nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An extensible analysable system model
|
Probst, Christian W. |
|
2008 |
13 |
4 |
p. 235-246 |
artikel |
2 |
Assessing the ‘insider–outsider threat’ duality in the context of the development of public–private partnerships delivering ‘choice’ in healthcare services: A sociomaterial critique
|
Crinson, Iain |
|
2008 |
13 |
4 |
p. 202-206 |
artikel |
3 |
Catching the malicious insider
|
Jones, Andy |
|
2008 |
13 |
4 |
p. 220-224 |
artikel |
4 |
In a ‘trusting’ environment, everyone is responsible for information security
|
Williams, Patricia A.H. |
|
2008 |
13 |
4 |
p. 207-215 |
artikel |
5 |
Information Security management: A human challenge?
|
Ashenden, Debi |
|
2008 |
13 |
4 |
p. 195-201 |
artikel |
6 |
Information security management standards: Compliance, governance and risk management
|
Humphreys, Edward |
|
2008 |
13 |
4 |
p. 247-255 |
artikel |
7 |
Introduction
|
Coles-Kemp, Lizzie |
|
2008 |
13 |
4 |
p. 193-194 |
artikel |
8 |
ISMS insider intrusion prevention and detection
|
Overill, Richard E. |
|
2008 |
13 |
4 |
p. 216-219 |
artikel |
9 |
Practical management of malicious insider threat – An enterprise CSIRT perspective
|
Walker, Terrence |
|
2008 |
13 |
4 |
p. 225-234 |
artikel |