Digital forensic readiness: Expert perspectives on a theoretical framework
Tài liệu tham khảo
Ahmad, 2012, Incident response teams – challenges in supporting the organizational security function, Comput Secur, 31, 643, 10.1016/j.cose.2012.04.001
Ahmad, 2014, Information security strategies: towards an organizational multi-strategy perspective, J Intel Manuf, 25, 357, 10.1007/s10845-012-0683-0
AIC, 2009
Beebe, 2009, Digital forensic research: the good, the bad, and the unaddressed, 17
Beecham, 2005, Using an expert panel to validate a requirements process improvement model, J Syst Softw, 76, 251, 10.1016/j.jss.2004.06.004
Belanger, 2012, Theorizing in information systems research using focus groups, Australas J Inf Syst, 109
Biggs, 2009
Carrier, 2003, Getting physical with the digital investigation process, Int J Digital Evid, 2, 1
Casey, 2005, Case study: network intrusion investigation - lessons in forensic preparation, Digit Investig, 254, 10.1016/j.diin.2005.11.007
Elo, 2008, The qualitative content analysis process, J Adv Nurs, 107, 10.1111/j.1365-2648.2007.04569.x
Elyas, 2014, Forensic readiness: is your organisation ready?, Digit Forensic Mag, 58
Grobler, 2007
Grobler, 2010
Kitzinger, 1995, Qualitative research: introducing focus groups, BMJ, 299, 10.1136/bmj.311.7000.299
Krueger, 2001, Designing and conducting focus group interviews, Soc Analysis Sel Tools Tech, 4
Lim, 2010, Embedding information security culture: emerging concerns and challenges
Marcella, 2008, Electronically stored information and cyberforensics, Information Syst Control J, 44
Morgan, 1996, Focus groups, Annu Rev Sociol, 129, 10.1146/annurev.soc.22.1.129
Mouhtaropoulos, 2014, Digital forensic readiness: are we there yet?, J Int Commer Law Technol, 9, 173
Okoli, 2010, 1
Pangalos, 2010, Information assurance and forensic readiness, e-Democracy, 181
Poeppelbuss, 2011, Maturity models in information systems research: literature search and analysis, Commun Assoc Inf Syst, 29, 505
Reyes, 2007, 83
Rowlingson, 2004, A ten step process for forensic readiness, Int J Digital Evid, 2
Shedden, 2010, Organisational learning and incident response: promoting effective learning through the incident response process, 139
Shedden, 2010, Risk management standards – the perception of ease of use, J Inf Syst Secur, 6
Strauss, 1994, Grounded theory methodology, Handb Qual Res, 273
Tan, 2001, 1
Tan, 2003, Incident handling: where the need for planning is often not recognised
Tan, 2010, Information security governance: when compliance becomes more important than security, 55
Taylor, 2010, Digital evidence in cloud computing systems, Comput Law Secur Rev, 26, 304, 10.1016/j.clsr.2010.03.002
Webb, 2014, A situation awareness model for information security risk management, Comput Secur, 44, 1, 10.1016/j.cose.2014.04.005
Wolfswinkel, 2011, Using grounded theory as a method for rigorously reviewing literature, Eur J Inf Syst, 22, 45, 10.1057/ejis.2011.51
Yasinsac, 2001