A Holistic Approach for Managing ICT Security in Non-Commercial Organisations : A Case Study in a Developing Country
暂无分享,去创建一个
[1] Åke Grönlund,et al. Introducing e-Gov: History, Definitions, and Issues , 2005, Commun. Assoc. Inf. Syst..
[2] Rossouw von Solms,et al. Towards information security behavioural compliance , 2004, Comput. Secur..
[3] Michael D. Myers,et al. Qualitative Research in Information Systems , 1997, MIS Q..
[4] Sebastiaan H. von Solms,et al. Information Security governance: COBIT or ISO 17799 or both? , 2005, Comput. Secur..
[5] John J. Mauriel,et al. A Framework for Linking Culture and Improvement Initiatives in Organizations , 2000 .
[6] Rahul De'. E-Government Systems in Developing Countries: Stakeholders and Conflict , 2005, EGOV.
[7] Information Technology Policies and Applications in the Commonwealth Developing Countries , 1993 .
[8] L. Mullins. Essentials of Organisational Behaviour , 2006 .
[9] Charles G. Schoderbek,et al. Management systems: Conceptual considerations , 1985 .
[10] Charles N. Tarimo,et al. ICT Security Readiness Checklist for Developing Countries: A Social-Technical Approach , 2006 .
[11] Jan H. P. Eloff,et al. Information Security Management System: Processes and Products , 2003, SEC.
[12] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[13] Stefan Lindskog,et al. Observations on Operating System Security Vulnerabilities , 2000 .
[14] Rossouw von Solms,et al. A framework for the governance of information security , 2004, Comput. Secur..
[15] Julia H. Allen,et al. Managing for Enterprise Security , 2004 .
[16] Colin Robson,et al. Real World Research: A Resource for Social Scientists and Practitioner-Researchers , 1993 .
[17] L. R. Chao,et al. An integrated system theory of information security management , 2003, Inf. Manag. Comput. Secur..
[18] Rossouw von Solms,et al. The 10 deadly sins of information security management , 2004, Comput. Secur..
[19] Julia H. Allen,et al. Outsourcing Managed Security Services , 2003 .
[20] J. Eloff,et al. Information security management: a new paradigm , 2003 .
[21] RICHAFID BASKERVILLE,et al. Information systems security design methods: implications for information systems development , 1993, CSUR.
[22] Charles P. Pfleeger,et al. Security in computing , 1988 .
[23] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[25] Steven Furnell,et al. A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises , 2004, IICIS.
[26] Louise Yngström,et al. State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).
[27] Steve Purser. Improving the ROI of the security management process , 2004, Comput. Secur..
[28] Tanzania. Tume ya Mipango. The Tanzania development vision 2025 , 1999 .
[29] Paul Bennell,et al. Vocational Education and Training in Tanzania and Zimbabwe in the Context of Economic Reform , 1999 .
[30] Thomas Peltier. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management , 2001 .
[31] Daniel E. Geer,et al. Information security is information risk management , 2001, NSPW '01.
[32] Ludwig von Bertalanffy,et al. The History and State of General Systems Theory , 1972 .
[33] Christopher J. Alberts,et al. Managing Information Security Risks: The OCTAVE Approach , 2002 .
[34] F. Bjorck. Discovering Information Security Management , 2005 .
[35] M. Looijen,et al. A model for improving ICT management , 2000, Proceedings of the 2000 IEEE International Conference on Management of Innovation and Technology. ICMIT 2000. 'Management in the 21st Century' (Cat. No.00EX457).
[36] A. Clark,et al. Enterprise Security Architecture: A Business-Driven Approach , 2005 .
[37] Stephanie Teufel,et al. Information security culture - from analysis to change , 2003, South Afr. Comput. J..
[38] A. Goldberg. General System Theory: Foundations, Development, Applications. , 1969 .
[39] Ab Ruighaver,et al. Understanding organisational security culture , 2002 .
[40] Barbara J. Mack,et al. Information Technology Security Handbook , 2003 .
[41] A. Cohen,et al. The symbolic construction of community , 2013 .
[42] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[43] R. Power. CSI/FBI computer crime and security survey , 2001 .
[44] Ann Frisinger,et al. A generic security evaluation method for open distributed systems , 2001 .
[45] Michael D. Myers,et al. Investigating Information Systems with Ethnographic Research , 1999, Commun. Assoc. Inf. Syst..
[46] Robert M. Davison. An action research perspective of group support systems : how to improve meetings in Hong Kong , 1998 .
[47] J. Creswell. Qualitative inquiry and research design: choosing among five traditions. , 1998 .
[48] Joan Hash,et al. Building an Information Technology Security Awareness and Training Program , 2003 .
[49] W. Caelli,et al. Information Security Handbook , 1991 .
[50] Louise Yngström,et al. A systemic-holistic approach to academic programmes in IT security , 1996 .
[51] Louise Yngström,et al. The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study , 2004, IICIS.
[52] Christer Magnusson,et al. Hedging shareholder value in an IT dependent business society : the framework BRITS , 1999 .
[53] Louise Yngström,et al. IT Security Readiness in Developing Countries , 2003, World Conference on Information Security Education.
[54] M. KifleGelan. A theoretical model for telemedicine : social and value outcomes in Sub-Saharan Africa. , 2006 .
[55] Martin V. Curd,et al. Philosophy of Science: The Central Issues , 1998 .