You are here

References

8 September, 2015 - 16:12

Adam, F., & Haslam, J. A. (2001). A Study of the Irish Experience with Disaster Recovery Planning: High Levels of Awareness May Not Suffice. In G. Dhillon (Ed.), Information Security Management: Global Challenges in the New Millennium . Hershey, PA: Idea Group Publishing.

Audit Commission. (1990). Survey of Computer Fraud & Abuse: The Audit Commission for Local Authorities and the National Health Service in England and Wales.

Audit Commission. (1994). Opportunity Makes a Thief. Analysis of Computer Abuse: The Audit Commission for Local Authorities and the National Health Service in England and Wales.

Backhouse, J., & Dhillon, G. (1995). Managing Computer Crime: A Research Outlook. Computers & Security, 14(7), 645–651.

Backhouse, J., & Dhillon, G. (1996). Structures of Responsibility and Security of Information Systems. European Journal of Information Systems, 5(1), 2–9.

Baskerville, R. (1992). The Developmental Duality of Information Systems Security. Journal of Management Systems, 4 (1), 1–12.

Chokron, M., & Reix, R. (1987). Planification des Systèmes d’Information et Stratégie de l’Enterprise. Révue Française de Gestion, Janvier/Fevrier, 12–17.

Dhillon, G. (1997). Managing Information System Security. London: Macmillan.

Dhillon, G. (1999a). Computer Crime: Interpreting Violation of Safeguards by Trusted Personnel. In M. Khosrowpour (Ed.), Managing Information Technology Resources in Organizations in the New Millennium. Hershey: Idea Group Publishing.

Dhillon, G. (1999b). Managing and Controlling Computer Misuse. Information Management & Computer Security, 7(5), 171–175.

Dhillon, G. (2007). Principles of Information Systems Security: Text and Cases. Hoboken, NJ: John Wiley & Sons.

Dhillon, G., & Backhouse, J. (1996). Risks in the Use of Information Technology Within Organizations. International Journal of Information Management, 16(1), 65–74.

Dhillon, G., & Backhouse, J. (2000). Information System Security Management in the New Millennium. Communications of the ACM, 43(7), 125–128.

Dhillon, G., & Orton, J. D. (2000). Schizoid Incoherence and Strategic Management of New Organizational Forms. Paper presented at the International Academy of Business Disciplines, March 30-April 2, Las Vegas.

Dhillon, G., & Phukan, S. (2000). Analyzing Myth and Reality of Computer Crimes. Paper presented at the BITWorld Conference, Mexico City, Mexico.

Dhillon, G., Silva, L. & Backhouse, J. (2004). Computer Crime at CEFORMA: A Case Study, International Journal of Information Management, 24(6), 551-561.

Drucker, P.F. (2001). Management Challenges for the 21st Century. New York: Harper Collins.

Erwin, D. G. (2002). Understanding Risk (or the Bombastic Prose and Soapbox Oratory of a 25-Year Veteran of the Computer Security Wars). Information Systems Security, 10(6), 14–17.

Garg, A. (2003). The Cost of Information Security Breaches. The SGV Review, 33–40.

Gordon, L. A., Loeb, M. P., Lucyshyn W. and Richardson, R. (2006). CSI/FBI Eleventh Annual Computer Crime and Security Survey. Computer Security Institute.

Henry, K. (2004). The Human Side of Information Security. In H. F. Tipton & M. Krause (Eds.), Information Security Management Handbook (Fifth ed.). Boca Raton: Auerbach.

Hitchings, J. (1994). The Need for a New Approach to Information Security. Paper presented at the 10th International Conference on Information Security (IFIP Sec '94), 23-27 May, Curacao, NA.

IBM (1996). A Risk too Far?, April, IBM, London.

ISBS (2006). DTI Information Security Breaches Survey 2006 – Technical Report, Department of Trade and Industry, UK.

Lehman, D. (2000). Cable cuts ground Northwest flights. Computer World.

Liebenau, J., & Backhouse, J. (1990). Understanding Information. London: Macmillan.

Longley, D. (1991). Formal Methods of Secure Systems. In W. Caelli, D. Longley, & M. Shain (Eds.), Information Security Handbook. New York: Stockton Press.

Mintzberg, H. (1983). Structures in Fives: Designing Effective Organizations. Englewood Cliffs, NJ: Prentice- Hall.

Mintzberg, H. (1994). The Rise and Fall of Strategic Planning. New York: The Free Press.

Neumann, P. G. (1994b). Inside Risks — Technology, Laws, and Society. Communications of the ACM, 37(3), 138.

OTA, (1994). Information Security and Privacy in Network Environments. Office of Technology Assessment.

Pouloudi, A. (2001). Addressing Prescription Fraud in the British National Health Service: Technological and Social Considerations. In G. Dhillon (Ed.), Information Security Management: Global Challenges in the New Millennium. Hershey, PA: Idea Group Publishing.

Schultz, E. E., Proctor, R. W., Lien, M.-C., & Salvendy, G. (2001). Usability and Security: An Appraisal of Usability Issues in Information Security Methods. Computers & Security, 20(7), 620–634.

Siponen, M. (2001). An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications. In G. Dhillon (Ed.), Information Security Management: Global Challenges in the Next Millennium. Hershey, PA: Idea Group Publishing.