Information security goals in a Swedish hospital
暂无分享,去创建一个
[1] R. Baskerville,et al. An information security meta‐policy for emergent organizations , 2002 .
[2] H. Davies,et al. Implementing culture change in health care: theory and practice. , 2003, International journal for quality in health care : journal of the International Society for Quality in Health Care.
[3] Rose-Mharie Åhlfeldt,et al. Information Security in a Distributed Healthcare Domain : Exploring the Problems and Needs of Different Healthcare Providers , 2006 .
[4] Rossouw von Solms,et al. Management of risk in the information age , 2005, Comput. Secur..
[5] Gurpreet Dhillon,et al. Technical opinion: Information system security management in the new millennium , 2000, CACM.
[6] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[7] Per Oscarson,et al. Actual and Perceived Information Systems Security , 2007 .
[8] Jack Tsai,et al. A comparison of electronic records to paper records in mental health centers. , 2007, International journal for quality in health care : journal of the International Society for Quality in Health Care.
[9] G. Dhillon. Managing information system security , 1997 .
[10] R. Solms,et al. Cultivating an organizational information security culture , 2006 .
[11] Gurpreet Dhillon,et al. Principles of information systems security - text and cases , 2006 .
[12] Edward H. Freeman. Holistic Information Security: ISO 27001 and Due Care , 2007, Inf. Secur. J. A Glob. Perspect..
[13] Karin Hedström,et al. The values of IT in elderly care , 2007, Inf. Technol. People.
[14] Sebastiaan H. von Solms,et al. Information Security - The Third Wave? , 2000, Comput. Secur..
[15] Rossouw von Solms,et al. Towards an Information Security Competence Maturity Model , 2006 .
[16] Sebastiaan H. von Solms,et al. Information Security - The Fourth Wave , 2006, Comput. Secur..
[17] Jean-Noël Ezingeard,et al. Anchoring information security governance research: sociological groundings and future directions , 2006 .
[18] Rossouw von Solms,et al. From policies to culture , 2004, Comput. Secur..
[19] Rossouw von Solms,et al. From information security to ... business security? , 2005, Comput. Secur..
[20] Richard Baskerville,et al. A New Paradigm for Adding Security Into IS Development Methods , 2001, Conference on Information Security Management & Small Systems Security.
[21] Eric S. K. Yu,et al. Modeling organizations for information systems requirements engineering , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.
[22] Rossouw von Solms,et al. Towards information security behavioural compliance , 2004, Comput. Secur..
[23] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[24] James M. Anderson,et al. Why we need a new definition of information security , 2003, Comput. Secur..
[25] Rolf Moulton,et al. Applying information security governance , 2003, Comput. Secur..