Agile Security For Information Warfare: A Call For Research
暂无分享,去创建一个
[1] Richard Baskerville,et al. Growing systems in an emergent organization , 2001 .
[2] Francisco J. Varela. Two Principles for Self-Organization , 1984 .
[3] Gerald L. Kovacich,et al. Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1 , 2002, Inf. Secur. J. A Glob. Perspect..
[4] Jan Pries-Heje,et al. Short cycle time systems development , 2004, Inf. Syst. J..
[5] Ashish Garg,et al. Quantifying the financial impact of IT security breaches , 2003, Inf. Manag. Comput. Secur..
[6] Steven Walczak. Information security for agent‐based WWW medical information retrieval , 2002 .
[7] Jan H. P. Eloff,et al. TOPM: a formal approach to the optimization of information technology risk management , 1994, Comput. Secur..
[8] Jacobus E. van der Merwe,et al. Electronic commerce with secure intelligent trade agent , 1997, ICICS.
[9] Mikko T. Siponen,et al. An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications , 2001 .
[10] Richard Baskerville,et al. Growing systems in emergent organizations , 1999, CACM.
[11] Gordon A. Manson,et al. An intelligent approach to prevent distributed systems attacks , 2002, Inf. Manag. Comput. Secur..
[12] Dorothy E. Denning,et al. Information Warfare And Security , 1998 .
[13] Kathy Crilley. Information warfare: new battle fields Terrorists, propaganda and the Internet , 2001 .
[14] W. Bergquist,et al. The Postmodern Organization: Mastering the Art of Irreversible Change , 1993 .
[15] Richard Baskerville,et al. Deep structure or emergence theory: contrasting theoretical foundations for information systems development , 1998, Inf. Syst. J..
[16] L. Crombie,et al. Everything you wanted to know about … , 1982, Nature.
[17] Gilles Van Nederveen. Stray Voltage: War in the Information Age , 2005 .
[18] Sebastiaan H. von Solms,et al. Refereed paper: Electronic commerce with secure intelligent trade agents , 1998 .
[19] M. Vatis. Cyber Attacks During the War on Terrorism: A Predictive Analysis , 2001 .
[20] Neelam Bhalla. Is the mouse click mighty enough to bring society to its knees? , 2003, Comput. Secur..
[21] Bruce D. Berkowitz,et al. The New Face of War: How War Will Be Fought in the 21st Century , 2003 .
[22] Alistair Cockburn,et al. Agile Software Development , 2001 .
[23] Jan Pries-Heje,et al. Is Internet-Speed Software Development Different? , 2003, IEEE Softw..
[24] Richard Baskerville,et al. Amethodical systems development: the deferred meaning of systems development methods , 2000 .