References
- Alavi, M., and Weiss, LR. Managing the risks associated with end-user computing. Journal of Management Information Systems 2, 3 (Winter 1985/86), 5–20.
- Bacon, M. Assessing public network security. Telecommunications 23, 12 (December 1983), 19–20.
- Banking World. The management of risk. October 1988, 34–36.
- Behesti, H.M., and Mattson, M.R. Computer based management information systems and risk management Focus on Management ( Society for Advancement of Management) 1–3.
- Bendyna, N. Minimizing loss through risk assessment. Infosystems (December 1984), 66–67.
- Briere, D., and Walton, L.T. The best way to prevent a disaster: plan for one. Network World 6, 47 (November 27, 1989), pp. 1, 31, 34.
- Business Week. How personal computers can trip up executives. September 24, 1984, 94–102.
- Cash, J.I.; McFarlan, F.W.; and McKenney, J.L. Corporate Information Systems Management, 2d ed. Homewood, IL: Richard D. Irwin, 1988.
- Cohen, F. Design and protection of an information network under a partial ordering: a case study. Computers and Security 6 (1987), 332–338.
- Communications Week. Hacker’s doings are costly. January 29, 1990, 14.
- Crockford, N. An introduction to Risk Management. Cambridge, MA: Woodhead-Faulkner, 1980.
- Crouch, E.A.C., and Wilson, R. Risk Benefit Analysis. Cambridge, MA: Ballinger, 1982.
- Doherty, N.A. Corporate Risk Management. New York: McGraw-Hill, 1985.
- Emmett, A. Managing risk. Network World, November 21, 1988, 37–38, 47.
- Even-Tsur, D., and Shulman, D. Designing built-in system controls. Journal of Information Systems Management (Winter 1989), 28–36.
- Farthing, D. How risk management is driven by insurance. National Underwriter, November 2, 1987, 9, 14–15.
- Farthing, D. Is risk management essential to corporate survival? Risk Management February 1988, 34–37.
- Gerard, T. Evaluating a disaster recovery plan. Datacenter Manager 2, 1 (January/February 1990), 36–41.
- Gonnella, G. Making expensive decisions. Information Center 4, 10 (October 1988), 32–35.
- Gottfried, I.S. When disaster strikes. Journal of Information Systems Management (Spring 1989), 86–89.
- Greenstein, I. MIS snafu lost orders, could mean sun loss. Management Information Systems Week 10, 23 (June 5, 1989), 4.
- Guarro, S.B. Principles and procedures of the LRAM approach to information systems risk analysis and management. Computers and Security 6 (1987), 493–504.
- Hammond, R. Improving productivity through risk management. In Umbaugh, R.F., ed., Handbook of MIS Management, 2d ed. Boston: Auerbach, 1988, 655–665.
- Housel, T.J.; El Sawy, O.A.; and Donovan, P.F. Information systems for crisis management. MIS Quarterly 10, 4 (December 1986), 389–402.
- Keller, J.J. Software bug closes AT&T’s network, cutting phone service for millions in U.S. Wall Street Journal, January 16, 1990, A2.
- King, J.L. Coping with the perils of expanding PC use. Journal of Information Systems Management 3, 4 (Fall 1986), 66–70.
- Lobel, J. Risk analysis in the 1980’s. American Federation of Information Processing Societies Proceedings ( National Computer Conference) 49 (May 19-22, 1980), 831–836.
- Mansur, B.J. The night the lights went out in Georgia. Telecommunications 23, 12 (December 1989), 67–68.
- McFarlan, F.W., and McKenney, J. IS technology organization issues. In McFarlan, F.W., and McKenney, J., Corporate Information Systems Management. Homewood, IL: Irwin, 1983, 27–48.
- Meall, L. Survival of the fittest. Accountancy (March 1989), 140–141.
- Morrisey, J. New security risks seen for ’90s. PC Week, December 11, 1989, 55.
- Murray, W. How much is enough? Expert says security efforts should pay, not cost. Computerworld, April 6, 1988, 30.
- National Bureau of Standards. Guidelines for ADP risk analysis. Washington, DC: U.S. Department of Commerce, FIPS Publication 87, March 1981.
- Newton, J.D. Developing and implementing an EDP disaster contingency plan for a small national bank. Unpublished master’s thesis, Auburn University, 1987.
- Newton, J.D., and Snyder, C.A. Risk analysis for computerized information systems. Proceedings, Southern Management Association (1987), 306–308.
- Parker, D.B. Computer Security Management. Reston, VA: Reston Publishing, 1981.
- Perschke, G.A.; Karabin, S.J.; and Brock, T.L. Four steps to information security. Journal of Accountancy (April 1986), 104–111.
- Pickard, R. Computer crime. Information Center 5, 9 (September 1989), 18–27.
- Porter, M.E., and Millar, V.E. How information gives you competitive advantage. Harvard Business Review (July-August 1985), 149–160.
- Post, G.V., and Diltz, J.D. A stochastic dominance approach to risk analysis of computer systems. MIS Quarterly 10, 4 (December 1986), 363–375.
- Pyburn, P.J. Managing personal computer use: the role of corporate management information systems. Journal of Management Information Systems 3, 2 (Winter 1986-87), 49–70.
- Radding, A. Plans for a safer system. Computer Decisions (April 6, 1987), 36–38.
- Riemer, M.S. Fighting computer viruses through systems management, information Center 5, 9 (September 1989), 11–17.
- Rivard, S., and Huff, S.L. An empirical study of users as application developers. Information and Management 8, 2 (January 1985), 89–102.
- Scheier, R.L. American Airline’s still shoring up SABRE. PC Week, June 26, 1989, 65.
- Semilof, M. Network disaster planning. Communications Week, February 12, 1990, 33–35.
- Sobol, M. DP alliance bolsters security. Computerworld, December 16, 1985, 59–60.
- Stem, E. The lessons of San Francisco. Datacenter Manager 2, 1 (January/February 1990, 30–35.
- Tate, P. Risk! the third factor. Datamation, April 15, 1988, 58–64.
- Vitale, M.R. The growing risks of information systems success. MIS Quarterly 10, 4 (December 1986), 327–334.
- Wood, C.C. The human immune system as an information systems security model. Computers and Security 6 (1987), 511–516.
- Zalubski, J. Threat of viruses must be taken seriously. Network World July 31, 1989, 29.
- Zimmerman, J.S. Is your computer insecure? Datamation, May 15, 1985, 119–128.