-
1
-
-
0028532579
-
Why cryptosystems fail
-
Anderson, R.J. (1993), "Why cryptosystems fail", Communications of the ACM, Vol. 37, No 11, pp. 32-44.
-
(1993)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32-44
-
-
Anderson, R.J.1
-
2
-
-
21344459955
-
Structures of responsibilities and security of information systems
-
Backhouse, J. and Dhillon, G. (1996), "Structures of responsibilities and security of information systems", European Journal of Information Systems, Vol. 5, No 1, pp. 2-10.
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-10
-
-
Backhouse, J.1
Dhillon, G.2
-
3
-
-
0027804413
-
Information Systems Security Design Methods: Implications for Information Systems Development
-
Baskerville, R. (1993), "Information Systems Security Design Methods: Implications for Information Systems Development", ACM Computing Surveys, Vol. 25, No. 4, pp. 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
4
-
-
0038856298
-
Metaphorical traps in developing information systems for human progress
-
Klein, H.K. and Kumar, K. (Eds.)
-
Boland, R.J. (1989), "Metaphorical traps in developing information systems for human progress", in Klein, H.K. and Kumar, K. (Eds.), Systems Development for Human Progress, Elsevier Science Publishers, pp.277-290.
-
(1989)
Systems Development For Human Progress, Elsevier Science Publishers
, pp. 277-290
-
-
Boland, R.J.1
-
5
-
-
0035149731
-
Evaluating Trust in a Public Key Certification Authority
-
Chadwick, D.W. and Basden, A. (2001), "Evaluating Trust in a Public Key Certification Authority", Computers & Security, Vol. 20, No 7, pp. 592-611.
-
(2001)
Computers & Security
, vol.20
, Issue.7
, pp. 592-611
-
-
Chadwick, D.W.1
Basden, A.2
-
6
-
-
0035658603
-
Computer crimes: Theorizing about the enemy within
-
Dhillon, G. and Moores, S. (2001), "Computer crimes: theorizing about the enemy within", Computers & Security, Vol. 20, No 8, pp. 715-723.
-
(2001)
Computers & Security
, vol.20
, Issue.8
, pp. 715-723
-
-
Dhillon, G.1
Moores, S.2
-
7
-
-
0011420621
-
Information Security: Process Evaluation and Product Evaluation
-
Qing, S. and Eloff, J. (Eds.)
-
Eloff, M., and Von Solms, B. (2000), "Information Security: Process Evaluation and Product Evaluation", in Qing, S. and Eloff, J. (Eds.), Information Security for Global Information Infrastructures, Kluwer Academic Publishers, pp. 11-19.
-
(2000)
Information Security For Global Information Infrastructures, Kluwer Academic Publishers
, pp. 11-19
-
-
Eloff, M.1
von Solms, B.2
-
8
-
-
0031631068
-
A conceptual framework for information security management
-
Finne, T. (1998), "A conceptual framework for information security management", Computers & Security, Vol 17, pp. 303-307.
-
(1998)
Computers & Security
, vol.17
, pp. 303-307
-
-
Finne, T.1
-
9
-
-
0000722720
-
An empirical investigation into the adoption of systems development methodologies
-
Fitzgerald, B. (1998), "An empirical investigation into the adoption of systems development methodologies", Information & Management, Vol. 34, pp. 317-328.
-
(1998)
Information & Management
, vol.34
, pp. 317-328
-
-
Fitzgerald, B.1
-
10
-
-
84886350199
-
Practical management of programme risk: The case of the National Strategy for Police Information Systems for England and Wales
-
Frosdick, S. and Odell, A. (1996), "Practical management of programme risk: the case of the National Strategy for Police Information Systems for England and Wales", Information Management & Computer Security, Vol. 4, No 5, pp. 24-33.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.5
, pp. 24-33
-
-
Frosdick, S.1
Odell, A.2
-
11
-
-
0011432676
-
Deficiencies of the traditional approach to information security and the requirements for a new methodology
-
Hitchings, J. (1995a), "Deficiencies of the traditional approach to information security and the requirements for a new methodology", Computers & Security, Vol. 14, pp. 377-83.
-
(1995)
Computers & Security
, vol.14
, pp. 377-383
-
-
Hitchings, J.1
-
12
-
-
8644292339
-
Achieving an Integrated Design: The Way Forward for Information Security
-
Eloff, J. and von Solms, S. (Eds.), Chapman & Hall
-
Hitchings, J. (1995b), "Achieving an Integrated Design: The Way Forward for Information Security", in Eloff, J. and von Solms, S. (Eds.), Information Security - the next decade, Chapman & Hall, pp. 369-383.
-
(1995)
Information Security - the Next Decade
, pp. 369-383
-
-
Hitchings, J.1
-
13
-
-
84986166532
-
Factors in the selection of a risk assessment method
-
Liechtenstein, S. (1996), "Factors in the selection of a risk assessment method", Information Management & Computer Security, Vol. 4, No 4, pp. 20-25.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.4
, pp. 20-25
-
-
Liechtenstein, S.1
-
14
-
-
84936823916
-
-
2nd Ed., SAGE Publications, California
-
Morgan, G. (1997), Images of Organization, 2nd Ed., SAGE Publications, California.
