关注
Kenneth J. Knapp
Kenneth J. Knapp
Anderson University (SC)
在 andersonuniversity.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Information security: management's effect on culture and policy
KJ Knapp, TE Marshall, RK Rainer Jr, F Nelson Ford
Information Management & Computer Security 14 (1), 24-36, 2006
4282006
Information security policy: An organizational-level process model
KJ Knapp, RF Morris Jr, TE Marshall, TA Byrd
Computers & security 28 (7), 493-508, 2009
3572009
Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance
KJ Knapp, C Maurer, M Plachkinova
Journal of Information Systems Education 28 (2), 101, 2017
1402017
Policy awareness, enforcement and maintenance: Critical to information security effectiveness in organizations
KJ Knapp, CJ Ferrante
Journal of Management Policy and Practice 13 (5), 66-80, 2012
1102012
Cyber-warfare threatens corporations: Expansion into commercial environments.
KJ Knapp, WR Boulton
Information Systems Management 23 (2), 2006
892006
The top information security issues facing organizations: What can government do to help?
KJ Knapp, TE Marshall, RK Rainer Jr, DW Morrow
Information Systems Security 1, 327, 2006
812006
Do information security professionals and business managers view information security issues differently?
RK Rainer Jr, TE Marshall, KJ Knapp, GH Montgomery
Information Systems Security 16 (2), 100-108, 2007
662007
Information security effectiveness: Conceptualization and validation of a theory
KJ Knapp, TE Marshall, RK Rainer Jr, FN Ford
International Journal of Information Security and Privacy (IJISP) 1 (2), 37-60, 2007
642007
Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness
KJ Knapp, TE Marshall, RK Rainer, FN Ford
(ISC)2, Palm Harbor, Florida and Auburn University, Auburn, Alabama, 2005
43*2005
Cyber security and global information assurance: threat analysis and response solutions: threat analysis and response solutions
KJ Knapp
IGI Global, 2009
412009
Key issues in data center security: An investigation of government audit reports
KJ Knapp, GD Denney, ME Barner
Government Information Quarterly 28 (4), 533-541, 2011
362011
Top Ranked Information Security Issues: The 2004 International Information Systems Security Certification Consortium (ISC)2 Survey Results
KJ Knapp, TE Marshall, RK Rainer Jr, DW Morrow
Auburn University, Auburn, AL, 2004
262004
A Model of Managerial Effectiveness in Information Security: From grounded theory to empirical test
K Knapp
Auburn University, 2005
242005
Fighting child pornography: a review of legal and technological developments
JV Eggestein, KJ Knapp
Journal of Digital Forensics, Security and Law 9 (4), 3, 2014
222014
Information security program effectiveness in organizations: The moderating role of task interdependence
KJ Knapp, CJ Ferrante
Journal of Organizational and End User Computing (JOEUC) 26 (1), 27-46, 2014
182014
Ten information warfare trends
KJ Knapp, WR Boulton
Cyber Warfare and Cyber Terrorism, 17-25, 2007
162007
Defense mechanisms of biological cells: a framework for network security thinking
KJ Knapp, F Morris, RK Rainer Jr, TA Byrd
Communications of the Association for Information Systems 12 (1), 47, 2003
162003
Top ranked information security issues
KJ Knapp, TE Marshall, RK Rainer, DW Morrow
International Information Systems Security Certification Consortium (ISC), 2004
112004
Least Privilege across People, Process, and Technology: Endpoint Security Framework
M Plachkinova, K Knapp
Journal of Computer Information Systems 63 (5), 1153-1165, 2023
102023
The common body of knowledge: A framework to promote relevant information security research
KJ Knapp, FN Ford, TE Marshall, RK Rainer
Journal of Digital Forensics, Security and Law 2 (1), 1, 2007
92007
系统目前无法执行此操作,请稍后再试。
文章 1–20