-
2
-
-
0003955218
-
-
(8th ed.). New York: McGraw-Hill Companies, Inc
-
Applegate, L. M., Austin, R. D., & Soule, D. L. (2009). Corporate information strategy and management: Texts and cases (8th ed.). New York: McGraw-Hill Companies, Inc.
-
(2009)
Corporate information strategy and management: Texts and cases
-
-
Applegate, L.M.1
Austin, R.D.2
Soule, D.L.3
-
3
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys. doi:10.1145/162124.162127.
-
(1993)
ACM Computing Surveys
-
-
Baskerville, R.1
-
4
-
-
33750958509
-
-
D.O.I
-
Bistarelli, S., Fioravanti, F., & Peretti, P. (2006). Defense trees for economic evaluation of security investments. Dipartimento di Scienze, Universita degli, Studi g. d'Annunzio. D.O.I.
-
(2006)
Defense trees for economic evaluation of security investments. Dipartimento di Scienze, Universita degli, Studi g. d'Annunzio
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
5
-
-
42149112876
-
Information security and risk management
-
Bodin, L., Gordon, L. A., & Loeb, M. P. (2008). Information security and risk management. Communications of the ACM, 51(4), 64-68. doi:10.1145/1330311.1330325.
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 64-68
-
-
Bodin, L.1
Gordon, L.A.2
Loeb, M.P.3
-
8
-
-
0042363394
-
Quantifying the financial impact of of IT security breaches
-
Garg, A. G., Curtis, J., & Halper, H. (2003). Quantifying the financial impact of of IT security breaches. Information Management & Computer Security, 74-84. doi:10.1108/09685220310468646.
-
(2003)
Information Management & Computer Security
, pp. 74-84
-
-
Garg, A.G.1
Curtis, J.2
Halper, H.3
-
9
-
-
33745210521
-
Budgeting process for information security expenditures: Empirical evidence
-
Gordon, L. A., & Loeb, M. P. (2006). Budgeting process for information security expenditures: Empirical evidence. Communications of the ACM, 49(1), 121-125. doi:10.1145/1107458.1107465.
-
(2006)
Communications of the ACM
, vol.49
, Issue.1
, pp. 121-125
-
-
Gordon, L.A.1
Loeb, M.P.2
-
10
-
-
23344450027
-
The relevant internal rate of return
-
Hartman, J. C., & Schafrick, I. C. (2004). The relevant internal rate of return. The Engineering Economist, 49(2), 139-158. doi:10.1080/00137910490453419.
-
(2004)
The Engineering Economist
, vol.49
, Issue.2
, pp. 139-158
-
-
Hartman, J.C.1
Schafrick, I.C.2
-
11
-
-
0003560169
-
-
(13th ed.). Upper Saddle River, NJ: Pearson Prentice Hall
-
Horngren, C. T., Datar, S. M., Foster, G., Rajan, M., & Ittner, C. (2009). Cost accounting: A mangerial emphasis (13th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.
-
(2009)
Cost accounting: A mangerial emphasis
-
-
Horngren, C.T.1
Datar, S.M.2
Foster, G.3
Rajan, M.4
Ittner, C.5
-
12
-
-
0026494564
-
The balanced scorecard-measures that drive performance
-
January-February
-
Kaplan, R.S., & Norton, D.P. (1992, January-February). The balanced scorecard-measures that drive performance. HBR onPoint.
-
(1992)
HBR onPoint
-
-
Kaplan, R.S.1
Norton, D.P.2
-
13
-
-
0000142161
-
Putting the balanced scorecard to work
-
September-October
-
Kaplan, R. S., & Norton, D. P. (1993, September-October). Putting the balanced scorecard to work. Harvard Business Review.
-
(1993)
Harvard Business Review
-
-
Kaplan, R.S.1
Norton, D.P.2
-
15
-
-
84871903931
-
Cost of data breaches declines
-
Retrieved from
-
Olavsrud, T. (2012). Cost of data breaches declines. CIO. Retrieved from http://www.cio.com/article/702494/Cost_of_Data_Breaches_Declines?page=2&taxonomyId=3154.
-
(2012)
CIO.
-
-
Olavsrud, T.1
-
18
-
-
21844499608
-
Uses, abuses, and alternatives to the net-present-value rule
-
Ross, S. (1995). Uses, abuses, and alternatives to the net-present-value rule. Financial Management, 24(3), 96-102. doi:10.2307/3665561.
-
(1995)
Financial Management
, vol.24
, Issue.3
, pp. 96-102
-
-
Ross, S.1
-
21
-
-
1842829828
-
-
Retrieved November 10, 2011, from
-
Stoneburner, G., Goguen, A., & Feringa, A. (2002). NIST: National institute of standards and technology. Retrieved November 10, 2011, from http://ibexsecurity.com/cissp/NIST%20Security%20Guides/sp800-30.pdf.
-
(2002)
NIST: National institute of standards and technology
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
22
-
-
77957654255
-
Information security investment decisions: Evaluating the balanced scorecard method
-
Tallau, L. J., Gupta, M., & Sharman, R. (2010). Information security investment decisions: Evaluating the balanced scorecard method. Int. J. Business Information Systems, 5(1), 34-57. doi:10.1504/IJBIS.2010.029479.
-
(2010)
Int. J. Business Information Systems
, vol.5
, Issue.1
, pp. 34-57
-
-
Tallau, L.J.1
Gupta, M.2
Sharman, R.3
|