Citations
The paper
has been cited by the following works.
- D. Gritzalis and C. Lambrinoudakis.
A data protection scheme for a remote vital signs monitoring healthcare
service.
Medical Informatics and the Internet in Medicine, 25(3):207–224,
June 2000.
- Dimitris Gritzalis and Kostas Lamprinoudakis.
A data protection scheme for a remote vital signs monitoring healthcare
service.
Medical Informatics, May 2000.
- Simon Cross.
How risky is
the internet?.
Online http://www.consult-x.com/papers/internet-risk.htm (current October
2003), February 2001.
- Dimitris Lekkas.
Trusted Third Parties for Deploying Secure Information Systems.
PhD thesis, Department of Information and Communication Systems, University of
the Aegean, Samos, Greece, December 2001.
- M. Belsi.
Developing an enterprise IT security data model.
Master's thesis, Coventry University, January 2002.
- M.A. Belsis, A.N.
Godwin, and L. Smalov.
An enterprise IT security data model.
In 4th International Conference on Enterprise Information Systems, ICEIS
2002, volume 2, pages 885–891. ICEIS Press, 2002.
- E. W. T. Ngai and
F. K. T. Wat.
A literature review and classification of e-commerce research.
Information and Management, 39(5):415–429, March 2002.
- M.A. Belsis and
L. Smalov.
Building an enterprise IT security management system.
IFIP TC11 18th International Conference on Information Security, SEC
2003, 122:181–192, 2003.
(doi:10.1007/978-0-387-35691-4_16)
- B. Karabacak
and I. Sogukpinar.
Risk analizi ve yonetimi surecleri.
A New Electronic Journal in Computer Science, III, 2003.
In Turkish.
- Andrew P. Martin.
Key
determinants of information availability: A multiple case study.
Master's thesis, Department of Information Systems and Quantitative Analysis,
University of Nebraska at Omaha, Nebraska, OM, May 2003.
- S. Smith.
Key drivers and inhibitors for information system security within egovernment.
In Proceedings if the 14th Australasian Conference on Information
Systems, 2003.
- Stephen Smith and
Rodger Jamieson.
Key drivers and
inhibitors for information system security within e-government.
In 14th Australasian Conference on Information Systems, November
2003.
- Varadharajan
Sridhar and Bharat Bhasker.
Managing information security on a shoestring budget.
Annals of Cases on Information Technology, pages 151–167, 2003.
- T. Tryfonas
and E. Kiountouzis.
Perceptions of security contributing to the implementation of secure IS.
IFIP TC11 18th International Conference on Information Security, SEC
2003, 122:313–324, 2003.
(doi:10.1007/978-0-387-35691-4_27)
- Ana I. Vicente.
La convergence de la sécurité informatique et la protection des
données à caractère personnel: vers une nouvelle approche
juridique.
Master's thesis, Universite de Montreal, 2003.
- David D. Brandt,
Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford
Collins.
System
and methodology providing automation security analysis, validation, and
learning in an industrial controller environment.
European Patent 1420317, 2004.
- D. Chapman and
L. Smalov.
On information security guidelines for small/medium enterprises.
In ICEIS 2004 - Proceedings of the Sixth International Conference on
Enterprise Information Systems, pages 3–9, 2004.
- R. Davidson and
S. Lambert.
Applying the australian and new zealand risk management standard to information
systems in SMEs.
The Australian Journal of Information Systems, 12(1), 2004.
- K. Moulinos,
J. Iliadis, and V. Tsoumas.
Towards secure sealing of privacy policies.
Information Management and Computer Security, 12(4):351–361, June
2004.
- Ana I. Vicente.
La
convergence de la sécurité informatique et la protection des
données à caractère personnel: vers une nouvelle approche
juridique.
Lex Electronica, 9(1), 2004.
- (Author
names in Chinese).
A security model of
e-commerce based on internet agent.
Microcomputer Applications, 21(1):4–16, 2005.
In Chinese.
- Charlie C.
Baggett, Jr. and John J. Adams.
Method,
system and computer program product for assessing information security.
United States Patent 6,925,443, August 2005.
Assignee: SAFEOperations, Inc. (Columbia, MD).
- A. Gupta and
R. Hammond.
Information systems security issues and decisions for small businesses: An
empirical examination.
Information Management and Computer Security, 13(4):297–310, June
2005.
(doi:10.1108/09685220510614425)
- Bilge
Karabacak and Ibrahim Sogukpinar.
ISRAM:
information security risk analysis method.
Computers & Security, 24(2):147–159, March 2005.
(doi:10.1016/j.cose.2004.07.004)
- S. Smith.
Key factors in egovernment information system security.
In Proceedings of the 18th Bled eConference — eIntegration in
Action, 2005.
- S. Smith and
R. Jamieson.
Key factors in e-government information system security.
In 18th Bled eConference: eIntegration in Action. Bled eCommerce
Conference, 2005.
- T. Tsiakis
and G. Stephanides.
The concept of security and trust in electronic payments.
Computers and Security, 24(1):10–15, 2005.
(doi:10.1016/j.cose.2004.11.001)
- M. Choi.
Exploring requirements for e-learning professionals.
In ICE-B 2006 - International Conference on e-Business,
Proceedings, pages 323–326, 2006.
- D.W. Johnson and
H. Koch.
Computer security risks in the internet era: Are small business owners aware
and proactive?
