822
Views
23
CrossRef citations to date
0
Altmetric
Original Articles

Information systems security and human behaviour

, , &
Pages 113-118 | Published online: 14 May 2007

References

  • British Standards Institute . 1999 . “ Code of practice for information security management, BS 7799 ” . London
  • Burrows , M. , Abadi , M. and Needham , R. M. 1990 . A Logic of Authentication . ACM Transactions on Computer Systems , 8 February : 18 – 36 .
  • Carayon , P. and Kraemer , S. 2003 . Human Factors in E-security: The business viewpoint , Madison, WI : University of Wisconsin-Madison . Centre for Quality and Productivity and Improvement), No. Technical Report 184, November
  • Denning , D. E. 1982 . Cryptography and Data Security , Reading, MA : Addison-Wesley .
  • Denning , D. E. 1999 . Information Warfare and Security , New York, NY : Addison Wesley .
  • Dutta , A. 2003 . Managing IT with systems thinking . IEEE Computer , 36 March : 96 – 97 .
  • Editorial . 2002 . System administrators patch too late . Network Security , 12 : 3
  • Gonzalez , J. J. , ed. 2003 . “ From modeling to managing security ” . In Research series no. 35 , Kristiansand : Hoyskole Forlegat AS . 2003
  • Haims , C. M. and Carayon , P. 1998 . Theory and practice for the implementation of ‘in-house’ continuous improvement participatory ergonomic programs . Applied Ergonomics , 29 December : 461 – 472 .
  • Makridakis , S. , Andersen , A. , Carbone , R. , Fildes , R. , Hibon , M. , Lewandowski , R. , Newton , J. , Parzen , E. and Winkler , R. 1984 . The Forecasting Accuracy of Major Time Series Methods , New York : John Wiley & Sons .
  • Schneier , B. 1996 . Applied Cryptography , New York : John Wiley & Sons .
  • Schneier , B. 2000 . Secrets and Lies. Digital Security in a Networked World , New York : John Wiley & Sons .
  • Spivey , J. M. 1989 . The Z Notation: A Reference Manual , London : Prentice-Hall .
  • Sterman , J. D. 2000 . Business Dynamics , Boston, MA : McGraw Hill .
  • Trček , D. 2003 . An integral framework for information systems security management . Computers & Security , 22 June : 337 – 359 .
  • US Department of Defense . 1983 . “ Trusted Computer System Evaluation Criteria ” . DoD standard CSC-STD-00l-83

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.