-
1
-
-
0028532579
-
Why cryptosystems fail
-
Anderson, R.I. (1993), “Why cryptosystems fail”, Communications o/the ACM, 37(11), pp 32-44.
-
(1993)
Communications O/The ACM
, vol.37
, Issue.11
, pp. 32-44
-
-
Anderson, R.I.1
-
2
-
-
0034140983
-
A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls
-
Barnard, L. and von Solms, R. (2000), “A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls”, Computers & Security, Vol 19 No 2, pp 185-194.
-
(2000)
Computers & Security
, vol.19
, Issue.2
, pp. 185-194
-
-
Barnard, L.1
Von Solms, R.2
-
3
-
-
0027804413
-
Information Systems Security Design Methods: Implications for Information Systems Development
-
Baskerville, R. (1993), “Information Systems Security Design Methods: Implications for Information Systems Development”, ACM Computing Surveys, Vol. 25, No.4, pp 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
4
-
-
0034226084
-
-
IEEE Software, July/August
-
Brownsword, L., Obemdorf, T. and Sledge C.A. (2000), “Developing New Processes for COTS-Based Systems”, IEEE Software, July/August, pp 48-55.
-
(2000)
Developing New Processes for Cots-Based Systems
, pp. 48-55
-
-
Brownsword, L.1
Obemdorf, T.2
Sledge, C.A.3
-
6
-
-
0004133988
-
-
Application and Context, Prentice Hall
-
Downs, E., Clare, P. and Coe, I. (1992), SSADM: Application and Context, Prentice Hall.
-
(1992)
SSADM
-
-
Downs, E.1
Clare, P.2
Coe, I.3
-
7
-
-
0011420621
-
Information Security: Process Evaluation and Product Evaluation
-
S. Qing and J. Eloff (Eds.), Kluwer Academic Publishers
-
Eloff, M., and Von Solms, B. (2000), “Information Security: Process Evaluation and Product Evaluation”, in Information Security for Global Information Infrastructures, S. Qing and J. Eloff (Eds.), Kluwer Academic Publishers, pp 11-19.
-
(2000)
Information Security for Global Information Infrastructures
, pp. 11-19
-
-
Eloff, M.1
Von Solms, B.2
-
8
-
-
0031631068
-
A conceptual framework for information security management
-
Finne, T. (1998), “A conceptual framework for information security management”, Computers & Security, Vol 17, pp 303-307.
-
(1998)
Computers & Security
, vol.17
, pp. 303-307
-
-
Finne, T.1
-
9
-
-
21344479361
-
Integrating case study and survey research methods: An example in information systems
-
Gable, G.G. (1994), “Integrating case study and survey research methods: An example in information systems”, European Journal of Information Systems, Vol. 3, No.2, pp 112-126.
-
(1994)
European Journal of Information Systems
, vol.3
, Issue.2
, pp. 112-126
-
-
Gable, G.G.1
-
10
-
-
0011418384
-
Integrating Data Security into the Systems Development Life Cycle
-
Hayam, A. and Oz, E. (1993), “Integrating Data Security into the Systems Development Life Cycle”, Journal of Systems Management, Vol. 8 No 44, pp 16-20.
-
(1993)
Journal of Systems Management
, vol.8
, Issue.44
, pp. 16-20
-
-
Hayam, A.1
Oz, E.2
-
11
-
-
8644292339
-
Achieving an Integrated Design: The Way Forward for Information Security
-
J. Ellof and S. von Solms (Eds.), Chapman & Hall
-
Hitchings I. (1995), “Achieving an Integrated Design: The Way Forward for Information Security”, in Information Security - the next decade, J. Ellof and S. von Solms (Eds.), Chapman & Hall.
-
(1995)
Information Security - the Next Decade
-
-
Hitchings, I.1
-
13
-
-
0002606747
-
A Biologically Inspired Immune System for Computers
-
R. Brooks and P. Maes (Eds.), MIT Press
-
Kephart, J.O. (1994), “A Biologically Inspired Immune System for Computers”, in Artificial life IV, R. Brooks and P. Maes (Eds.), MIT Press.
-
(1994)
Artificial Life IV
-
-
Kephart, J.O.1
-
14
-
-
85105003482
-
A Framework for Comparing Cryptographic Libraries
-
S. Qing and J. Eloff (Eds.), International Academic Publishers
-
Moulinos, K., Kyrloglou, N. and Tryfonas, T. (2000), “A Framework for Comparing Cryptographic Libraries”, in IFIP/SEC 2000: Information Security, S. Qing and J. Eloff (Eds.), International Academic Publishers, pp 9-12.
-
(2000)
IFIP/SEC 2000: Information Security
, pp. 9-12
-
-
Moulinos, K.1
Kyrloglou, N.2
Tryfonas, T.3
-
15
-
-
0347566169
-
Problems, knowledge, solutions: Solving complex problems
-
Mumford, E. (1998), “Problems, knowledge, solutions: Solving complex problems”, Journal of Strategic Information Systems, 7, pp 255-269.
-
(1998)
Journal of Strategic Information Systems
, vol.7
, pp. 255-269
-
-
Mumford, E.1
-
16
-
-
0011644488
-
(2001), “An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications”
-
Dhillon, Idea Group Publishing
-
Siponen, M. (2001), “An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications”, in Information Security Management: Global Challenges in the New Millennium, G. Dhillon, Idea Group Publishing, pp 101-124.
-
Information Security Management: Global Challenges in the New Millennium, G
, pp. 101-124
-
-
Siponen, M.1
-
17
-
-
84904254857
-
Security Concerns for Contemporary Development Practices: A Case Study
-
M. Dupuy and P. Paradinas (Eds.), Kluwer Academic Publishers
-
Tryfonas, T. and Kiountouzis, E. (2001), “Security Concerns for Contemporary Development Practices: A Case Study”, in Trusted Information: The new decade challenge, M. Dupuy and P. Paradinas (Eds.), Kluwer Academic Publishers, pp 421-435.
-
(2001)
Trusted Information: The New Decade Challenge
, pp. 421-435
-
-
Tryfonas, T.1
Kiountouzis, E.2
-
18
-
-
0035780469
-
Embedding security practices in contemporary information systems development approaches
-
Tryfonas, T., Kiountouzis, E. and Poulymenakou, A. (2001), “Embedding security practices in contemporary information systems development approaches”, Information Management & Computer Security, Vol. 9 No 4, pp 183-197.
-
(2001)
Information Management & Computer Security
, vol.9
, Issue.4
, pp. 183-197
-
-
Tryfonas, T.1
Kiountouzis, E.2
Poulymenakou, A.3
-
19
-
-
0003066147
-
Organisational metaphors and information systems research
-
Walsham, G. (1991), “Organisational metaphors and information systems research”, European Journal of Information Systems, Vol. 1, No.2, pp 83-94.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 83-94
-
-
Walsham, G.1
-
20
-
-
33747470426
-
-
Strategic Analysis Report R-11-6534 (June), Gartner Research
-
Witty, R. et al (2001), The price of information security, Strategic Analysis Report R-11-6534 (June), Gartner Research.
-
(2001)
The Price of Information Security
-
-
Witty, R.1
-
21
-
-
0011430405
-
ISO 9000 and Information Security
-
Wood, c.c. and Snow, K. (1995), “ISO 9000 and Information Security”, Computers & Security, 14, pp 287-288.
-
(1995)
Computers & Security
, vol.14
, pp. 287-288
-
-
Wood, C.C.1
Snow, K.2
|