The role of intrusion detection systems in electronic information security: From the activity theory perspective
暂无分享,去创建一个
[1] Randy Weaver,et al. Guide to Network Defense and Countermeasures , 2003 .
[2] Earl R. Babbie,et al. The practice of social research , 1969 .
[3] J F Gilgun. Decision-making in interdisciplinary treatment teams. , 1988, Child abuse & neglect.
[4] Bonnie Kaplan,et al. Qualitative Research Methods for Evaluating Computer Information Systems , 2005 .
[5] Wanda J. Orlikowski,et al. Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..
[6] A. N. Leont’ev,et al. Activity, consciousness, and personality , 1978 .
[7] Michael D. Myers,et al. A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..
[8] R. Yin. Case Study Research: Design and Methods , 1984 .
[9] L. Vygotsky. Mind in Society: The Development of Higher Psychological Processes: Harvard University Press , 1978 .
[10] Ranjit Kumar,et al. Research Methodology: A Step-by-Step Guide for Beginners , 1999 .
[11] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[12] Geoff Walsham,et al. Interpreting Information Systems in Organizations , 1993 .
[13] A. Kellerman,et al. The Constitution of Society : Outline of the Theory of Structuration , 2015 .
[14] Mikko Korpela,et al. Activity Theory in information systems research and practice - theoretical underpinnings for an information systems development method , 2007, Inf. Res..
[15] Richard Baskerville,et al. A Workshop on Two Techniques for Qualitative Data Analysis: Action Research and Ethnography , 1992, ICIS.
[16] M. Castells. Rise of the Network Society: The Information Age: Economy, Society and Culture , 1996 .
[17] S. Deetz. Crossroads---Describing Differences in Approaches to Organization Science: Rethinking Burrell and Morgan and Their Legacy , 1996 .
[18] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..
[19] John W. Creswell,et al. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2010 .
[20] Mark Ciampa. Security Awareness: Applying Practical Security in Your World , 2004 .
[21] Debra M. Amidon,et al. Innovation strategy for the knowledge economy : the ken awakening , 1997 .
[22] Thomas H. Davenport,et al. Book review:Working knowledge: How organizations manage what they know. Thomas H. Davenport and Laurence Prusak. Harvard Business School Press, 1998. $29.95US. ISBN 0‐87584‐655‐6 , 1998 .
[23] Allen S. Lee,et al. Information systems and qualitative research , 1997 .
[24] A. Klinghoffer,et al. A Plan for Action , 2019, The New Examination System - GCSE.
[25] Bruce C. Straits,et al. Approaches to social research , 1993 .
[26] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .