Incident-centered information security: Managing a strategic balance between prevention and response
Information security strategies employ principles and practices grounded in both the prevention andresponse paradigms. The prevention paradigm aims at managing predicted threats. Although theprevention paradigm may dominate in contemporary commercial organizations, the response paradigm (aimed at ma...
| Main Authors: | Baskerville, Richard, Spagnoletti, P., Kim, J. |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier
2014
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/42670 |
Similar Items
Beyond paradigms in the processes of scientific inquiry
by: Colbourne, Peter Francis
Published: (2006)
by: Colbourne, Peter Francis
Published: (2006)
Eucharistic celebrations: the chasm between idea and action
by: O'Loughlin, Thomas
Published: (2009)
by: O'Loughlin, Thomas
Published: (2009)
Governance paradigms of public universities: An international comparative study
by: Christopher, Joseph
Published: (2012)
by: Christopher, Joseph
Published: (2012)
Dorothy Hewett's Sacred Place
by: Novakovic, Jasna
Published: (2010)
by: Novakovic, Jasna
Published: (2010)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Laws in ecology: diverse modes of explanation for a holistic science?
by: Gunton, Richard, et al.
Published: (2017)
by: Gunton, Richard, et al.
Published: (2017)
Mapping the Changing Governance Control Paradigms of Public Universities
by: Christopher, Joe
Published: (2013)
by: Christopher, Joe
Published: (2013)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Mixed methods research: the five Ps framework
by: Cameron, Roslyn
Published: (2011)
by: Cameron, Roslyn
Published: (2011)
Interpretation of BOLD events using fMRI at 7 Tesla
by: Tan, Francisca Marie
Published: (2017)
by: Tan, Francisca Marie
Published: (2017)
Social Investment Market: Kuhn meets New Institutionalism – framing an emerging field
by: Nummela, Tomi
Published: (2012)
by: Nummela, Tomi
Published: (2012)
Developing an agent-based framework for intelligent geocoding
by: Hutchinson, Matthew John
Published: (2010)
by: Hutchinson, Matthew John
Published: (2010)
Revisiting the built environment: 10 potential development changes and paradigm shifts due to COVID-19
by: Cheshmehzangi, Ali
Published: (2021)
by: Cheshmehzangi, Ali
Published: (2021)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
1,199.68kg lebihan makanan, minuman diselamat menerusi program MYSaveFood@Bazar Ramadan
by: Utusan Borneo, Sarawak
Published: (2024)
by: Utusan Borneo, Sarawak
Published: (2024)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
What do we know about rail suicide incidents?: analysis of 257 fatalities on the rail network in Great Britain
by: Ryan, Brendan
Published: (2017)
by: Ryan, Brendan
Published: (2017)
A software based mentor system
by: Marriott, Andrew
Published: (2008)
by: Marriott, Andrew
Published: (2008)
Internationalisation of the Malaysian Wooden Furniture Industry
by: Zhao, LiXu
Published: (2016)
by: Zhao, LiXu
Published: (2016)
Decoding fMRI events in sensorimotor motor network using sparse paradigm free mapping and activation likelihood estimates
by: Tan, Francisca M., et al.
Published: (2017)
by: Tan, Francisca M., et al.
Published: (2017)
DETERMINANTS OF OUTWARD FOREIGN DIRECT INVESTMENT FROM
EMERGING MARKETS: THE CASE OF THAILAND
by: Dao, Linh
Published: (2018)
by: Dao, Linh
Published: (2018)
An investigation of the effectiveness of using analogies in teaching and learning scientific concepts
by: Ballard, Florence Nesamony
Published: (2011)
by: Ballard, Florence Nesamony
Published: (2011)
A Framework for Comparing IS Research Paradigms: How is Design Science related to Other Research Paradigms?
by: Venable, John
Published: (2013)
by: Venable, John
Published: (2013)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
Engaging students through the use of dilemma stories
by: Chow, Mei Ling
Published: (2012)
by: Chow, Mei Ling
Published: (2012)
Effects of individualist and collectivist group norms and choice on intrinsic motivation
by: Hagger, Martin, et al.
Published: (2014)
by: Hagger, Martin, et al.
Published: (2014)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
The performance of New Zealand initial public offerings (IPOs): 1995-2000 / Arizza Sapuan
by: Sapuan, Arizza
Published: (2004)
by: Sapuan, Arizza
Published: (2004)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Primary care medication safety incidents reported to the National Reporting and Learning System (NRLS)
by: Muhammad, Khalid W.
Published: (2021)
by: Muhammad, Khalid W.
Published: (2021)
A study on determinants of bond yield in Malaysia / Nurul Jannah Arifin and Nurul Atikah Yaacob
by: Arifin, Nurul Jannah, et al.
Published: (2018)
by: Arifin, Nurul Jannah, et al.
Published: (2018)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
Similar Items
-
Beyond paradigms in the processes of scientific inquiry
by: Colbourne, Peter Francis
Published: (2006) -
Eucharistic celebrations: the chasm between idea and action
by: O'Loughlin, Thomas
Published: (2009) -
Governance paradigms of public universities: An international comparative study
by: Christopher, Joseph
Published: (2012) -
Dorothy Hewett's Sacred Place
by: Novakovic, Jasna
Published: (2010) -
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)