-
(1997)
Images of Organization
-
-
Morgan, G.1
-
15
-
-
84870320398
-
After the break-in occurs: How to handle the student hacker
-
Muir, S. (1997), "After the break-in occurs: How to handle the student hacker", Library High Tech, Vol. 15, No 1&2, pp. 92-95.
-
(1997)
Library High Tech
, vol.15
, Issue.1-2
, pp. 92-95
-
-
Muir, S.1
-
16
-
-
0011644488
-
An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications
-
Dhillon, G. (Ed.), Idea Group Publishing
-
Siponen, M. (2001), "An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications", in Dhillon, G. (Ed.), Information Security Management: Global Challenges in the New Millennium, Idea Group Publishing, pp. 101-124.
-
(2001)
Information Security Management: Global Challenges In the New Millennium
, pp. 101-124
-
-
Siponen, M.1
-
17
-
-
0011656368
-
A New Paradigm for Adding Security Into IS Development Methods
-
Eloff, J.H.P. et al. (Eds.), Kluwer Academic Publishers
-
Siponen, M. and Baskerville, R. (2001), "A New Paradigm for Adding Security Into IS Development Methods", in Eloff, J.H.P. et al. (Eds.), Advances in Information Security Management & Small Systems Security, Kluwer Academic Publishers.
-
(2001)
Advances In Information Security Management & Small Systems Security
-
-
Siponen, M.1
Baskerville, R.2
-
18
-
-
70449354344
-
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques
-
Eloff, J.H.P. et al. (Eds.), Kluwer Academic Publishers
-
Smith, E. and Eloff, J.H.P. (2001), "Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques", in Eloff, J.H.P. et al. (Eds.), Advances in Information Security Management & Small Systems Security, Kluwer Academic Publishers.
-
(2001)
Advances In Information Security Management & Small Systems Security
-
-
Smith, E.1
Eloff, J.H.P.2
-
19
-
-
0003168891
-
Security requirements, risks, and recommendations for small enterprise and home-office environments
-
Spinellis, D., Kokolakis, S. and Gritzalis, S. (1999), "Security requirements, risks, and recommendations for small enterprise and home-office environments", Information Management & Computer Security, Vol. 7, No 3, pp. 121-128.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.3
, pp. 121-128
-
-
Spinellis, D.1
Kokolakis, S.2
Gritzalis, S.3
-
20
-
-
0242453511
-
Promoting security awareness and commitment
-
Spurling, P. (1995), "Promoting security awareness and commitment", Information Management & Computer Security, Vol. 3, No 2, pp. 20-26.
-
(1995)
Information Management & Computer Security
, vol.3
, Issue.2
, pp. 20-26
-
-
Spurling, P.1
-
21
-
-
84904322735
-
IS security and the IS development project: Towards a framework for their integration
-
Ghonaimy, M. et al. (Eds.)
-
Tryfonas, T. and Kiountouzis, E. (2002), "IS security and the IS development project: Towards a framework for their integration", in Ghonaimy, M. et al. (Eds.), Security in the Information Society: Visions and Perspectives, Kluwer Academic Publishers, pp. 347-356.
-
(2002)
Security In the Information Society: Visions and Perspective Kluwer Academic Publishers
, pp. 347-356
-
-
Tryfonas, T.1
Kiountouzis, E.2
-
22
-
-
0003066147
-
Organisational metaphors and information systems research
-
Walsham, G. (1991), "Organisational metaphors and information systems research", European Journal of Information Systems, Vol. 1, No. 2, pp. 83-94.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 83-94
-
-
Walsham, G.1
-
23
-
-
84974872728
-
Interpretive case studies in IS research: Nature and method
-
Walsham, G. (1995), "Interpretive case studies in IS research: nature and method", European Journal of Information Systems, Vol. 4, pp. 74-81.
-
(1995)
European Journal of Information Systems
, vol.4
, pp. 74-81
-
-
Walsham, G.1
-
24
-
-
0011430405
-
ISO 9000 and Information Security
-
Wood, C.C. and Snow, K. (1995), "ISO 9000 and Information Security", Computers & Security, Vol. 14, pp. 287-288.
-
(1995)
Computers & Security
, vol.14
, pp. 287-288
-
-
Wood, C.C.1
Snow, K.2
-
25
-
-
84904304182
-
A holistic approach to IT security
-
Eloff, J. and von Solms, S. (Eds.), Chapman & Hall, London
-
Yngstróm, L. (1996), "A holistic approach to IT security", in Eloff, J. and von Solms, S. (Eds.), Information Security - The Next Decade, Chapman & Hall, London.
-
(1996)
Information Security - the Next Decade
-
-
Yngstróm, L.1
|