Author of the publication

Addressing Dynamic Issues in Information Security Management.

, , , and . Inf. Manag. Comput. Secur., 19 (1): 5-24 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World., , , and . ISSA, page 1-11. ISSA, Pretoria, South Africa, (2006)ICT pollution and liability.. SIGCAS Comput. Soc., 41 (1): 48-53 (2011)Bridging the gap between general management and technicians - A case study on ICT security in a developing country., , , , and . Comput. Secur., 26 (1): 44-55 (2007)The Mitigation of ICT Risks Using Emitl Tool: An Empirical Study., , , and . IICIS, volume 193 of IFIP, page 157-173. Springer, (2004)A method for predicting the probability of business network profitability., , , , , and . Inf. Syst. E Bus. Manag., 12 (4): 567-593 (2014)Risk and Compliance Management Framework for Outsourced Global Software Development., and . ICGSE, page 228-233. IEEE Computer Society, (2010)BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business., and . SEC, volume 214 of IFIP Conference Proceedings, page 335-346. Kluwer, (2002)Value creation and Return On Security Investments (ROSI)., , and . SEC, volume 232 of IFIP, page 25-35. Springer, (2007)Business Model Risk Analysis: Predicting the Probability of Business Network Profitability., , , , , and . IWEI, volume 144 of Lecture Notes in Business Information Processing, page 118-130. Springer, (2013)Method for Insuring IT Risks., and . HICSS, IEEE Computer Society, (2004)