A Holistic Approach for Managing ICT Security in Non-Commercial Organisations : A Case Study in a Developing Country

The research reported here is about improvement of the ICT security management process in non-commercial organisations in order to reduce possible financial damage, taking into consideration the re ...

[1]  Åke Grönlund,et al.  Introducing e-Gov: History, Definitions, and Issues , 2005, Commun. Assoc. Inf. Syst..

[2]  Rossouw von Solms,et al.  Towards information security behavioural compliance , 2004, Comput. Secur..

[3]  Michael D. Myers,et al.  Qualitative Research in Information Systems , 1997, MIS Q..

[4]  Sebastiaan H. von Solms,et al.  Information Security governance: COBIT or ISO 17799 or both? , 2005, Comput. Secur..

[5]  John J. Mauriel,et al.  A Framework for Linking Culture and Improvement Initiatives in Organizations , 2000 .

[6]  Rahul De' E-Government Systems in Developing Countries: Stakeholders and Conflict , 2005, EGOV.

[7]  Information Technology Policies and Applications in the Commonwealth Developing Countries , 1993 .

[8]  L. Mullins Essentials of Organisational Behaviour , 2006 .

[9]  Charles G. Schoderbek,et al.  Management systems: Conceptual considerations , 1985 .

[10]  Charles N. Tarimo,et al.  ICT Security Readiness Checklist for Developing Countries: A Social-Technical Approach , 2006 .

[11]  Jan H. P. Eloff,et al.  Information Security Management System: Processes and Products , 2003, SEC.

[12]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[13]  Stefan Lindskog,et al.  Observations on Operating System Security Vulnerabilities , 2000 .

[14]  Rossouw von Solms,et al.  A framework for the governance of information security , 2004, Comput. Secur..

[15]  Julia H. Allen,et al.  Managing for Enterprise Security , 2004 .

[16]  Colin Robson,et al.  Real World Research: A Resource for Social Scientists and Practitioner-Researchers , 1993 .

[17]  L. R. Chao,et al.  An integrated system theory of information security management , 2003, Inf. Manag. Comput. Secur..

[18]  Rossouw von Solms,et al.  The 10 deadly sins of information security management , 2004, Comput. Secur..

[19]  Julia H. Allen,et al.  Outsourcing Managed Security Services , 2003 .

[20]  J. Eloff,et al.  Information security management: a new paradigm , 2003 .

[21]  RICHAFID BASKERVILLE,et al.  Information systems security design methods: implications for information systems development , 1993, CSUR.

[22]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[23]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[24]  李幼升,et al.  Ph , 1989 .

[25]  Steven Furnell,et al.  A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises , 2004, IICIS.

[26]  Louise Yngström,et al.  State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).

[27]  Steve Purser Improving the ROI of the security management process , 2004, Comput. Secur..

[28]  Tanzania. Tume ya Mipango The Tanzania development vision 2025 , 1999 .

[29]  Paul Bennell,et al.  Vocational Education and Training in Tanzania and Zimbabwe in the Context of Economic Reform , 1999 .

[30]  Thomas Peltier Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management , 2001 .

[31]  Daniel E. Geer,et al.  Information security is information risk management , 2001, NSPW '01.

[32]  Ludwig von Bertalanffy,et al.  The History and State of General Systems Theory , 1972 .

[33]  Christopher J. Alberts,et al.  Managing Information Security Risks: The OCTAVE Approach , 2002 .

[34]  F. Bjorck Discovering Information Security Management , 2005 .

[35]  M. Looijen,et al.  A model for improving ICT management , 2000, Proceedings of the 2000 IEEE International Conference on Management of Innovation and Technology. ICMIT 2000. 'Management in the 21st Century' (Cat. No.00EX457).

[36]  A. Clark,et al.  Enterprise Security Architecture: A Business-Driven Approach , 2005 .

[37]  Stephanie Teufel,et al.  Information security culture - from analysis to change , 2003, South Afr. Comput. J..

[38]  A. Goldberg General System Theory: Foundations, Development, Applications. , 1969 .

[39]  Ab Ruighaver,et al.  Understanding organisational security culture , 2002 .

[40]  Barbara J. Mack,et al.  Information Technology Security Handbook , 2003 .

[41]  A. Cohen,et al.  The symbolic construction of community , 2013 .

[42]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[43]  R. Power CSI/FBI computer crime and security survey , 2001 .

[44]  Ann Frisinger,et al.  A generic security evaluation method for open distributed systems , 2001 .

[45]  Michael D. Myers,et al.  Investigating Information Systems with Ethnographic Research , 1999, Commun. Assoc. Inf. Syst..

[46]  Robert M. Davison An action research perspective of group support systems : how to improve meetings in Hong Kong , 1998 .

[47]  J. Creswell Qualitative inquiry and research design: choosing among five traditions. , 1998 .

[48]  Joan Hash,et al.  Building an Information Technology Security Awareness and Training Program , 2003 .

[49]  W. Caelli,et al.  Information Security Handbook , 1991 .

[50]  Louise Yngström,et al.  A systemic-holistic approach to academic programmes in IT security , 1996 .

[51]  Louise Yngström,et al.  The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study , 2004, IICIS.

[52]  Christer Magnusson,et al.  Hedging shareholder value in an IT dependent business society : the framework BRITS , 1999 .

[53]  Louise Yngström,et al.  IT Security Readiness in Developing Countries , 2003, World Conference on Information Security Education.

[54]  M. KifleGelan A theoretical model for telemedicine : social and value outcomes in Sub-Saharan Africa. , 2006 .

[55]  Martin V. Curd,et al.  Philosophy of Science: The Central Issues , 1998 .