35
Views
106
CrossRef citations to date
0
Altmetric

References

  • Alavi, M., and Weiss, LR. Managing the risks associated with end-user computing. Journal of Management Information Systems 2, 3 (Winter 1985/86), 5–20.
  • Bacon, M. Assessing public network security. Telecommunications 23, 12 (December 1983), 19–20.
  • Banking World. The management of risk. October 1988, 34–36.
  • Behesti, H.M., and Mattson, M.R. Computer based management information systems and risk management Focus on Management ( Society for Advancement of Management) 1–3.
  • Bendyna, N. Minimizing loss through risk assessment. Infosystems (December 1984), 66–67.
  • Briere, D., and Walton, L.T. The best way to prevent a disaster: plan for one. Network World 6, 47 (November 27, 1989), pp. 1, 31, 34.
  • Business Week. How personal computers can trip up executives. September 24, 1984, 94–102.
  • Cash, J.I.; McFarlan, F.W.; and McKenney, J.L. Corporate Information Systems Management, 2d ed. Homewood, IL: Richard D. Irwin, 1988.
  • Cohen, F. Design and protection of an information network under a partial ordering: a case study. Computers and Security 6 (1987), 332–338.
  • Communications Week. Hacker’s doings are costly. January 29, 1990, 14.
  • Crockford, N. An introduction to Risk Management. Cambridge, MA: Woodhead-Faulkner, 1980.
  • Crouch, E.A.C., and Wilson, R. Risk Benefit Analysis. Cambridge, MA: Ballinger, 1982.
  • Doherty, N.A. Corporate Risk Management. New York: McGraw-Hill, 1985.
  • Emmett, A. Managing risk. Network World, November 21, 1988, 37–38, 47.
  • Even-Tsur, D., and Shulman, D. Designing built-in system controls. Journal of Information Systems Management (Winter 1989), 28–36.
  • Farthing, D. How risk management is driven by insurance. National Underwriter, November 2, 1987, 9, 14–15.
  • Farthing, D. Is risk management essential to corporate survival? Risk Management February 1988, 34–37.
  • Gerard, T. Evaluating a disaster recovery plan. Datacenter Manager 2, 1 (January/February 1990), 36–41.
  • Gonnella, G. Making expensive decisions. Information Center 4, 10 (October 1988), 32–35.
  • Gottfried, I.S. When disaster strikes. Journal of Information Systems Management (Spring 1989), 86–89.
  • Greenstein, I. MIS snafu lost orders, could mean sun loss. Management Information Systems Week 10, 23 (June 5, 1989), 4.
  • Guarro, S.B. Principles and procedures of the LRAM approach to information systems risk analysis and management. Computers and Security 6 (1987), 493–504.
  • Hammond, R. Improving productivity through risk management. In Umbaugh, R.F., ed., Handbook of MIS Management, 2d ed. Boston: Auerbach, 1988, 655–665.
  • Housel, T.J.; El Sawy, O.A.; and Donovan, P.F. Information systems for crisis management. MIS Quarterly 10, 4 (December 1986), 389–402.
  • Keller, J.J. Software bug closes AT&T’s network, cutting phone service for millions in U.S. Wall Street Journal, January 16, 1990, A2.
  • King, J.L. Coping with the perils of expanding PC use. Journal of Information Systems Management 3, 4 (Fall 1986), 66–70.
  • Lobel, J. Risk analysis in the 1980’s. American Federation of Information Processing Societies Proceedings ( National Computer Conference) 49 (May 19-22, 1980), 831–836.
  • Mansur, B.J. The night the lights went out in Georgia. Telecommunications 23, 12 (December 1989), 67–68.
  • McFarlan, F.W., and McKenney, J. IS technology organization issues. In McFarlan, F.W., and McKenney, J., Corporate Information Systems Management. Homewood, IL: Irwin, 1983, 27–48.
  • Meall, L. Survival of the fittest. Accountancy (March 1989), 140–141.
  • Morrisey, J. New security risks seen for ’90s. PC Week, December 11, 1989, 55.
  • Murray, W. How much is enough? Expert says security efforts should pay, not cost. Computerworld, April 6, 1988, 30.
  • National Bureau of Standards. Guidelines for ADP risk analysis. Washington, DC: U.S. Department of Commerce, FIPS Publication 87, March 1981.
  • Newton, J.D. Developing and implementing an EDP disaster contingency plan for a small national bank. Unpublished master’s thesis, Auburn University, 1987.
  • Newton, J.D., and Snyder, C.A. Risk analysis for computerized information systems. Proceedings, Southern Management Association (1987), 306–308.
  • Parker, D.B. Computer Security Management. Reston, VA: Reston Publishing, 1981.
  • Perschke, G.A.; Karabin, S.J.; and Brock, T.L. Four steps to information security. Journal of Accountancy (April 1986), 104–111.
  • Pickard, R. Computer crime. Information Center 5, 9 (September 1989), 18–27.
  • Porter, M.E., and Millar, V.E. How information gives you competitive advantage. Harvard Business Review (July-August 1985), 149–160.
  • Post, G.V., and Diltz, J.D. A stochastic dominance approach to risk analysis of computer systems. MIS Quarterly 10, 4 (December 1986), 363–375.
  • Pyburn, P.J. Managing personal computer use: the role of corporate management information systems. Journal of Management Information Systems 3, 2 (Winter 1986-87), 49–70.
  • Radding, A. Plans for a safer system. Computer Decisions (April 6, 1987), 36–38.
  • Riemer, M.S. Fighting computer viruses through systems management, information Center 5, 9 (September 1989), 11–17.
  • Rivard, S., and Huff, S.L. An empirical study of users as application developers. Information and Management 8, 2 (January 1985), 89–102.
  • Scheier, R.L. American Airline’s still shoring up SABRE. PC Week, June 26, 1989, 65.
  • Semilof, M. Network disaster planning. Communications Week, February 12, 1990, 33–35.
  • Sobol, M. DP alliance bolsters security. Computerworld, December 16, 1985, 59–60.
  • Stem, E. The lessons of San Francisco. Datacenter Manager 2, 1 (January/February 1990, 30–35.
  • Tate, P. Risk! the third factor. Datamation, April 15, 1988, 58–64.
  • Vitale, M.R. The growing risks of information systems success. MIS Quarterly 10, 4 (December 1986), 327–334.
  • Wood, C.C. The human immune system as an information systems security model. Computers and Security 6 (1987), 511–516.
  • Zalubski, J. Threat of viruses must be taken seriously. Network World July 31, 1989, 29.
  • Zimmerman, J.S. Is your computer insecure? Datamation, May 15, 1985, 119–128.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.