Measuring computer system security using software security metrics
Proceedings of the 2nd IFIP international conference on Computer security: a global challenge
Computer security: a comprehensive controls checklist
Computer security: a comprehensive controls checklist
Designing information systems security
Designing information systems security
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Communications of the ACM
Information systems development and data modeling: conceptual and philosophical foundations
Information systems development and data modeling: conceptual and philosophical foundations
Baseline security guidelines for health care management
Data security for health care, vol. I
Code of practice: a standard for information security management
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
A set of principles for conducting and evaluating interpretive field studies in information systems
MIS Quarterly - Special issue on intensive research in information systems
Safe: Security Audit and Field Evaluation for Computer Facilities and Information Systems
Safe: Security Audit and Field Evaluation for Computer Facilities and Information Systems
Computer Security Research: A British Perspective
IEEE Software
From Trusted Information Security Controls to a Trusted Information Security Environment
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
A Paradigmatic Analysis Contrasting Information Systems Development Approaches and Methodologies
Information Systems Research
A Process Standard for System Security Engineering: Development Experiences and Pilot Results
ISESS '97 Proceedings of the 3rd International Software Engineering Standards Symposium (ISESS '97)
A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches
Journal of Management Information Systems
Do secure information system design methods provide adequate modeling support?
Information and Software Technology
Firms' information security investment decisions: Stock market evidence of investors' behavior
Decision Support Systems
The information security policy unpacked: A critical study of the content of university policies
International Journal of Information Management: The Journal for Information Professionals
Institutional Influences on Information Systems Security Innovations
Information Systems Research
Information Resources Management Journal
Hi-index | 0.00 |
Scholars have developed several modern information systems security (ISS) methods. Yet the traditional ISS methods - ISS checklists, ISS standards, ISS maturity criteria, risk management (RM) and formal methods (FM) - are still among the most used ISS methods. This study makes sense of these traditional ISS methods by comparing their underlying key assumptions. The main finding is that the traditional ISS methods regurgitate several features and assumptions that are required to be dealt with by traditional ISS methods developers and practitioners.