Coordinating in Threes: Unraveling Complexity in Information Systems Security Management
Full text | View |
||
Source | Journal of Information Systems Security Volume 20, Number 1 (2024)
Pages 3–10
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Gurpreet Dhillon — University of North Texas, USA | ||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
Editorial Note
Keywords
Information Systems Security Definition, Integrity, Coordination in Threes, Technical Controls, Formal Controls, Informal Controls, TFI Model.
References
Backhouse, J., & Dhillon, G. (1995). Managing computer crime: a research outlook. Computers & Security, 14(7), 645-651.
Backhouse, J., & Dhillon, G. (1996). Structures of responsibility and security of information systems. European Journal of Information Systems, 5(1), 2-9.
Dhillon, G. (1995). Interpreting the management of information systems security [PhD, London School of Economics and Political Science, University of London]. London.
Dhillon, G. (1997a). The Clinical Information System: a case of misleading design decisions. In J. Liebowitz & M. Khosrowpour (Eds.), Cases in information technology management in modern organizations (pp. 275-287). Idea Group Publishing.
Dhillon, G. (1997b). Managing information system security. Macmillan.
Dhillon, G. (1999). Managing and controlling computer misuse. Information Management & Computer Security, 7(5).
Dhillon, G. (2001). Violation of safeguards by trusted personnel and understanding related information security concerns. Computers & Security, 20(2), 165-172.
Dhillon, G. (2004). The Challenge of Managing Information Security. International Journal of Information Management, 24(1), 3-4.
Dhillon, G. (2007). Principles of information systems security: text and cases. John Wiley & Sons.
Dhillon, G. (2023). The Intellectual Core of Information Systems Security. Journal of Information Systems Security, 10(2), 91-95.
Dhillon, G., & Backhouse, J. (1996). Risks in the use of information technology within organizations. International Journal of Information Management, 16(1), 65-74.
Dhillon, G., & Chowdhuri, R. (2014). Organizational Transformation and Information Security Culture: A Telecom Case Study. In S. Jajodia, F. Cuppens, & N. Cuppens-Boulahia (Eds.), ICT Systems Security and Privacy Protection. Springer.
Thomas, M., & Dhillon, G. (2012). Interpreting Deep Structures of Information Systems Security. The Computer Journal, 55(10), 1148-1156.