Skip to Main Content
Keywords: Modelling
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2019) 27 (2): 233–272.
Published: 11 February 2019
... affecting security practices. Design/methodology/approach The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied...
Journal Articles
Information Management & Computer Security (2008) 16 (3): 271–287.
Published: 18 July 2008
.... Findings The proposed typology allows us to identify different types of research models followed by security researchers and practitioners, and to infer a set of practical implications, for the benefit of those interested in empirically studying information security awareness. Research limitations...
Journal Articles
Information Management & Computer Security (2007) 15 (1): 64–77.
Published: 27 February 2007
...Subhas C. Misra; Vinod Kumar; Uma Kumar Purpose This paper seeks to present a conceptual modeling approach, which is new in the domain of information systems security risk assessment. Design/methodology/approach The approach is helpful for performing means‐end analysis, thereby uncovering...
Journal Articles
Information Management & Computer Security (2006) 14 (5): 485–495.
Published: 01 October 2006
..., the authors present a modular approach to ERP vendor and software selection and propose a 0‐1 programming model to minimize total costs associated with procurement and integration expenditures. Findings The proposed approach and the model are considered to be more useful for small manufacturing...
Journal Articles
Information Management & Computer Security (2006) 14 (1): 51–64.
Published: 01 January 2006
... introduction to CM. Next, we provide definitions of the key concepts of competency based management and analyse the competency lifecycle and the core application areas of CM systems. In the third section, we describe the different phases in developing a competency model, the cornerstone of a CM system...
Journal Articles
Information Management & Computer Security (2005) 13 (2): 144–155.
Published: 01 April 2005
...Carl Marnewick; Lessing Labuschagne Purpose This article seeks to provide a conceptual model that explains the complexity of an enterprise resource planning (ERP) system to general and project managers in a non‐technical manner that is easily understood. Design/methodology/approach The 4Ps...
Journal Articles
Information Management & Computer Security (2003) 11 (5): 249–257.
Published: 01 December 2003
...Cungang Yang; Chang N. Zhang Proposes an object‐oriented role‐based access control (ORBAC) model to efficiently represent the real world. Though ORBAC is a good model, administration of ORBAC, including creating and maintaining an access control security policy, still remains a challenging problem...
Journal Articles
Information Management & Computer Security (2000) 8 (3): 107–116.
Published: 01 August 2000
... methodology for the introduction of security in information systems (IS). However, risk analysis is based on a very simple model of IS as consisting of assets, mainly data, hardware and software, which are vulnerable to various threats. Thus, risk analysis cannot provide for an understanding...
Journal Articles
Information Management & Computer Security (1999) 7 (1): 30–40.
Published: 01 March 1999
... to enhance information security. They may also place demands on security managers to provide convincing demonstration of conformance to the standards. The risk data repository (RDR) computer model described in this paper was developed to manage organisational information security data and facilitate risk...
Journal Articles
Information Management & Computer Security (1998) 6 (5): 205–211.
Published: 01 December 1998
...V. Portougal; Lech J. Janczewski The paper discusses a set of models which can assist in developing security profiles of objects and subjects operating within industrial or commercial organisations’ databases. In these databases the information objects are often related to each other, having...
Journal Articles
Information Management & Computer Security (1997) 5 (4): 138–148.
Published: 01 October 1997
...Lam‐for Kwok States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within protection systems and the access to controlled data items. Argues that these models do not aim to, and cannot, reflect...

or Create an Account

Close Modal
Close Modal