-
1
-
-
84986665106
-
The measurement and antecedents of affective, continuance, and normative commitment to the organization
-
Allen, N.J., and Meyer, J.P. The measurement and antecedents of affective, continuance, and normative commitment to the organization. Journal of Occupational Psychology, 63 (1990), 1-18.
-
(1990)
Journal of Occupational Psychology
, vol.63
, pp. 1-18
-
-
Allen, N.J.1
Meyer, J.P.2
-
2
-
-
0242621900
-
-
Washington, DC: Rand
-
Anderson, R.H.; Feldman, P.M.; Gerwehr, S.; Houghton, B.; Mesic, R.; Pinder, J.D.; Rothenberg, J.; and Chiesa, J. Securing the U.S. defense information infrastructure: A proposed approach. Washington, DC: Rand, 1999.
-
(1999)
Securing the U.S. defense information infrastructure: A proposed approach
-
-
Anderson, R.H.1
Feldman, P.M.2
Gerwehr, S.3
Houghton, B.4
Mesic, R.5
Pinder, J.D.6
Rothenberg, J.7
Chiesa, J.8
-
3
-
-
0029697680
-
-
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8
-
Anderson, R. A Security Policy Model for Clinical Information Systems. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8, 1996, pp. 30-43.
-
(1996)
A Security Policy Model for Clinical Information Systems
, pp. 30-43
-
-
Anderson, R.1
-
4
-
-
0034294058
-
Potential determinants of heavier internet usage
-
Armstrong, L.; Phillips, J.G.; and Saling, L.L. Potential determinants of heavier internet usage. International Journal of Human-Computer Studies, 53, 4 (2000), 537-550.
-
(2000)
International Journal of Human-Computer Studies
, vol.53
, Issue.4
, pp. 537-550
-
-
Armstrong, L.1
Phillips, J.G.2
Saling, L.L.3
-
5
-
-
0024669859
-
Effect of perceived controllability and performance standards on self-regulation of complex decision making
-
Bandura, A., and Wood, R. Effect of perceived controllability and performance standards on self-regulation of complex decision making. Journal of Personality and Social Psychology, 56 (1989), 805-814.
-
(1989)
Journal of Personality and Social Psychology
, vol.56
, pp. 805-814
-
-
Bandura, A.1
Wood, R.2
-
7
-
-
18144412521
-
-
Unpublished manuscript. Canberra, Australia: Australian National University
-
Clarke, R. Introduction to Information Security. Unpublished manuscript. Canberra, Australia: Australian National University, 2001 (available at http://www.anu.edu.au/people/Roger.Clarke/EC/IntroSecy.html).
-
(2001)
Introduction to Information Security
-
-
Clarke, R.1
-
8
-
-
11944272254
-
A power primer
-
Cohen, J. A power primer. Psychological Bulletin, 112, 1 (1992), 155-159.
-
(1992)
Psychological Bulletin
, vol.112
, Issue.1
, pp. 155-159
-
-
Cohen, J.1
-
9
-
-
0036398120
-
Policy enforcement in the workplace
-
David, J. Policy enforcement in the workplace. Computers and Security, 21, 6 (2002), 506-513.
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 506-513
-
-
David, J.1
-
11
-
-
33744996371
-
-
London: Presentation Services
-
Ernst and Young LLP. Global Information Security Survey. London: Presentation Services, 2002.
-
(2002)
Global Information Security Survey
-
-
-
14
-
-
84990029315
-
The economics of information security investment
-
Gordon, L.A., and Loeb, M.P. The economics of information security investment. ACM Transactions on Information and System Security, 5, 4 (2002), 438-457.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
15
-
-
8744298236
-
Disaster recovery planning: A strategy for data security
-
Hawkins, S.M.; Yen, D.C.; and Chou, D.C. Disaster recovery planning: a strategy for data security. Information Management and Computer Security, 8, 5 (2000), 222-229.
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.5
, pp. 222-229
-
-
Hawkins, S.M.1
Yen, D.C.2
Chou, D.C.3
-
16
-
-
7744225382
-
Top 10 security mistakes
-
Horowitz, A. Top 10 security mistakes. Computerworld, 35, 28, (2001).
-
(2001)
Computerworld
, vol.35
, pp. 28
-
-
Horowitz, A.1
-
17
-
-
85139702606
-
People are the weak links in IT security
-
April 16
-
Hull, S. People are the weak links in IT security. The Argus, April 16, 2002.
