1,730
Views
29
CrossRef citations to date
0
Altmetric
Articles

Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness

Pages 2-12 | Published online: 10 Jan 2009

References

  • Atkinson , W. 2005 . Integrating Risk Management & Security . Risk Management , 52 ( 10 ) : 32 – 37 .
  • Cerrullo , V. and Cerullo , M. 2004 . Business Continuity Planning: A Comprehensive Approach . Information Systems Management , 2 ( 3 ) : 70 – 78 .
  • Cook , I. Feb. 12 2007 . “ Look Out for the Enemy Within ” . In Financial Times Feb. 12 , 10 London (UK)
  • Defense Systems Management College . 2001 . Risk Management Guide for DOD Acquisition , 4th , Fort Belvoir, VA : Defense Acquistion University Press .
  • Ernst and Young LLP Global Information Security Survey, 2001, 2002, 2003.
  • Garretson , C. 2007 . Mobile Devices Expose Networks to Security Threats . Network World , 24 ( 8 ) Feb. 26 : 11
  • Gordon , L. and Loeb , M. 2004 . 2004 CSI/FBI Computer Crime and Security Survey Computer Security Institute
  • Hagg , A. 2002 . Benchmark Report: BCP in 2002 . Contingency Planning and Management , 7 ( 5 )
  • Herold , R. 2006 . Addressing Privacy Issues During Disaster Recovery . Information Systems Security , 14 ( 6 ) : 16 – 23 .
  • Keller , S. , Powell , A. , Horstmann , B. , Predmore , C. and Crawford , M. 2005 . Information Security Threats and Practices in Small Business . Information Systems Management , 22 ( 2 ) : 7 – 19 .
  • Peiro , A. , Cook , P. and Beydoun , H. 2005 . Small Business Information Security Readiness. , : 1 – 16 . Small Business Technology Institute
  • Pinto , C. , Arora , A. , Hall , D. and Schmitz , E. 2006 . Challenges to Sustainable Risk Management: Case Example in Information Network Security . Engineering Management Journal , 18 ( 1 ) : 17 – 24 .
  • Potter , B. 2006 . Wireless Hotspots: Petri Dish of Wireless Security . Communications of the ACM , 49 ( 6 ) : 51 – 56 .
  • Roberts , G. K. 2005 . Security Breaches, Privacy Intrusions, and Reporting of Computer Crimes . Journal of Information Privacy & Security , 1 ( 4 ) : 22 – 32 .
  • Ryan , S. D. and Bordoloi , B. 1997 . Evaluating security threats in mainframe and client/server environments . Information & Management , 32 : 137 – 146 .
  • Sinnett , W. M. and Boltin , G. 2006 . IT Security, Investment Top CFO Concerns . Financial Executive , 22 ( 5 ) : 42 – 45 .
  • Stoneburner , G. 2006 . Toward a Unified Security/Safety Model . IEEE Computer , 39 ( 8 ) : 96 – 97 .
  • Wade , J. 2004 . The Weak Link in IT Security. Risk Management , 51 ( 7 ) : 32 – 37 .
  • Waxer, C. (2007, April 12). The Top 5 Internal Security Threats. Itsecurity.Com http://www.itsecurity.com/features/the-top-5-internal-security-threats-041207/ (Accessed: 9 September 2008 ).
  • Whitman , M. E. 2003 . Enemy at the Gate: Threats to Information Security . Communications of the ACM , 46 ( 8 ) : 91
  • Wilson, T. (2007, Mar. 9) “Small Businesses: Overconfident on Security.” Dark Reading http://www.darkreading.com/document.asp?doc_id=119107 (Accessed: 9 September 2008 ).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.