A soft approach to management of information security.
The key theme of this research is the planning and management of information security and in particular, the research focuses on the involvement of information stakeholders in this process. The main objective of the research is to study the ownership of, and acceptance of responsibility for, informa...
| Main Author: | Armstrong, Helen |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
Curtin University
1999
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/1238 |
Similar Items
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
Security and quality issues in IT projects
by: El Desouki, Hassan, et al.
Published: (2010)
by: El Desouki, Hassan, et al.
Published: (2010)
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009)
by: Armstrong, Helen, et al.
Published: (2009)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
An approach to visualising information security knowledge
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
CNSS Mapping for IA lab exercises
by: Dodge, R., et al.
Published: (2009)
by: Dodge, R., et al.
Published: (2009)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Disclosure of organizational information on social media: Perspectives from security managers
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2013)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Resubmit my Information Security Thesis? - You must be joking!
by: Armstrong, Helen, et al.
Published: (2007)
by: Armstrong, Helen, et al.
Published: (2007)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A survey of public sector information resource management in Australia
by: Potger, Richard, et al.
Published: (2000)
by: Potger, Richard, et al.
Published: (2000)
Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
by: Abdul Molok , Nurul Nuha, et al.
Published: (2011)
Moderating effects of information asymmetry on relationship among future firm performance, corporate governance and insider trading
by: Yasmin, Jamadar
Published: (2022)
by: Yasmin, Jamadar
Published: (2022)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Psychopathy as a Phenomenon of Interest in Information Systems Research
by: Jarman, Rodney
Published: (2013)
by: Jarman, Rodney
Published: (2013)
An exploration of community-based organizations' information management challenges
by: Joseph, Pauline
Published: (2015)
by: Joseph, Pauline
Published: (2015)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
The informational role of prestigious gatekeepers under different economic conditions and regulatory reforms: the case of the IPO market
by: Attuwaijri, Hend
Published: (2020)
by: Attuwaijri, Hend
Published: (2020)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
An Integrated Approach in Risk Management Process for Identifying Information Security Threats using Medical Research Design
by: Ahmad, Rabiah
Published: (2012)
by: Ahmad, Rabiah
Published: (2012)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
by: Shuhaib Mir, Mohammad, et al.
Published: (2013)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Information technology approaches to knowledge management in various organizations
by: Achmad Maulana, Fajri, et al.
Published: (2011)
by: Achmad Maulana, Fajri, et al.
Published: (2011)
A case analysis of securing organisations against information leakage through online social networking
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2018)
Computational Red Teaming for Physical Security Assessment
by: Tan, Terence Peng Lian, et al.
Published: (2014)
by: Tan, Terence Peng Lian, et al.
Published: (2014)
Information security awareness at the knowledge-based institution: its antecedents and measures
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahlan, Abdul Rahman, et al.
Published: (2015)
Similar Items
-
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011) -
Uncovering Assumptions in Information Security
by: Armstrong, Helen, et al.
Published: (2005) -
Security and quality issues in IT projects
by: El Desouki, Hassan, et al.
Published: (2010) -
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009) -
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)