Information security: Going digital (invited lecture)
© 2019, Springer Nature Switzerland AG. Because ‘going digital’ regards using digital technologies to fundamentally change the way things get done, information security is necessarily engaged in going digital. Society and science are going digital. For the sciences, this digitalization process invok...
| Main Author: | Baskerville, Richard |
|---|---|
| Format: | Conference Paper |
| Published: |
2019
|
| Online Access: | http://hdl.handle.net/20.500.11937/74580 |
Similar Items
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
Going back to basics in design science: from the information technology artifact to the information systems artifact
by: Lee, A., et al.
Published: (2015)
by: Lee, A., et al.
Published: (2015)
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)
by: Raymond, B., et al.
Published: (2014)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Intervention effect rates as a path to research relevance: Information systems security example
by: Siponen, M., et al.
Published: (2018)
by: Siponen, M., et al.
Published: (2018)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Are we invited to the nanotechnology party?
by: Oxley, A.
Published: (2009)
by: Oxley, A.
Published: (2009)
Invitation to grief in the family context
by: Breen, Lauren, et al.
Published: (2018)
by: Breen, Lauren, et al.
Published: (2018)
‘Malaysian Cryptology and Information Security Lecture Series’ dibuat dalam talian
by: Universiti Putra Malaysia, Pusat Strategi dan Perhubungan Korporat
Published: (2021)
by: Universiti Putra Malaysia, Pusat Strategi dan Perhubungan Korporat
Published: (2021)
Going back to basics in design: From the IT artifact to the IS artifact
by: Lee, A., et al.
Published: (2013)
by: Lee, A., et al.
Published: (2013)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Joondalup Invitation Art Prize 2022
by: Slatter, Nicole, et al.
Published: (2022)
by: Slatter, Nicole, et al.
Published: (2022)
Film enthusiasts invited to join workshop
by: The Borneo Post
Published: (2013)
by: The Borneo Post
Published: (2013)
INVITATION TO PARTICIPATE IN SYMPOSIUM ON RECIST
AND BEYOND
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
Australian Emergency Department health professionals' reasons to invite or not invite Family Witnessed Resuscitation: A qualitative perspective
by: Chapman, Rose, et al.
Published: (2014)
by: Chapman, Rose, et al.
Published: (2014)
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
The invitation to treat and Mu'atah in online contracts
by: Razali, Siti Salwani
Published: (2009)
by: Razali, Siti Salwani
Published: (2009)
Invited commentary: Impact of occupational science on therapy
by: Molineux, Matthew
Published: (2009)
by: Molineux, Matthew
Published: (2009)
Keynote Speaker Invitation, 24 November 2012
by: Norsiah, Fauzan
Published: (2012)
by: Norsiah, Fauzan
Published: (2012)
Masnita invited to collaborate with Ministry, Welfare Dept
by: New Sunday Tribune
Published: (2016)
by: New Sunday Tribune
Published: (2016)
Cinema-going trajectories in the digital age
by: Styliari, Tatiana Charikleia, et al.
Published: (2018)
by: Styliari, Tatiana Charikleia, et al.
Published: (2018)
Design theorizing individual information systems
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
“If you don’t speak from the heart, the young mob aren’t going to listen at all”: An invitation for youth mental health services to engage in new ways of working
by: Wright, Michael, et al.
Published: (2019)
by: Wright, Michael, et al.
Published: (2019)
Conference On Medical And Health Sciences 2019; Invitation Poster
by: Pusat Pengajian Sains Perubatan, PPSP
Published: (2019)
by: Pusat Pengajian Sains Perubatan, PPSP
Published: (2019)
Adoption of the principle of ‘Invitation to Treat’ in Islamic law of contracts
by: Jalil, Md. Abdul
Published: (2011)
by: Jalil, Md. Abdul
Published: (2011)
Adoption of the principle of 'Invitation to treat" in Islamic Law of contract
by: Md. Abdul Jalil,
Published: (2012)
by: Md. Abdul Jalil,
Published: (2012)
Finnish biotech institute invites post-grad students
Published: (2008)
Published: (2008)
Private sector invited to help O&G industry
by: The Borneo Post
Published: (2016)
by: The Borneo Post
Published: (2016)
Invitation Programme for Young Intellectuals in Southeast Asia 2015
by: Wong, Bemen
Published: (2016)
by: Wong, Bemen
Published: (2016)
Optical wireless links with enhanced linearity and selectivity [Invited]
by: Green, Roger J., et al.
Published: (2005)
by: Green, Roger J., et al.
Published: (2005)
Individual information systems as a research arena
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Formats, cultural security and China’s going out policy
by: Keane, Michael, et al.
Published: (2017)
by: Keane, Michael, et al.
Published: (2017)
8 UMP staff invited to perform pilgrimage this Haj season
by: UMP, PNC
Published: (2019)
by: UMP, PNC
Published: (2019)
FTKEE lecturers develop digital content for T L
by: Mimi Rabita, Abdul Wahit
Published: (2021)
by: Mimi Rabita, Abdul Wahit
Published: (2021)
Exploring careers through a qualitative lens: an investigation and invitation
by: Richardson, Julia, et al.
Published: (2021)
by: Richardson, Julia, et al.
Published: (2021)
Dr M invited to speak at convention, 18 Februari 2012
by: The, Star
Published: (2012)
by: The, Star
Published: (2012)
USM ALUMNI 1981-1987 INVITED TO ATTEND REUNION
GATHERING
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
Similar Items
-
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008) -
Going back to basics in design science: from the information technology artifact to the information systems artifact
by: Lee, A., et al.
Published: (2015) -
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014) -
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008) -
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)