Generative Control Theory for Information Security
Increasing information security losses, coupled with more closely regulated security risk disclosure, are raising the importance of information security standards for identifying control gaps and for implementing appropriate and effective information security controls. Despite the growing importanc...
| Main Authors: | Raymond, B., Baskerville, Richard |
|---|---|
| Format: | Journal Article |
| Published: |
The Information Institute
2014
|
| Online Access: | http://www.jissec.org/Contents/V10/N1/jissec-v10n1-raymond-p41-ci/?searchterm=Generative Control Theory for Information Security http://hdl.handle.net/20.500.11937/11009 |
Similar Items
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Intervention effect rates as a path to research relevance: Information systems security example
by: Siponen, M., et al.
Published: (2018)
by: Siponen, M., et al.
Published: (2018)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
The emergence of design science research from decision theory
by: Baskerville, Richard
Published: (2018)
by: Baskerville, Richard
Published: (2018)
Setting our research agendas: Institutional ecology, informing sciences, or management fashion theory?
by: Myers, M., et al.
Published: (2011)
by: Myers, M., et al.
Published: (2011)
Design theorizing individual information systems
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Individual information systems as a research arena
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
The Design Theory Nexus
by: Pries-Heje, J., et al.
Published: (2008)
by: Pries-Heje, J., et al.
Published: (2008)
Explanatory design theory
by: Baskerville, Richard, et al.
Published: (2010)
by: Baskerville, Richard, et al.
Published: (2010)
Management Design Theories
by: Pries-Heje, J., et al.
Published: (2010)
by: Pries-Heje, J., et al.
Published: (2010)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Pre-theory design frameworks and design theorizing
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Functionality vs. Security in IS: Tradeoff or equilibrium
by: Baskerville, Richard, et al.
Published: (2012)
by: Baskerville, Richard, et al.
Published: (2012)
Design ethnography in information systems
by: Baskerville, Richard, et al.
Published: (2015)
by: Baskerville, Richard, et al.
Published: (2015)
Commentary on Gill and Bhattacherjee: Is there an informing crisis?
by: Myers, M., et al.
Published: (2009)
by: Myers, M., et al.
Published: (2009)
Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Fashion waves in information systems research and practice
by: Baskerville, Richard, et al.
Published: (2009)
by: Baskerville, Richard, et al.
Published: (2009)
Application of fuzzy set theory to evaluate the rate of aggregative risk in information security
by: Tamjidyamcholo, Alireza, et al.
Published: (2013)
by: Tamjidyamcholo, Alireza, et al.
Published: (2013)
Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises
by: Dhillon, G., et al.
Published: (2009)
by: Dhillon, G., et al.
Published: (2009)
Information systems as a reference discipline: Current debate and future directions
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Going back to basics in design science: from the information technology artifact to the information systems artifact
by: Lee, A., et al.
Published: (2015)
by: Lee, A., et al.
Published: (2015)
Diffusing best practices: A design science study using the theory of planned behavior
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Organizational Security Learning from Incident Response
by: Ahmad, A., et al.
Published: (2018)
by: Ahmad, A., et al.
Published: (2018)
Erratum to Agile requirements engineering practices and challenges: An empirical study [Information Systems Journal 20 (2010) 449-480]
by: Ramesh, B., et al.
Published: (2015)
by: Ramesh, B., et al.
Published: (2015)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
The creativity passdown effect: Sharing design thinking processes with design theory
by: Lee, J., et al.
Published: (2012)
by: Lee, J., et al.
Published: (2012)
The creativity passdown effect: applying design theory in creating instance design
by: Lee, J., et al.
Published: (2015)
by: Lee, J., et al.
Published: (2015)
A critical perspective on action research as a method for information systems research
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Information security professional perceptions of knowledge-sharing intention in virtual communities under social cognitive theory
by: Tamjidyamcholo, Alireza, et al.
Published: (2013)
by: Tamjidyamcholo, Alireza, et al.
Published: (2013)
Adopting Theories-Based Model Of Information Security Compliance Behaviour For Healthcare Employees In Kingdom Of Saudi Arabia
by: Tuwayrish S, Alanazi Sultan
Published: (2023)
by: Tuwayrish S, Alanazi Sultan
Published: (2023)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Principles for re-designing information systems for environmental sustainability
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Similar Items
-
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017) -
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008) -
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019) -
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008) -
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)