Effective Information Security Requires a Balance of Social and Technology Factors
暂无分享,去创建一个
[1] RICHAFID BASKERVILLE,et al. Information systems security design methods: implications for information systems development , 1993, CSUR.
[2] Mikko T. Siponen,et al. An analysis of the traditional IS security approaches: implications for research and practice , 2005, Eur. J. Inf. Syst..
[3] Yolande E. Chan. Why Haven't We Mastered Alignment? The Importance of the Informal Organization Structure , 2002, MIS Q. Executive.
[4] S. Ghoshal,et al. Social Capital, Intellectual Capital, and the Organizational Advantage , 1998 .
[5] Harri Oinas-Kukkonen,et al. A review of information security issues and respective research contributions , 2007, DATB.
[6] Samer Faraj,et al. Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..
[7] Gregory B. White,et al. Dark Screen: An Exercise in Cyber Security , 2005, MIS Q. Executive.
[8] Robert J. Trent,et al. Achieving Excellence In , 2005 .