ADOPTION OF INFORMATION SECURITY MEASURES IN PUBLIC RESEARCH INSTITUTES
暂无分享,去创建一个
[1] Mkhululi Tyukala. Governing information security using organisational information security profiles , 2007 .
[2] Sebastiaan H. von Solms,et al. Information Security Governance - Compliance management vs operational management , 2005, Comput. Secur..
[3] Paul Williams. Information Security Governance , 2001, Inf. Secur. Tech. Rep..
[4] P. Bowen,et al. Information Security Handbook: A Guide for Managers , 2006 .
[5] Soongoo Hong,et al. Information Security Policy Compliance in Higher Education: A Neo-Institutional Perspective , 2013, PACIS.
[6] Sebastiaan H. von Solms,et al. Information Security - The Fourth Wave , 2006, Comput. Secur..
[7] Antônio Eduardo de Albuquerque Junior,et al. Adoção de normas de segurança da informação em Institutos de Pesquisas no setor público: uma proposta de análise explorando as possibilidades da Teoria Institucional , 2013, CONF-IRM.
[8] Daniel Gideon Dresner,et al. A study of standards and the mitigation of risk in information systems , 2011 .
[9] Ali Hussein Saleh Zolait,et al. Assessment of Information Security Maturity: An Exploration Study of Malaysian Public Service Organizations , 2012, J. Syst. Inf. Technol..
[10] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[11] Katharina Burger,et al. Organizations Rational Natural And Open Systems , 2016 .
[12] Lizzie Coles-Kemp,et al. Information security management: An entangled research challenge , 2009, Inf. Secur. Tech. Rep..
[13] Eirik Albrechtsen,et al. Friend or foe? Information security management of employees , 2008 .
[14] Michael H. Cooper. Information security training: what will you communicate? , 2009, SIGUCCS '09.
[15] A. B. Ruighaver,et al. Security Governance: Its Impact on Security Culture , 2005, AISM.
[16] João Luiz Pereira Marciano. Segurança da informação: uma abordagem social , 2006 .
[17] Rolf Moulton,et al. Applying information security governance , 2003, Comput. Secur..
[19] Jeffrey Perkel. Cybersecurity: How safe are your data? , 2010, Nature.
[20] John W. Meyer,et al. Institutionalized Organizations: Formal Structure as Myth and Ceremony , 1977, American Journal of Sociology.
[21] Qing Hu,et al. The role of external and internal influences on information systems security - a neo-institutional perspective , 2007, J. Strateg. Inf. Syst..
[22] Susan P. Williams,et al. Information Security Governance: Investigating Diversity in Critical Infrastructure Organizations , 2012, Bled eConference.
[23] Massimo Bernaschi,et al. Enforcing network security: a real cease study in a research organization , 1999, Comput. Secur..
[24] W. Powell,et al. The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .
[25] Isabel Maria Lopes. Adopção de políticas de segurança de sistemas de informação na Administração Pública Local em Portugal , 2012 .
[26] Julia H. Allen,et al. Governing for Enterprise Security , 2005 .
[27] M. Mizruchi,et al. The Social Construction of Organizational Knowledge: A Study of the Uses of Coercive, Mimetic, and Normative Isomorphism , 1999 .
[28] Sebastiaan H. von Solms,et al. Information Security - The Third Wave? , 2000, Comput. Secur..
[29] Rossouw von Solms,et al. Information Security Governance: A model based on the Direct-Control Cycle , 2006, Comput. Secur..
[30] Rossouw von Solms,et al. A framework for the governance of information security , 2004, Comput. Secur..
[31] Alketa Peci,et al. A nova teoria institucional em estudos organizacionais: uma abordagem crítica , 2006 .
[32] João Carlos Soares De Alexandria. GESTÃO DA SEGURANÇA DA INFORMAÇÃO - UMA PROPOSTA PARA POTENCIALIZAR A EFETIVIDADE DA SEGURANÇA DA INFORMAÇÃO EM AMBIENTE DE PESQUISA CIENTÍFICA , 2009 .
[33] Lilian Milnitsky Stein,et al. Segurança da informação: uma reflexão sobre o componente humano Information security: a reflection on the human component , 2007 .
[34] Russell R. Barton,et al. Theorizing the concept and role of assurance in information systems security , 2013, Inf. Manag..
[35] Jan H. P. Eloff,et al. An Information Security Governance Framework , 2007, Inf. Syst. Manag..
[36] Rossouw von Solms,et al. Information security governance: Due care , 2006, Comput. Secur..
[38] Donald F. Westerheijden,et al. Adoption of ISO‐oriented quality management system in Greek universities: Reactions to isomorphic pressures , 2010 .
[39] Fredrik Björck,et al. Institutional Theory: A New Perspective for Research into IS/IT Security in Organisations , 2004, HICSS.
[40] Yacine Rezgui,et al. Information security awareness in higher education: An exploratory study , 2008, Comput. Secur..
[41] F. Bjorck. Discovering Information Security Management , 2005 .