Human, Organizational and Technological Challenges of Implementing IT Security in Organizations
暂无分享,去创建一个
[1] Konstantin Beznosov,et al. Towards understanding IT security professionals and their tools , 2007, SOUPS '07.
[2] P. Carayon,et al. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. , 2007, Applied ergonomics.
[3] Rossouw von Solms,et al. Information security obedience: a definition , 2005, Comput. Secur..
[4] Ray J. Paul,et al. The interrelationship and effect of culture and risk communication in setting internet banking security goals , 2004, ICEC '04.
[5] Scott D. Lathrop,et al. Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[6] Hock-Hai Teo,et al. An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..
[7] Robert Garigue,et al. A Structured Approach to Incident Postmortems , 2002, Inf. Secur. J. A Glob. Perspect..
[8] Marvin V. Zelkowitz,et al. Maintaining software with a security perspective , 2002, International Conference on Software Maintenance, 2002. Proceedings..
[9] M. Sandelowski. Whatever happened to qualitative description? , 2000, Research in nursing & health.
[10] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[11] Finn Olav Sveen,et al. Helping prevent information security risks in the transition to integrated operations , 2005 .