Role-Based Access Control Models
Computer
Security in computing
Balancing cooperation and risk in intrusion detection
ACM Transactions on Information and System Security (TISSEC)
Identification of host audit data to detect attacks on low-level IP vulnerabilities
Journal of Computer Security
NetSTAT: a network-based intrusion detection system
Journal of Computer Security
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Journal of Computer Security - IFIP 2000
Budgeting process for information security expenditures
Communications of the ACM - Personal information management
Password security: an empirical study
Journal of Management Information Systems
Information Systems Frontiers
International Journal of Electronic Commerce
The DeLone and McLean Model of Information Systems Success: A Ten-Year Update
Journal of Management Information Systems
Secur(e/ity) Management: A Continuing Uphill Climb
Journal of Network and Systems Management
An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price
IEEE Transactions on Software Engineering
Information Resources Management Journal
Exploring information security issues in public sector inter-organizational collaboration
EGOV'11 Proceedings of the 10th IFIP WG 8.5 international conference on Electronic government
Hi-index | 0.00 |
As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.