Skip to Main Content
Bellevue University
LibGuides
Library
MSSM
Journal Articles
Search this Guide
Search
MSSM: Journal Articles
Home
MSSM 501
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 506
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 517
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 523
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 602
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 607
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 618
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 624
Toggle Dropdown
E-Books
Journal Articles
Videos
Additional Resources
Libguide Curator
Lorraine Patrick
Email Me
Schedule Appointment
Contact:
Bellevue University
Freeman/Lozier Library
1000 Galvin Rd. S.
402-557-7313
MSSM 618 Journal Articles
Addressing information security risks by adopting standards.
by
Al-Ahmad, W., Mohammad, B.
International Journal of Information Security Science, (2013). Vol. 2 (2), p28-43.
Aspects of security standards for cloud computing.
by
Togan, M.
MTA Review (2015). Vol. 25(1), pgs. 31-44.
A cyclical evaluation model of information security maturity.
by
Alencar R., Evandro, M., Westphall, C., Dos Santos, D., Becker-Westphall, C.
Information Management & Computer Security (2014). Vol. 22(3), pgs. 265-278.
Diffusion and adoption of information security management standards across countries and industries.
by
Tuncalp, D.
Journal of Global Information Technology Management (2014). Vol. 17(4), p. 221-
227.
Foundations for an intelligence-driven information security risk-management system.
by
Webb, J.; Maynard, S. B; Ahmad, A., Shanks, G.
JITTA : Journal of Information Technology Theory and Application.
Information security assessment of SME's as coursework-learning information security management by doing.
by
Ilvonen, I.
Journal of Information Systems Education.(2013), Vol. 24(1),p53-61.
Information security outsourcing with system inter-dependency and mandatory security requirement.
by
Hui, K., Lung. H, Wendy; Y., Wei T.
Journal of Management Information Systems.
(2012). Vol. 29 Issue 3, p117-156.
Leveraging COBIT to implement information security (Part 3).
by
Frisken, J.
COBIT Focus (2015), p. 1-7.
Leveraging COBIT to implement information security (Part 4).
by
Frisken, J.
COBIT Focus, 2015.
The national institute of standards and technology.
by
Anders, S.
The CPA Journal (2016). New York Vol. 86(5), pgs. 31-32.
Protecting information assets using ISO/IEC security standards.
by
Evans, L.
Information Management Journal, 2016. Vol. 50 (6), 28-33.
Securqual: An instrument for evaluating the effectiveness of enterprise information security programs.
by
Steinbart, P. J., Raschke, R., Gal, G., Dilla, W.
Journal of Information Systems, 2016. Vol. 30 Issue 1, p71-92.
<<
Previous:
E-Books
Next:
Videos >>