In Proceedings of the Annual Hawaii International Conference on System
Sciences, volume 6, 2006.
(doi:10.1109/HICSS.2006.91)
- S. Smith and
R. Jamieson.
Determining key factors in e-government information system security.
Information Systems Management, 23(2):23–32, 2006.
(doi:10.1201/1078.10580530/45925.23.2.20060301/92671.4)
- Fintan Clear.
SMEs,
electronically-mediated working and data security: cause for concern?.
International Journal of Business Science and Applied Management,
2(2), 2007.
- Jr. Romano,
N.C. and J. Fjermestad.
Privacy and security in the age of electronic customer relationship management.
International Journal of Information Security and Privacy (IJISP),
1(1):65–86, 2007.
(doi:10.4018/jisp.2007010105)
- Yves Barlette and
Vladislav V. Fomin.
Exploring the suitability of is security management standards for smes.
In Proceedings of the 41st Annual Hawaii International Conference on
System Sciences, pages 308–308, 2008.
(doi:10.1109/HICSS.2008.167)
- H.L. Koch and D.W.
Johnson.
Are home-based sales representatives aware and proactive regarding security
risks in the internet era?
Journal of Internet Commerce, 7(3):379–402, 2008.
(doi:10.1080/15332860802250492)
- N.C.
Romano Jr. and J. Fjermestad.
Privacy and security in the age of electronic customer relationship management.
In Selected Readings on Electronic Commerce Technologies: Contemporary
Applications, pages 310–332. IGI Global, 2008.
(doi:10.4018/978-1-60566-096-7.ch022)
- J. Fjermestad and N.C. Romano Jr.
Information privacy and security for e-CRM.
In Social Implications of Data Mining and Information Privacy:
Interdisciplinary Frameworks and Solutions, pages 48–70. IGI Global,
2009.
(doi:10.4018/978-1-60566-196-4.ch004)
- K. Pousttchi,
M. Schiessler, and D.G. Wiedemann.
Proposing a comprehensive framework for analysis and engineering of mobile
payment business models.
Information Systems and e-Business Management, 7(3):363–393,
2009.
(doi:10.1007/s10257-008-0098-9)
- N.C.
Romano Jr. and J. Fjermestad.
Privacy and security in the age of electronic customer relationship management.
In Techniques and Applications for Advanced Information Privacy and
Security: Emerging Organizational, Ethical, and Human Issues, pages
189–210. IGI Global, 2009.
(doi:10.4018/978-1-60566-210-7.ch013)
- F. Clear.
Innovative knowledge transfer mechanisms and the potential role for theatric
methods in the propagation of good data handling practice.
Smart Innovation, Systems and Technologies, 5:197–208, 2010.
- Charlie C.
Baggett, Jr. and John J. Adams.
Method,
system, and computer program product for assessing information security.
United States Patent 8,121,892, February 2012.
Assignee: Safeoperations, Inc. (Columbia, MD).
- H. Zafar.
Human resource information systems: Information security concerns for
organizations.
Human Resource Management Review, 23(1):105–113, 2013.
(doi:10.1016/j.hrmr.2012.06.010)
- David D. Brandt,
Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford
Collins.
System
and methodology providing automation security analysis, validation, and
learning in an industrial controller environment.
United States Patent 8,909,926, December 2014.
Assignee: Rockwell Automation Technologies, Inc. (Mayfield Heights, OH).
- M.A. Harris and
K.P. Patten.
Mobile device security considerations for small- and medium-sized enterprise
business mobility.
Information Management and Computer Security, 22(1):97–114, 2014.
(doi:10.1108/IMCS-03-2013-0019)
- L.K.H. Lai and K.S.
Chin.
Development of a failure mode and effects analysis based risk assessment tool
for information security.
Industrial Engineering and Management Systems, 13(1):87–100,
2014.
(doi:10.7232/iems.2014.13.1.087)
- Z.X. Ng, A. Ahmad, and
S.B. Maynard.
Information security management: Factors that influence security investments
in SMES.
In 11th Australian Information Security Management Conference, ISM
2013, pages 60–74. Edith Cowan University, 2014.
- F. Sohail, J. Ahmed,
and Z. Habib.
PKI based cryptographic module.
In 17th IEEE International Multi Topic Conference, IEEE INMIC
2014, pages 87–91. Institute of Electrical and Electronics Engineers
Inc., 2014.
(doi:10.1109/INMIC.2014.7097317)
- David D. Brandt,
Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford
Collins.
System
and methodology providing automation security analysis and network intrusion
protection in an industrial environment.
United States Patent 9,009,084, April 2015.
Assignee: Rockwell Automation Technologies, Inc. (Mayfield Heights, OH).
- David D. Brandt,
Kenwood Hall, Mark Burton Anderson, Craig D. Anderson, and George Bradford
Collins.
System
and methodology providing automation security analysis and network intrusion
protection in an industrial environment.
United States Patent 9,412,073, August 2016.
Assignee: ROCKWELL AUTOMATION TECHNOLOGIES, INC. (Mayfield Heights, OH).
- P. Shedden,
A. Ahmad, W. Smith, H. Tscherning, and R. Scheepers.
Asset identification in information security risk assessment: A business
practice approach.
Communications of the Association for Information Systems,
39(1):297–320, 2016.
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.