Technical opinion: Information system security management in the new millennium
Communications of the ACM
Computer security: quality rather than quantity
Communications of the ACM
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
IEEE Security and Privacy
Enemy at the gate: threats to information security
Communications of the ACM - Program compaction
Why there aren't more information security research studies
Information and Management
IEEE Security and Privacy
SP 800-30. Risk Management Guide for Information Technology Systems
SP 800-30. Risk Management Guide for Information Technology Systems
On the importance of securing telephony systems
WSEAS TRANSACTIONS on COMMUNICATIONS
Modern telephony threats & countermeasures
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Firm objectives, IT alignment, and information security
IBM Journal of Research and Development
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls
Decision Support Systems
Decision support for Cybersecurity risk planning
Decision Support Systems
Did IT consulting firms gain when their clients were breached?
Computers in Human Behavior
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
On identifying proper security mechanisms
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Integrated system for control and monitoring industrial wireless networks for labor risk prevention
Journal of Network and Computer Applications
Hi-index | 0.00 |
Previous studies of organizations' use of information security controls have focused on the presence or absence of controls, rather than their quality. According to the authors' survey focusing on control quality, implementation quality varies significantly by organization size as well as industry.