References
- Anonymous. (2008). Digital risk trends 2008. Risk Management, 55(10), p. 32–36.
- Anonymous. (2009a). HIPAA violation costs CVS $2.25 million. Information Management Journal, 43(3), p. 15.
- Anonymous. (2009b). Mass. passes tough data security law. Information Management Journal, 43(1), p. 8.
- Calvasina, E., Ramaswamy, M., Calvasina, R., & Calvasina, G. (2008). Executive information for strategic decision making. Issues in Information Systems, 9(2), 80–86.
- Chang, S. E., & Lin, C. (2007). Exploring organizational culture for information security management. Industrial Management and Data Systems, 107(3), 438–458.
- Chisholm, P. (2008). Disaster recovery planning is business-critical. The CPA Journal, 78(7), 11.
- Cleary, B. (2008). How safe is your data? Strategic Finance, 90(4), 33–37.
- Clitherow, D., Brookbanks, M., Clayton, N., & Spears, G. (2008). Combining high availability and disaster recovery solutions for critical IT environments. IBM Systems Journal, 47(4), 563–575.
- Conger, S. (2009). Personal information privacy: A multiparty endeavor. Journal of Electronic Commerce in Organizations, 7(1), 71–82.
- Dionne, M., & Carboni, A. (2009). How to successfully implement an e-records management program. Information Management Journal, 43(2), 49–53.
- Foltz, C. B., Schwager, P. H., & Anderson, J. E. (2008). Why users (fail to) read computer usage policies. Industrial Management & Data Systems, 108(6), 701–712.
- Grudman, R. (2008). Mapping an approach for successful content management. Information Management Journal, 42(5), p. 60–64.
- Montana, J. (2008). Records and information management in the post-bailout world. Information Management Journal, 42(6), 26–30.
- Morris, S. A., & Strickland, T.H. (2008/2009). Exploration of information system process improvements and firm performance. The Journal of Computer Information Systems, 49(2), 86–91.
- Rae, K., & Subramaniam, N. (2008). Quality of internal control procedures: Antecedents and moderating effect on organisational justice and employee fraud. Managerial Auditing Journal, 23(2), 104–124.
- Robinson, S. (2009). The nature of responsibility in a professional setting. Journal of Business Ethics, 88, 11–19.
- Rotvold, G. (2008). How to create a security culture in your organization. Information Management Journal, 42(6), 32–38.
- Skovira, R. J. (2007). Framing the corporate security problem: The ecology of security. Issues in Informing Science and Information Technology, 4, 45–52.
- Totterdale, R. L. (2008). Enterprise content management: A usability study. Issues in Information Systems, 9(2), 330–336.
- Wang, W., Hsieh, J. P., Butler, J. E., & Hsu, S. (2008). Innovate with complex information technologies: A theoretical model and empirical examination. The Journal of Computer Information Systems, 49(1), 27–36.