-
1
-
-
0000081345
-
Information architecture: In search of efficient flexibility
-
Allen, B.R., and Boynton, A.C. 1991. Information architecture: in search of efficient flexibility. MIS Quarterly, 15, 4, 435-445.
-
(1991)
MIS Quarterly
, vol.15
, Issue.4
, pp. 435-445
-
-
Allen, B.R.1
Boynton, A.C.2
-
2
-
-
84989598396
-
Department level information resource management: A theoretical argument for a decentralized approach
-
Beath, C.M., and Straub, D.W. 1991. Department level information resource management: a theoretical argument for a decentralized approach. Journal of the American Society for Information Science, 42, 2, 124-127.
-
(1991)
Journal of the American Society for Information Science
, vol.42
, Issue.2
, pp. 124-127
-
-
Beath, C.M.1
Straub, D.W.2
-
3
-
-
85106077423
-
Sobig damage estimate increased
-
(available at, accessed on May 1, 2005)
-
Bekker, S. 2003. Sobig damage estimate increased. ENT (available at www.entmag.com/news/article. asp?EditorialsID=5936 accessed on May 1, 2005).
-
(2003)
ENT
-
-
Bekker, S.1
-
4
-
-
85106122117
-
Whiteboard: Business by design. C/O
-
(available at, accessed on May 1, 2005)
-
Bolles, G.A. 2004. Whiteboard: business by design. C/O Insight (available at www.cioinsight.com/ article2/0, 1397, 1457058, 00.asp accessed on May 1, 2005).
-
(2004)
Insight
-
-
Bolles, G.A.1
-
6
-
-
70449769685
-
Organization design for the management of end-user computing:Reexamining the contingencies
-
Brown, C.Y., and Bostrom, R.P. 1994. Organization design for the management of end-user computing:reexamining the contingencies. Journal of Management Information Systems, 10, 4, 183-211.
-
(1994)
Journal of Management Information Systems
, vol.10
, Issue.4
, pp. 183-211
-
-
Brown, C.Y.1
Bostrom, R.P.2
-
7
-
-
0000409290
-
Alignment of the IS functions with the enterprise: Toward a model of antecedents
-
Brown, C.Y., and Magill, S.L. 1994. Alignment of the IS functions with the enterprise: toward a model of antecedents. MIS Quarterly, 18, 4, 371-404.
-
(1994)
MIS Quarterly
, vol.18
, Issue.4
, pp. 371-404
-
-
Brown, C.Y.1
Magill, S.L.2
-
8
-
-
19944415239
-
-
(available at, accessed on Jan. 1, 2005)
-
CIMAlIFAC. 2004. Enterprise Governance: Getting the Balance Right (available at www.cimaglobal.com/ downloads/enterprise_governance.pdf accessed on Jan. 1, 2005).
-
(2004)
Enterprise Governance: Getting the Balance Right
-
-
-
9
-
-
0242377746
-
Worm exploits weak link: PC users
-
(available at, accessed on May 1, 2005)
-
Delio, M. 2003. Worm exploits weak link: PC users. Wired News (available at www.wired.com/news/ infostructure/0, 1377, 59994, 00.html accessed on May 1, 2005).
-
(2003)
Wired News
-
-
Delio, M.1
-
10
-
-
84898273735
-
The impact of the Sarbanes Oxley (SOX) act on information security governance
-
In M. Warkentin and R. Vaughn (eds.), , Hershey, PA: Idea Group Publishing
-
Dhillon, G., and Mishra, S. 2006. The impact of the Sarbanes Oxley (SOX) act on information security governance. In M. Warkentin and R. Vaughn (eds.), Enterprise Information Security Assurance and System Security: Managerial and Technical Issues. Hershey, PA: Idea Group Publishing, pp. 62-79.
-
(2006)
Enterprise Information Security Assurance and System Security: Managerial and Technical Issues
, pp. 62-79
-
-
Dhillon, G.1
Mishra, S.2
-
11
-
-
0040878179
-
The role of the corporate IT function in the federal IT organization
-
In M. Earl (ed.), , New York: Oxford University Press
-
Hodgkinson, S. 1996. The role of the corporate IT function in the federal IT organization. In M. Earl (ed.), Information Management: The Organizational Dimension. New York: Oxford University Press, pp. 247-269.
-
(1996)
Information Management: The Organizational Dimension
, pp. 247-269
-
-
Hodgkinson, S.1
-
12
-
-
25644456506
-
-
(available at, accessed on Sept. 6, 2004)
-
IT Governance Institute. 2003. Board Briefing on IT Governance (available at www.ITgovernance.org/ resources.htm accessed on Sept. 6, 2004).
-
(2003)
Board Briefing on IT Governance
-
-
-
13
-
-
85106070838
-
IT managers say they are being worn down by wave of attacks
-
Jaikumar, Y. 2003. IT managers say they are being worn down by wave of attacks. ComputerWorld, 37, 34, 1-2.
