Economic Disruptions, Business Continuity Planning and Disaster Forensic Analysis: The Hawaii Business Recovery Center (HIBRC) Project
暂无分享,去创建一个
Jason Levy | Peiyong Yu | Ross Prizzia | J. Levy | R. Prizzia | Peiyong Yu
[1] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[2] Gurpreet Dhillon,et al. Technical opinion: Information system security management in the new millennium , 2000, CACM.
[3] Kathleen J. Tierney,et al. Business Impacts of the Northridge Earthquake , 1997 .
[4] Ron Weber,et al. Toward a Theory of the Deep Structure of Information Systems , 1990, ICIS.
[5] David T Flynn. The impact of disasters on small business disaster planning: a case study. , 2007, Disasters.
[6] Eugene Tucker,et al. Risk Analysis and the Security Survey , 1999 .
[7] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[8] Nadia Nedjah,et al. Special issue on soft computing for information system security , 2011, Appl. Soft Comput..
[9] Miles Jakeman,et al. Security Risk Management , 2009 .
[10] Kaori Yoshida,et al. Determinants of Small Business Hazard Mitigation , 2005 .
[11] Earthquake Recovery , 1998 .
[12] James M. Dahlhamer,et al. Rebounding from Disruptive Events: Business Recovery Following the Northridge Earthquake , 1998 .
[13] Rodney C. Runyan,et al. Small Business in the Face of Crisis: Identifying Barriers to Recovery from a Natural Disaster , 2006 .
[14] Yanhui Zhou,et al. Fuzzy Logic Based Method for Network Information Security Risk Assessment , 2011, 2011 International Conference on Internet Technology and Applications.
[15] Lawrence J. Vale,et al. The resilient city : how modern cities recover from disaster , 2005 .
[16] Leonard I. Krauss,et al. Safe: Security Audit and Field Evaluation for Computer Facilities and Information Systems , 1981 .
[17] Stephanie E. Chang,et al. Disaster vulnerability of businesses in the 2001 Nisqually earthquake , 2002 .
[18] Gurpreet Dhillon,et al. Interpreting Deep Structures of Information Systems Security , 2012, Comput. J..
[19] Qing Shen,et al. Economic Impacts of the Loma Prieta Earthquake: A Focus on Small Businesses , 1991 .
[20] Leigh Graham. Permanently Failing Organizations? Small Business Recovery After September 11, 2001 , 2007 .
[21] Djillali Benouar. Researching causes in 2003 Algiers (Algeria) earthquake disaster: A new multidisciplinary approach to learn lessons from disasters (Forensic Investigations of Disasters (FORIN)) , 2014 .
[22] J. Talbot,et al. Security Risk Management Body of Knowledge , 2009 .
[23] Richard Baskerville,et al. A New Paradigm for Adding Security Into IS Development Methods , 2001, Conference on Information Security Management & Small Systems Security.
[24] Mikko T. Siponen,et al. An analysis of the traditional IS security approaches: implications for research and practice , 2005, Eur. J. Inf. Syst..
[25] John McLean,et al. The specification and modeling of computer security , 1990, Computer.