-
(2002)
The Argus
-
-
Hull, S.1
-
19
-
-
84986173272
-
Internet acceptable usage policy for organizations
-
Lichtenstein, S., and Swatman, P.M.C. Internet acceptable usage policy for organizations. Information Management and Computer Security, 5, 5 (1997), 182-190.
-
(1997)
Information Management and Computer Security
, vol.5
, Issue.5
, pp. 182-190
-
-
Lichtenstein, S.1
Swatman, P.M.C.2
-
20
-
-
0029545652
-
A new model for information security policies
-
Lindup, K.R. A new model for information security policies. Computer and Security, 14, 8 (1995), 691-695.
-
(1995)
Computer and Security
, vol.14
, Issue.8
, pp. 691-695
-
-
Lindup, K.R.1
-
21
-
-
0030194196
-
Evaluating ethical decision-making and computer use
-
Loch, K.D., and Conger, S. (1996). Evaluating ethical decision-making and computer use. Communications of the ACM, 39 (7), 74-83.
-
(1996)
Communications of the ACM
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Conger, S.2
-
22
-
-
0036000504
-
Building an integrative model of extra role work behaviors: A comparison of counterproductive work behavior with organizational citizenship behavior
-
Miles, D.E.; Borman, W.E.; Spector, P.E.; and Fox, S. Building an integrative model of extra role work behaviors: a comparison of counterproductive work behavior with organizational citizenship behavior. International Journal of Selection and Assessment, 10 (2002), 51-57.
-
(2002)
International Journal of Selection and Assessment
, vol.10
, pp. 51-57
-
-
Miles, D.E.1
Borman, W.E.2
Spector, P.E.3
Fox, S.4
-
23
-
-
0030675109
-
Authentication via keystroke dynamics
-
Zurich, Switzerland. New York: ACM Press
-
Monrose, F., and Rubin, A. Authentication via keystroke dynamics. In 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland. New York: ACM Press, 1997, pp. 48-56.
-
(1997)
4th ACM Conference on Computer and Communications Security
, pp. 48-56
-
-
Monrose, F.1
Rubin, A.2
-
25
-
-
0242666477
-
Attention and vigilance in human-computer interaction
-
A. Gale and B. Christie, London: Wiley
-
Parasuraman, R., and Bowers, J.C. Attention and vigilance in human-computer interaction. In A. Gale and B. Christie (eds.), Psychophysiology of the Electronic Workplace. London: Wiley, 1987, pp. 163-194.
-
(1987)
Psychophysiology of the Electronic Workplace
, pp. 163-194
-
-
Parasuraman, R.1
Bowers, J.C.2
-
27
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
Proctor, R.W.; Lien, M.-C.; Vu, K.-P.L.; Schultz, E.E.; and Salvendy, G. Improving computer security for authentication of users: influence of proactive password restrictions. Behavior Research Methods, Instruments and Computers, 34, 2 (2002), 163-169.
-
(2002)
Behavior Research Methods, Instruments and Computers
, vol.34
, Issue.2
, pp. 163-169
-
-
Proctor, R.W.1
Lien, M.-C.2
Vu, K.-P.L.3
Schultz, E.E.4
Salvendy, G.5
-
28
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L.; Shamir, A.; Adleman, L.A. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 2 (1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
30
-
-
85139648600
-
The weakest link
-
Scanlon, B. The weakest link. ZDNet Australia News and Technology, 2002 (available at: http://www.zdnet.com.au/newstech/security/story/0, 2000024985, 20241014-5, 00.htm).
-
(2002)
ZDNet Australia News and Technology
-
-
Scanlon, B.1
-
33
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E.E. A framework for understanding and predicting insider attacks. Computers and Security, 21, 6 (2002), 526-531.
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
35
-
-
84955605432
-
Learning temporal regularities of user behavior for anomaly detection
-
V.I. Gorodetski, V.A. Skormin, and L.J. Popyack, St. Petersburg, Russia: International Workshop MMM-ACNS
-
Seleznyov, A.; Mazhelis, O.; and Puuronen, S. Learning temporal regularities of user behavior for anomaly detection. In V.I. Gorodetski, V.A. Skormin, and L.J. Popyack (eds.), Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security. St. Petersburg, Russia: International Workshop MMM-ACNS, 2001, pp. 143-152.
-
(2001)
Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security
, pp. 143-152
-
-
Seleznyov, A.1
Mazhelis, O.2
Puuronen, S.3
-
37
-
-
47149111699
-
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
-
V.I. Gorodetski, V.A. Skormin, and L.J. Popyack, St. Petersburg, Russia: International Workshop MMM-ACNS
-
Singh, H.; Furnell, S.; Lines, B.; and Dowland, P. Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. In V.I. Gorodetski, V.A. Skormin, and L.J. Popyack (eds.), Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security. St. Petersburg, Russia: International Workshop MMM-ACNS, 2001, pp. 153-158.
