Information Systems Security

Titel Veröffentlichungsdatum Sprache Zitate
Gaining Access with Social Engineering: An Empirical Study of the Threat2007/12/13English55
The Impact of Virus Attack Announcements on the Market Value of Firms2004/05/01English45
Awareness Education as the Key to Ransomware Prevention2007/09/04English31
The Financial Impact of IT Security Breaches: What Do Investors Think?2003/03/01English31
Secure Coding: Building Security into the Software Development Life Cycle2004/11/01English25
On the Anatomy of Human Hacking2007/12/13English23
Implementing an Information Security Awareness Program2005/05/01English21
Designing a Security Awareness Program: Part 12001/01/01English20
Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues2000/07/01English17
Do Information Security Professionals and Business Managers View Information Security Issues Differently?2007/01/01English15
The Effects of Outsourcing on Information Security2001/05/01English14
The Good and Not So Good of Enforcing Password Composition Rules2007/03/28English13
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times2006/12/01English13
Security for Enterprise Resource Planning Systems2007/06/12English11
Information Security Policy Development and Implementation2007/11/20English11
Information Security Policy Framework: Best Practices for Security Policy in the E-commerce Age2001/05/01English11
Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security2002/09/01English11
An Introduction to Insider Threat Management2007/03/28English9
Risk Analysis and Risk Management2004/09/01English8
Recognizing and Preparing Loss Estimates from Cyber-Attacks2004/01/01English8
Managing RFID Consumer Privacy and Implementation Barriers2007/09/04English7
IT Security Management and Business Process Automation: Challenges, Approaches, and Rewards2007/01/01English7
An Introduction to Social Engineering2000/10/01English6
Metatagging and Trademark Law: Brookfield Communications, Inc. v. West Coast Entertainment Corp.2001/03/01English6
Desktop Security and Usability Trade-Offs: An Evaluation of Password Management Systems2005/05/01English6
Clarifying the Roles of Information Security: 13 Questions the CEO, CIO, and CISO Must Ask Each Other2007/11/20English6
Calendar 19921992/01/01English5
Security Through Deception2007/03/28English5
A Guide to Selecting and Implementing Security Controls1994/01/01English5
Penetration Testing Through Social Engineering1996/01/01English5