Information Systems Security Strategy: A Process View
This chapter adopts a process view of information security strategy. That is, it is centrally concerned with how to "make" strategy; this extends the concern about what strategy "is." From a process viewpoint, information security strategy involves one or more strategy-setting pr...
| Main Authors: | Baskerville, Richard, Dhillon, G. |
|---|---|
| Other Authors: | D W Straub |
| Format: | Book Chapter |
| Published: |
M E Sharpe Inc
2008
|
| Online Access: | http://hdl.handle.net/20.500.11937/29094 |
Similar Items
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises
by: Dhillon, G., et al.
Published: (2009)
by: Dhillon, G., et al.
Published: (2009)
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)
by: Raymond, B., et al.
Published: (2014)
Intervention effect rates as a path to research relevance: Information systems security example
by: Siponen, M., et al.
Published: (2018)
by: Siponen, M., et al.
Published: (2018)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Individual information systems as a research arena
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Design theorizing individual information systems
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Design ethnography in information systems
by: Baskerville, Richard, et al.
Published: (2015)
by: Baskerville, Richard, et al.
Published: (2015)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Fashion waves in information systems research and practice
by: Baskerville, Richard, et al.
Published: (2009)
by: Baskerville, Richard, et al.
Published: (2009)
Information systems as a reference discipline: Current debate and future directions
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
A critical perspective on action research as a method for information systems research
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Going back to basics in design science: from the information technology artifact to the information systems artifact
by: Lee, A., et al.
Published: (2015)
by: Lee, A., et al.
Published: (2015)
Functionality vs. Security in IS: Tradeoff or equilibrium
by: Baskerville, Richard, et al.
Published: (2012)
by: Baskerville, Richard, et al.
Published: (2012)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
A response to the design-oriented information systems research memorandum
by: Baskerville, Richard, et al.
Published: (2011)
by: Baskerville, Richard, et al.
Published: (2011)
Principles for re-designing information systems for environmental sustainability
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Organizational Security Learning from Incident Response
by: Ahmad, A., et al.
Published: (2018)
by: Ahmad, A., et al.
Published: (2018)
Commentary on Gill and Bhattacherjee: Is there an informing crisis?
by: Myers, M., et al.
Published: (2009)
by: Myers, M., et al.
Published: (2009)
The Contributions of Alessandro D'Atri to Organization and Information Systems Studies
by: Spagnoletti, P., et al.
Published: (2013)
by: Spagnoletti, P., et al.
Published: (2013)
Health Information Security Guidelines for Healthcare Information Systems
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
by: Narayanan Samy , Ganthan, et al.
Published: (2011)
Information and Repetition Change Children's Visual Strategies When Viewing Magic Tricks With and Without Gaze Cues
by: Ordqvist, A., et al.
Published: (2013)
by: Ordqvist, A., et al.
Published: (2013)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Use of security patterns for development of secure healthcare information system
by: Maher, Zulfikar Ahmed, et al.
Published: (2016)
by: Maher, Zulfikar Ahmed, et al.
Published: (2016)
Food security analysis: Macroeconomics view in Malaysia
by: Liew, Chee Tien, et al.
Published: (2017)
by: Liew, Chee Tien, et al.
Published: (2017)
Advances in information systems development: From discipline and predictability to agility and improvisation
by: Pries-Heje, J., et al.
Published: (2008)
by: Pries-Heje, J., et al.
Published: (2008)
Erratum to Agile requirements engineering practices and challenges: An empirical study [Information Systems Journal 20 (2010) 449-480]
by: Ramesh, B., et al.
Published: (2015)
by: Ramesh, B., et al.
Published: (2015)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
E-Government - an information security perspective
by: Hassan, Rasha G., et al.
Published: (2016)
by: Hassan, Rasha G., et al.
Published: (2016)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Computer security control practices: views of future employees in Malaysia
by: Zainol, Zaini, et al.
Published: (2015)
by: Zainol, Zaini, et al.
Published: (2015)
Similar Items
-
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008) -
Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises
by: Dhillon, G., et al.
Published: (2009) -
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008) -
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019) -
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)