Inter-Organisational Information Sharing - Between a Rock and a Hard Place
暂无分享,去创建一个
Karin Hedström | Fredrik Karlsson | Ella Kolkowska | Magnus Frostenson | F. Karlsson | Karin Hedström | Magnus Frostenson | Ella Kolkowska
[1] Selim G. Akl,et al. Efficient enforcement of dynamic cryptographic access control policies for outsourced data , 2011, 2011 Information Security for South Africa.
[2] D. Polkinghorne. Language and meaning: Data collection in qualitative research. , 2005 .
[3] Hui Xiong,et al. Towards controlling virus propagation in information systems with point-to-group information sharing , 2009, Decis. Support Syst..
[4] Janis L. Gogan,et al. INFOSEC in a Basket, 2004-2013 , 2014, AMCIS.
[5] John R. Williams,et al. Interoperable internet scale security framework for RFID networks , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.
[6] Matthew Pemble,et al. Transferring business and support functions: the information security risks of outsourcing and off-shoring , 2004 .
[7] Per Oscarson,et al. Actual and Perceived Information Systems Security , 2007 .
[8] Ponnurangam Kumaraguru,et al. Information security practices followed in the Indian software services industry: An exploratory study , 2011, 2011 Second Worldwide Cybersecurity Summit (WCS).
[9] Peter Berghmans,et al. Information Security Risks in Enabling e-Government: The Impact of IT Vendors , 2011, Inf. Syst. Manag..
[10] M. Razvi Doomun,et al. Multi-level information system security in outsourcing domain , 2008, Bus. Process. Manag. J..
[11] Kjell Andersson,et al. Copper Corrosion in Nuclear Waste Disposal , 2013 .
[12] Yuh-Min Chen,et al. Secure resource sharing on cross-organization collaboration using a novel trust method , 2007 .
[13] Dimitris Gritzalis,et al. Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship , 2007, TrustBus.
[14] C. Robertson,et al. Stakeholder Perceptions of Offshoring and Outsourcing: The Role of Embedded Issues , 2010 .
[15] Pierluigi Ritrovato,et al. Dynamic security perimeters for inter-enterprise service integration , 2007, Future Gener. Comput. Syst..
[16] Gurpreet Dhillon,et al. Principles of information systems security - text and cases , 2006 .
[17] 日本規格協会. 情報技術-セキュリティ技術-情報セキュリティ管理策の実践のための規範 : ISO/IEC 27002 = Information technology-Security techniques-Code of practice for information security controls : ISO/IEC 27002 , 2013 .
[18] Gurpreet Dhillon,et al. Technical opinion: Information system security management in the new millennium , 2000, CACM.
[19] 日本規格協会. 情報技術-セキュリティ技術-情報セキュリティマネジメントシステム-要求事項 : 国際規格ISO/IEC 27001 = Information technology-Security techniques-Information security management systems-Requirements : ISO/IEC 27001 , 2005 .
[20] Gurpreet Dhillon,et al. Organizational Transformation and Information Security Culture: A Telecom Case Study , 2014, SEC.