316
Views
15
CrossRef citations to date
0
Altmetric
Security, Ethics, and Legal Issues

A Model of Information Assurance Benefits

, &

Referrences

  • Boyce , J. G. and Jennings , D. W. 2002 . Information Assurance: Managing Organizational IT Security Risks , London : Butterworth Heineman .
  • Colwill , C. J. , Todd , M. C. , Fielder , G. P. and Natanson , C. 2001 . Information Assurance . BT Technology Journal , 19 ( 3 ) : 107 – 114 .
  • Deloitte . 2003 . 2003 Global Security Survey , Deloitte Touche Tohmatsu .
  • Dhillon , G. 2004 . The Challenge of Managing Information Security—Guest Editorial . International Journal of Information Management , : 243 – 244 .
  • DTI . 2002 . Information Security Breaches Survey , London, , U.K. : Department of Trade and Industry/PricewaterhouseCoopers .
  • Economist . 2004 . File that—The Sarbanes–Oxley Act Is Causing a Quantum Leap in the Storage Industry , The Economist . [print edition] March 4
  • Ernst and Young . 2002 . Global Information Security Survey , Ernst & Young LLP .
  • Ettredge , M. and Richardson , V. J. 2003 . Information Transfer among Internet Firms: The Case of Hacker Attacks . Journal of Information Systems , 17 ( 2 ) : 71 – 82 .
  • Ezingeard , J.-N. , Bowen-Schrire , M. and Birchall , D. Triggers of Change in Information Security Management. Proceedings of ISOneWorld Conference, Las Vegas, April 23–25 .
  • Ezingeard , J.-N. , McFadzean , E. and Birchall , D. W. Board of Directors and Information Security: A Perception Grid. Paper No. 222 in Proceedings of British Academy of Management Conference, Harrogate .
  • Fourie , L. C.H. 2003 . The Management of Information Security—A South African Case Study . South African Journal of Business Management , 34 ( 2 ) : 19
  • Garg , A. 2003 . What Does an Information Security Breach Really Cost? Evidence and Implications . Information Strategy: The Executive's Journal , 19 ( 4 ) : 21f
  • Garg , A. , Curtis , J. and Halper , H. 2003 . Quantifying the Financial Impact of IT Security Breaches . Information Management & Computer Security , 11 ( 2 ) : 374 – 383 .
  • Hovav , A. and D’Arcy , J. 2003 . The Impact of Denial-of-Service Attack Announcements on the Market Value of Firms . Risk Management & Insurance Review , 6 ( 2 ) : 97
  • IAAC . 2003 . Engaging the Board: Corporate Governance and Information Assurance , Cambridge, , U.K. : Information Assurance Advisory Council . ISO (1989) ISO 7498-2:1989 Information Processing Systems—Open Systems Interconnection—Basic Reference Model—Part 2: Security Architecture. ISO, Geneva
  • ISO (2000) ISO/IEC 17799:2000 Code of Practice for Information Security Management. ISO, Geneva
  • ITGI . 2003 . IT Control Objectives for Sarbanes– Oxley , Rolling Meadows, IL : IT Governance Institute .
  • Koved , L. , Nadalin , A. , Nagaratnam , N. , Pistoia , M. and Shrader , T. 2001 . Security Challenges for Enterprise Java in an E-Business Environment . IBM Systems Journal , 40 ( 1 ) : 130 – 152 .
  • Landwehr , C. E. 2001 . Computer Security . International Journal of Information Security , 1 ( 1 ) : 3 – 13 .
  • Logan , P. Y. and Logan , S. W. 2003 . Bitten by a Bug: A Case Study in Malware Infection . Journal of Information Systems Education , 14 ( 3 ) : 301– 305
  • McAdams , A. C. 2004 . Security and Risk Management: A Fundamental Business Issue . Information Management Journal , 38 ( 4 ) : 36 – 44 .
  • McFadzean , E. , Ezingeard , J.-N. and Birchall , D. 2003 . Boards of Directors Engagement with Information Security , Henley Working Paper (HWP0309) available from www.henleymc. ac.uk
  • McFarlan , F. W. 1984 . Information Technology Changes the Way You Compete . Harvard Business Review , 62 ( 3 ) : 98
  • Parker , X. L. 2001 . Understanding Risk . Internal Auditor , : 61 – 65 .
  • Stewart , K. A. and Segars , A. H. 2002 . An Empirical Examination of the Concern for Information Privacy Instrument . Information Systems Research , 13 ( 1 ) : 36 – 49 .
  • Stiles , P. and Taylor , B. 2001 . Boards at Work: How Directors View Their Roles and Responsibilities , Oxford : Oxford University Press .
  • Thomson , K.-L. and von Solms , R. Integrating Information Security into Corporate Governance. 18th IFIP International Information Security Conference, Athens, pp. 169-180 .
  • Treanor , J. 2000 . Security Fear Shuts Online Bank . The Guardian , : 2000 Aug. 1
  • Ward , J. M. 1988 . Information Systems and Technology Application Portfolio Management—An Assessment of Matrix-Based Analyses . Journal of Information Technology , 3 ( 3 ) : 205
  • Whitman , M. E. 2003 . Enemy at the Gate: Threats to Information Security . Communications of the ACM , 46 ( 8 ) : 91 – 95 .
  • Wolf , D. G. 2003 . Statement by NSA's Director of Information Assurance before the House Select Committee on Homeland Security , U.S. House of Representatives available from http://www. nsa.gov/ia/Wolf_SFR_22_July_2003.pdf

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.