Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-11 of 11
Keywords: Modelling
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Socio-technical systems cybersecurity framework
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (2): 233–272.
Published: 11 February 2019
... affecting security practices. Design/methodology/approach The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied...
Journal Articles
Process‐variance models in information security awareness research
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (3): 271–287.
Published: 18 July 2008
.... Findings The proposed typology allows us to identify different types of research models followed by security researchers and practitioners, and to infer a set of practical implications, for the benefit of those interested in empirically studying information security awareness. Research limitations...
Journal Articles
A strategic modeling technique for information security risk assessment
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (1): 64–77.
Published: 27 February 2007
...Subhas C. Misra; Vinod Kumar; Uma Kumar Purpose This paper seeks to present a conceptual modeling approach, which is new in the domain of information systems security risk assessment. Design/methodology/approach The approach is helpful for performing means‐end analysis, thereby uncovering...
Journal Articles
A modular approach to ERP system selection: A case study
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2006) 14 (5): 485–495.
Published: 01 October 2006
..., the authors present a modular approach to ERP vendor and software selection and propose a 0‐1 programming model to minimize total costs associated with procurement and integration expenditures. Findings The proposed approach and the model are considered to be more useful for small manufacturing...
Journal Articles
Competency based management: a review of systems and approaches
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2006) 14 (1): 51–64.
Published: 01 January 2006
... introduction to CM. Next, we provide definitions of the key concepts of competency based management and analyse the competency lifecycle and the core application areas of CM systems. In the third section, we describe the different phases in developing a competency model, the cornerstone of a CM system...
Journal Articles
A conceptual model for enterprise resource planning (ERP)
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (2): 144–155.
Published: 01 April 2005
...Carl Marnewick; Lessing Labuschagne Purpose This article seeks to provide a conceptual model that explains the complexity of an enterprise resource planning (ERP) system to general and project managers in a non‐technical manner that is easily understood. Design/methodology/approach The 4Ps...
Journal Articles
An XML‐based administration method on role‐based access control in the enterprise environment
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (5): 249–257.
Published: 01 December 2003
...Cungang Yang; Chang N. Zhang Proposes an object‐oriented role‐based access control (ORBAC) model to efficiently represent the real world. Though ORBAC is a good model, administration of ORBAC, including creating and maintaining an access control security policy, still remains a challenging problem...
Journal Articles
The use of business process modelling in information systems security analysis and design
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2000) 8 (3): 107–116.
Published: 01 August 2000
... methodology for the introduction of security in information systems (IS). However, risk analysis is based on a very simple model of IS as consisting of assets, mainly data, hardware and software, which are vulnerable to various threats. Thus, risk analysis cannot provide for an understanding...
Journal Articles
Information security management and modelling
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1999) 7 (1): 30–40.
Published: 01 March 1999
... to enhance information security. They may also place demands on security managers to provide convincing demonstration of conformance to the standards. The risk data repository (RDR) computer model described in this paper was developed to manage organisational information security data and facilitate risk...
Journal Articles
Industrial information‐weight security models
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (5): 205–211.
Published: 01 December 1998
...V. Portougal; Lech J. Janczewski The paper discusses a set of models which can assist in developing security profiles of objects and subjects operating within industrial or commercial organisations’ databases. In these databases the information objects are often related to each other, having...
Journal Articles
Hypertext information security model for organizations
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (4): 138–148.
Published: 01 October 1997
...Lam‐for Kwok States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within protection systems and the access to controlled data items. Argues that these models do not aim to, and cannot, reflect...
