Securing the IT infrastructure and the data it contains is one of the most critical components of IT that management faces today. Technologies such as the Internet and the wide-spread dissemination of computers to more users has increased the vulnerabilities of IT infrastructures as well as the likelihood of internal and external threats to companies. Managers are able to prevent or mitigate some of the damage caused by these attacks by aligning security policies with IT infrastructures to protect the organization’s information capital. The purpose of this study was to examine security articles in top-tier IS journals from 1996 to 2005 to determine what types of security research has been performed, to find out if a comprehensive framework ...
Information has become organizations’ most valuable asset, thus being a potential target to threats ...
Dependence on information, including for some of the world’s largest organisations such as governmen...
The research problem, research question, research objectives, research approach, and thesis structur...
The importance of information security in a pervasive networked environment is undeniable, yet there...
This paper reviews the IS security literature for the period 1990-2004. More specifically three secu...
This paper reviews the IS security literature for the period 1990-2004. More specifically three secu...
As information security becomes increasingly important, more research is being conducted in this are...
This study proposes using an established common body of knowledge (CBK) as one means of organizing i...
Academics examine and improve organizational systems, but oftentimes lag in techniques and theories ...
Information technology (IT) is a global phenomenon that provides organizations of all types the abil...
As information has been a basic commodity and strategic asset, information systems (IS) security has...
Information security is not a new topic in academics and industry. However, through a comprehensive...
This paper reviews the IS security literature for the period 1990-2004. More specifically three secu...
This study aims a bibliometric analysis of the 100 top-cited articles extracted from the Web of Scie...
The pervasiveness of information-based organizations, combined with the escalating number of securit...
Information has become organizations’ most valuable asset, thus being a potential target to threats ...
Dependence on information, including for some of the world’s largest organisations such as governmen...
The research problem, research question, research objectives, research approach, and thesis structur...
The importance of information security in a pervasive networked environment is undeniable, yet there...
This paper reviews the IS security literature for the period 1990-2004. More specifically three secu...
This paper reviews the IS security literature for the period 1990-2004. More specifically three secu...
As information security becomes increasingly important, more research is being conducted in this are...
This study proposes using an established common body of knowledge (CBK) as one means of organizing i...
Academics examine and improve organizational systems, but oftentimes lag in techniques and theories ...
Information technology (IT) is a global phenomenon that provides organizations of all types the abil...
As information has been a basic commodity and strategic asset, information systems (IS) security has...
Information security is not a new topic in academics and industry. However, through a comprehensive...
This paper reviews the IS security literature for the period 1990-2004. More specifically three secu...
This study aims a bibliometric analysis of the 100 top-cited articles extracted from the Web of Scie...
The pervasiveness of information-based organizations, combined with the escalating number of securit...
Information has become organizations’ most valuable asset, thus being a potential target to threats ...
Dependence on information, including for some of the world’s largest organisations such as governmen...
The research problem, research question, research objectives, research approach, and thesis structur...