-
(2003)
ComputerWorld
, vol.37
, Issue.34
, pp. 1-2
-
-
Jaikumar, Y.1
-
16
-
-
0031378491
-
Security issues in networks with internet access
-
Landwehr, C.E., and Goldschlag, D.M. 1997. Security issues in networks with internet access. Proceedings of the IEEE, 85, 12, 2034-2051.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.12
, pp. 2034-2051
-
-
Landwehr, C.E.1
Goldschlag, D.M.2
-
17
-
-
0000133760
-
Threats to information systems: Today’s reality, yesterday’s understanding
-
Loch, KD.; Carr, H.H.; and Warkentin, M.E. 1992. Threats to information systems: today’s reality, yesterday’s understanding. MIS Quarterly, 16, 2, 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
19
-
-
0000952130
-
Three types of perceived uncertainty about the enviroument, state, effect, and response uncertainty
-
Milliken, FJ. 1987. Three types of perceived uncertainty about the enviroument, state, effect, and response uncertainty. Academy of Management Review, 12, 1, 133-143.
-
(1987)
Academy of Management Review
, vol.12
, Issue.1
, pp. 133-143
-
-
Milliken, F.J.1
-
20
-
-
0038633244
-
CDC’s new epidemic: An investigation into awareness, attitudes, actions, and knowledge of computer viruses among students utilizing campus computer labs
-
Monds, K.E., and Wang, C.P. 2003. CDC’s new epidemic: an investigation into awareness, attitudes, actions, and knowledge of computer viruses among students utilizing campus computer labs. Journal of Computer Information Systems, 43, 3, 118-126.
-
(2003)
Journal of Computer Information Systems
, vol.43
, Issue.3
, pp. 118-126
-
-
Monds, K.E.1
Wang, C.P.2
-
21
-
-
84986052245
-
The evolution of information systems: Their impact on organizations and structures
-
Mukherji, A. 2002. The evolution of information systems: their impact on organizations and structures. Management Decisions, 40, 5, 497-507.
-
(2002)
Management Decisions
, vol.40
, Issue.5
, pp. 497-507
-
-
Mukherji, A.1
-
24
-
-
2942738445
-
Arrangements for information technology governance: A theory of multiple contingencies
-
Sambamurthy, v., and Zmud, R.W. 1999. Arrangements for information technology governance: a theory of multiple contingencies. MIS Quarterly, 23, 2, 261-288.
-
(1999)
MIS Quarterly
, vol.23
, Issue.2
, pp. 261-288
-
-
Sambamurthy, V.1
Zmud, R.W.2
-
25
-
-
0034378210
-
Research commentary: The organizing logic for an enterprise’s IT activities in the digital era-a prognosis of practice and a call for research
-
Sambamurthy, v., and Zmud, R.W. 2000. Research commentary: the organizing logic for an enterprise’s IT activities in the digital era-a prognosis of practice and a call for research. Information Systems Research, 11, 2, 105-114.
-
(2000)
Information Systems Research
, vol.11
, Issue.2
, pp. 105-114
-
-
Sambamurthy, V.1
Zmud, R.W.2
-
26
-
-
0023998998
-
Organizational structuring of the computer security function
-
Summer
-
Straub, D.W. 1988. Organizational structuring of the computer security function. Computers and Security, 7, Summer, 185-195.
-
(1988)
Computers and Security
, vol.7
, pp. 185-195
-
-
Straub, D.W.1
-
27
-
-
85106137177
-
Blaster worm took heavy toll: Survey
-
(available at, accessed on May 1, 2005)
-
Varghese, S. 2003. Blaster worm took heavy toll: survey. Sydney Morning Herald Online (available at www. smh.com.au/articlesI2003/09/23/1064082983214.html accessed on May 1, 2005).
-
(2003)
Sydney Morning Herald Online
-
-
Varghese, S.1
-
28
-
-
84948222881
-
Centralized information systems services: Managing the transition to decentralization
-
Walker, K.B. 1993. Centralized information systems services: managing the transition to decentralization. Industrial Management & Data Systems, 93, 8, 8-12.
-
(1993)
Industrial Management & Data Systems
, vol.93
, Issue.8
, pp. 8-12
-
-
Walker, K.B.1
-
29
-
-
77955101093
-
IT security governance and security centralization vs. decentralization
-
In M. Warkentin and R. Vaughn (eds.), , Hershey, PA: Idea Group Publishing
-
Warkentin, M., and Johnston, A.C. 2006. IT security governance and security centralization vs. decentralization. In M. Warkentin and R. Vaughn (eds.), Enterprise Information Security Assurance and System Security: Managerial and Technical Issues. Hershey, PA: Idea Group Publishing, pp. 16-24.
-
(2006)
Enterprise Information Security Assurance and System Security: Managerial and Technical Issues
, pp. 16-24
-
-
Warkentin, M.1
Johnston, A.C.2
-
30
-
-
50749133711
-
Key issues in information systems management
-
Watson, R.T., and Brancheau, J.C. 1991. Key issues in information systems management. Information & Management, 20, 3, 213-223.
-
(1991)
Information & Management
, vol.20
, Issue.3
, pp. 213-223
-
-
Watson, R.T.1
Brancheau, J.C.2
-
31
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
Whitman, M.E. 2003. Enemy at the gate: threats to information security. Communications of the ACM, 46, 8, 91-95.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
32
-
-
55249118035
-
Design alternatives for organizing information systems activities
-
Zmud, R.W. 1984. Design alternatives for organizing information systems activities. MIS Quarterly, 8, 2, 79-93.
-
(1984)
MIS Quarterly
, vol.8
, Issue.2
, pp. 79-93
-
-
Zmud, R.W.1
|