 257-269
-
-
Kumar, K.1
Welke, R.J.2
-
22
-
-
0023170180
-
Two Views on Information Modeling
-
Lyytinen, K., (1987), Two Views on Information Modeling. Information & Management, Vol. 12, pp. 9-19.
-
(1987)
Information & Management
, vol.12
, pp. 9-19
-
-
Lyytinen, K.1
-
23
-
-
0001935749
-
A Taxonomic Perspective of Information Systems Development: Theoretical Constructs and Recommendations
-
R.J. Boland & R.A. Hirscheim (ed, John Wiley & Sons Ltd
-
Lyytinen, K., (1991), A Taxonomic Perspective of Information Systems Development: Theoretical Constructs and Recommendations. In R.J. Boland & R.A. Hirscheim (ed): Critical Issues in Information Systems Research, John Wiley & Sons Ltd.
-
(1991)
Critical Issues In Information Systems Research
-
-
Lyytinen, K.1
-
25
-
-
0025211594
-
The specification and modelling of computer security
-
January
-
McLean, J., (1990), The specification and modelling of computer security. IEEE Computer. January, vol. 23, issue 1, pp. 9-16.
-
(1990)
IEEE Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
26
-
-
84944878354
-
-
CRC Press, USA
-
Menezes, A.J., van Oorschot, P.C. and Vanstone, S.C., (1999), Handbook of Applied Cryptography. CRC Press, USA.
-
(1999)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.C.3
-
27
-
-
0041601091
-
A primer to method engineering
-
S. Brinkkkemper & K. Lyytinen & R. Welke (Eds, London: Chapman & Hall
-
Odell, J. J. (1996). A primer to method engineering. In S. Brinkkkemper & K. Lyytinen & R. Welke (Eds.), Method Engineering: Principles of method construction and tool support (pp. 1-7). London: Chapman & Hall.
-
(1996)
Method Engineering: Principles of Method Construction and Tool Support
, pp. 1-7
-
-
Odell, J.J.1
-
29
-
-
0032124052
-
Modelling Data Secrecy and Integrity
-
North Holland
-
Pemul, G., Tjoa A. M., & Winiwarter, W., (1998), Modelling Data Secrecy and Integrity. Data & Knowledge Engineering. Vol. 26, pp. 291-308. North Holland.
-
(1998)
Data & Knowledge Engineering
, vol.26
, pp. 291-308
-
-
Pemul, G.1
Tjoa, A.M.2
Winiwarter, W.3
-
30
-
-
84963689748
-
Modelling secure and fair electronic commerce
-
Röhm, A.W., Pernul, G. & Henmann, G., (1998), Modelling secure and fair electronic commerce. Proceedings of the 14th Annual Computer Security Applications Conference, 1998.
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 1998
-
-
Röhm, A.W.1
Pernul, G.2
Henmann, G.3
-
32
-
-
0027699087
-
Lattice-based access controls
-
November
-
Sandhu, R.S., (1993), Lattice-based access controls. IEEE Computer. Vol. 26, no. 11, November, pp. 9-19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
33
-
-
0011644488
-
An analysis of the recent IS security development approaches: Descriptive and prescriptive implications
-
G. Dhillon (eds, Idea Group (2001)
-
Siponen, M.T., (2001), An analysis of the recent IS security development approaches: descriptive and prescriptive implications. In: G. Dhillon (eds:) Information Security Management - Global Challenges in the Next Millennium, Idea Group (2001).
-
(2001)
Information Security Management - Global Challenges In the Next Millennium
-
-
Siponen, M.T.1
-
35
-
-
0001133137
-
Coping with Systems Risk: Security Planning Models for Management Decision Making
-
Straub, D.W. & Welke, R.J., (1998), Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly, Vol. 22, No. 4, p. 441-464.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
36
-
-
0000241259
-
Growing Systems in an Emergent Organization
-
Truex, D. P., Baskerville, R., & Klein, H. K. (1999). Growing Systems in an Emergent Organization. Communications of The ACM, 42(8), 117-123.
-
(1999)
Communications of the ACM
, vol.42
, Issue.8
, pp. 117-123
-
-
Truex, D.P.1
Baskerville, R.2
Klein, H.K.3
-
37
-
-
84902456618
-
Amethodical Systems Development: The Deferred Meaning of Systems Development Methods
-
Truex, D., Baskerville, R., & Travis, J. (2000). Amethodical Systems Development: The Deferred Meaning of Systems Development Methods. Accounting, Management and Information Technology, 10, 53-79.
-
(2000)
Accounting, Management and Information Technology
, vol.10
, pp. 53-79
-
-
Truex, D.1
Baskerville, R.2
Travis, J.3
|