共 50 条
- [31] Implementation of an Information Systems Security Policy: Action Research PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON RESEARCH METHODOLOGY FOR BUSINESS AND MANAGEMENT STUDIES (ECRM 2014), 2014, : 244 - 252
- [32] Security Policy Verification Tool for Geographical Information Systems INFORMATION FUSION AND GEOGRAPHIC INFORMATION SYSTEMS, PROCEEDINGS, 2007, : 128 - 146
- [33] The EDITH approach: The management of authorisations and security in healthcare information systems TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 200 - 213
- [34] POLICY ISSUES AND DEVELOPMENT OF INFORMATION SYSTEMS ASLIB PROCEEDINGS, 1971, 23 (07): : 351 - &
- [35] ORGANIZATION FOR ECONOMIC COOPERATION AND DEVELOPMENT INFORMATION COMPUTER COMMUNICATIONS POLICY COMMITTEE GUIDELINES FOR THE SECURITY OF INFORMATION-SYSTEMS SECURITY AND CONTROL OF INFORMATION TECHNOLOGY IN SOCIETY, 1994, 43 : 83 - 89
- [37] Integrating security design into information systems development CONSTRUCTING THE INFRASTRUCTURE FOR THE KNOWLEGE ECONOMY: METHODS AND TOOLS, THEORY AND STRUCTURE, 2004, : 355 - 366
- [38] Integrating information security in the development of telematics systems INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 255 - 266
- [39] Information systems security and the information systems development project Towards a framework for their integration SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 347 - 356