Information Technology Reference
In-Depth Information
Horowitz, A. Top 10 security mistakes. Computerworld , 35, 28,(2001).
Hull, S. People are the weak links in IT security. The Argus , April 16, 2002.
Karnopp, D., and Rosenberg, R.C. System Dynamics: A Unified Approach. New York: Wiley, 1975.
Lichtenstein, S., and Swatman, P.M.C. Internet acceptable usage policy for organizations. Information
Management & Computer Security , 5, 5 (1997), 182-190.
Lindup, K.R. A new model for information security policies. Computer & Security , 14, 8 (1995), 691-695.
Loch, K.D., and Conger, S. (1996). Evaluating ethical decision-making and computer use. Communications
of the ACM, 39 (7), 74-83.
Miles, D.E.; Borman, W.E.; Spector, P.E.; and Fox, S. Building an integrative model of extra role work
behaviors: a comparison of counterproductive work behavior with organizational citizenship behavior.
International Journal of Selection and Assessment , 10 (2002), 51-57.
Monrose, F., and Rubin, A. Authentication via keystroke dynamics. In 4th ACM Conference on Computer
and Communications Security, Zurich, Switzerland. New York: ACM Press, 1997, pp. 48-56.
OECD. OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of
Security. Organisation For Economic Co-Operation And Development, 2002 (available at: http://www.
oecd.org/dataoecd/16/22/15582260.pdf ).
Parasuraman, R., and Bowers, J.C. Attention and vigilance in human-computer interaction. In A. Gale
and B. Christie (eds.), Psychophysiology of the Electronic Workplace. London: Wiley, 1987, pp.
163-194.
Perry, W.E. Management Strategies for Computer Security. Boston: Butterworth, 1985.
Proctor, R.W.; Lien, M.-C.; Vu, K.-P.L.; Schultz, E.E.; and Salvendy, G. Improving computer security
for authentication of users: influence of proactive password restrictions. Behavior Research Methods,
Instruments & Computers , 34, 2 (2002), 163-169.
Rivest, R.L.; Shamir, A.; Adleman, L.A. A method for obtaining digital signatures and public-key cryp-
tosystems. Communications of the ACM , 21, 2 (1978), 120-126.
Salvendy, G. (ed.) Handbook of Human Factors. New York: Wiley-Interscience, 1987.
Scanlon, B. The weakest link. ZDNet Australia News & Technology, 2002 (available at: http://www.
zdnet.com.au/newstech/security/story/0,2000024985,20241014-5,00.htm).
Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C , 2nd ed. New York:
Wiley, 1995.
Schneier, B. Secrets and Lies. New York: Wiley, 2000.
Schultz, E.E. A framework for understanding and predicting insider attacks. Computers and Security, 21, 6
(2002), 526-531.
Security Wire Digest. CSI/FBI study says: security breaches on the rise. 2000 (available at http://www.
lexias.com/1.0/securitywiredigest_27MAR2000.html).
Seleznyov, A.; Mazhelis, O.; and Puuronen, S. Learning temporal regularities of user behavior for anomaly
detection. In V.I. Gorodetski, V.A. Skormin, and L.J. Popyack (eds.), Information Assurance in Computer
Networks. Methods, Models and Architectures for Network Security. St. Petersburg, Russia: International
Workshop MMM-ACNS, 2001, pp. 143-152.
Shaw, E.D.; Post, J.M.; and Ruby, K.G. Inside the mind of the insider . 2002 (available at: http://www.
securitymanagement.com/library/000762.html).
Singh, H.; Furnell, S.; Lines, B.; and Dowland, P. Investigating and Evaluating Behavioural Profiling and
Intrusion Detection Using Data Mining. In V.I. Gorodetski, V.A. Skormin, and L.J. Popyack (eds.),
Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security.
St. Petersburg, Russia: International Workshop MMM-ACNS, 2001, pp. 153-158.
Siponen, M.T. On the role of human morality in information systems security. Information Resources
Management Journal , 14, 4 (2001), 15-23.
Spurling, P. Promoting security awareness and commitment. Information Management & Computer Security,
3, 2 (1995), 20-26.
Stanton, J.M. Company profile of the frequent internet user: web addict or happy employee? Commun-
ications of the Association for Computing Machinery , 45, 1 (2002), 55-59.
Straub, D.W. Effective IS security: an empirical study. Information Systems Research , 1, 2 (1990), 255-277.
Straub, D.W., and Welke, R.J. Coping with systems risk: security planning models for management decision
making. MIS Quarterly, 22, 4 (1998), 441-464.
Thomson, M.E., and von Solms, R. Information security awareness: educating our users effectively.
Information Management & Computer Security , 6, 4 (1998), 167-173.
Search WWH ::




Custom Search