-
(2001)
Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security
, pp. 153-158
-
-
Singh, H.1
Furnell, S.2
Lines, B.3
Dowland, P.4
-
38
-
-
85001555189
-
On the role of human morality in information systems security
-
Siponen, M.T. On the role of human morality in information systems security. Information Resources Management Journal, 14, 4 (2001), 15-23.
-
(2001)
Information Resources Management Journal
, vol.14
, Issue.4
, pp. 15-23
-
-
Siponen, M.T.1
-
40
-
-
0242537133
-
Company profile of the frequent internet user: Web addict or happy employee?
-
Stanton, J.M. Company profile of the frequent internet user: web addict or happy employee? Communications of the Association for Computing Machinery, 45, 1 (2002), 55-59.
-
(2002)
Communications of the Association for Computing Machinery
, vol.45
, Issue.1
, pp. 55-59
-
-
Stanton, J.M.1
-
41
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D.W. Effective IS security: an empirical study. Information Systems Research, 1, 2 (1990), 255-277.
-
(1990)
Information Systems Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
42
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W., and Welke, R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22, 4 (1998), 441-464.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
43
-
-
0242517401
-
Information security awareness: Educating our users effectively
-
Thomson, M.E., and von Solms, R. Information security awareness: educating our users effectively. Information Management and Computer Security, 6, 4 (1998), 167-173.
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
von Solms, R.2
-
44
-
-
0034926180
-
A framework for the implementation of socio-ethical controls in information security
-
Trompeter, C.M., and Eloff, J.H.P. A framework for the implementation of socio-ethical controls in information security. Computers and Security, 20 (2001), 384-391.
-
(2001)
Computers and Security
, vol.20
, pp. 384-391
-
-
Trompeter, C.M.1
Eloff, J.H.P.2
-
46
-
-
0039639238
-
Organizational computer security policy: The reality
-
Warman, A.R. Organizational computer security policy: the reality. European Journal of Information Systems, 1, 5 (1992), 305-310.
-
(1992)
European Journal of Information Systems
, vol.1
, Issue.5
, pp. 305-310
-
-
Warman, A.R.1
-
47
-
-
2142852379
-
Cost-Benefit Analysis for Network Intrusion Detection Systems
-
Washington, DC, October
-
Wei, H.; Frinke, D.; Olivia, C.; and Ritter, C. Cost-Benefit Analysis for Network Intrusion Detection Systems. In Proceedings of the CSI 28th Annual Computer Security Conference, Washington, DC, October 2001.
-
(2001)
Proceedings of the CSI 28th Annual Computer Security Conference
-
-
Wei, H.1
Frinke, D.2
Olivia, C.3
Ritter, C.4
-
49
-
-
0000613590
-
Writing infosec policies
-
Wood, C.C. Writing infosec policies. Computer and Security, 14, 8 (1995), 667-674.
-
(1995)
Computer and Security
, vol.14
, Issue.8
, pp. 667-674
-
-
Wood, C.C.1
-
51
-
-
0008915230
-
-
Technical. 500, Computer Laboratory, University of Cambridge
-
Yan, J.; Blackwell, A.; Anderson, R.; and Grant, A. The Memorability and Security of Passwords-Some Empirical Results. Technical Report No. 500, Computer Laboratory, University of Cambridge, 2000 (available at http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf).
-
(2000)
The Memorability and Security of Passwords-Some Empirical Results
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
52
-
-
78651413507
-
User profiling for intrusion detection using dynamic and static behavioral models
-
M.-S. Cheng, P.S. Yu, and B. Liu, PAKDD 2002, Taipei, Taiwan, May 6-8, 2002. 2002, Proceedings
-
Yeung, D.-Y., and Ding, Y. (2002). User profiling for intrusion detection using dynamic and static behavioral models. In M.-S. Cheng, P.S. Yu, and B. Liu (eds.), Advances in Knowledge Discovery and Data Mining 6th Pacific-Asia Conference, PAKDD 2002, Taipei, Taiwan, May 6-8, 2002. Proceedings, 2002, pp. 494-505.
-
(2002)
Advances in Knowledge Discovery and Data Mining 6th Pacific-Asia Conference
, pp. 494-505
-
-
Yeung, D.-Y.1
Ding, Y.2
|