Information security: management's effect on culture and policy KJ Knapp, TE Marshall, RK Rainer Jr, F Nelson Ford Information Management & Computer Security 14 (1), 24-36, 2006 | 428 | 2006 |
Information security policy: An organizational-level process model KJ Knapp, RF Morris Jr, TE Marshall, TA Byrd Computers & security 28 (7), 493-508, 2009 | 357 | 2009 |
Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance KJ Knapp, C Maurer, M Plachkinova Journal of Information Systems Education 28 (2), 101, 2017 | 140 | 2017 |
Policy awareness, enforcement and maintenance: Critical to information security effectiveness in organizations KJ Knapp, CJ Ferrante Journal of Management Policy and Practice 13 (5), 66-80, 2012 | 110 | 2012 |
Cyber-warfare threatens corporations: Expansion into commercial environments. KJ Knapp, WR Boulton Information Systems Management 23 (2), 2006 | 89 | 2006 |
The top information security issues facing organizations: What can government do to help? KJ Knapp, TE Marshall, RK Rainer Jr, DW Morrow Information Systems Security 1, 327, 2006 | 81 | 2006 |
Do information security professionals and business managers view information security issues differently? RK Rainer Jr, TE Marshall, KJ Knapp, GH Montgomery Information Systems Security 16 (2), 100-108, 2007 | 66 | 2007 |
Information security effectiveness: Conceptualization and validation of a theory KJ Knapp, TE Marshall, RK Rainer Jr, FN Ford International Journal of Information Security and Privacy (IJISP) 1 (2), 37-60, 2007 | 64 | 2007 |
Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness KJ Knapp, TE Marshall, RK Rainer, FN Ford (ISC)2, Palm Harbor, Florida and Auburn University, Auburn, Alabama, 2005 | 43* | 2005 |
Cyber security and global information assurance: threat analysis and response solutions: threat analysis and response solutions KJ Knapp IGI Global, 2009 | 41 | 2009 |
Key issues in data center security: An investigation of government audit reports KJ Knapp, GD Denney, ME Barner Government Information Quarterly 28 (4), 533-541, 2011 | 36 | 2011 |
Top Ranked Information Security Issues: The 2004 International Information Systems Security Certification Consortium (ISC)2 Survey Results KJ Knapp, TE Marshall, RK Rainer Jr, DW Morrow Auburn University, Auburn, AL, 2004 | 26 | 2004 |
A Model of Managerial Effectiveness in Information Security: From grounded theory to empirical test K Knapp Auburn University, 2005 | 24 | 2005 |
Fighting child pornography: a review of legal and technological developments JV Eggestein, KJ Knapp Journal of Digital Forensics, Security and Law 9 (4), 3, 2014 | 22 | 2014 |
Information security program effectiveness in organizations: The moderating role of task interdependence KJ Knapp, CJ Ferrante Journal of Organizational and End User Computing (JOEUC) 26 (1), 27-46, 2014 | 18 | 2014 |
Ten information warfare trends KJ Knapp, WR Boulton Cyber Warfare and Cyber Terrorism, 17-25, 2007 | 16 | 2007 |
Defense mechanisms of biological cells: a framework for network security thinking KJ Knapp, F Morris, RK Rainer Jr, TA Byrd Communications of the Association for Information Systems 12 (1), 47, 2003 | 16 | 2003 |
Top ranked information security issues KJ Knapp, TE Marshall, RK Rainer, DW Morrow International Information Systems Security Certification Consortium (ISC), 2004 | 11 | 2004 |
Least Privilege across People, Process, and Technology: Endpoint Security Framework M Plachkinova, K Knapp Journal of Computer Information Systems 63 (5), 1153-1165, 2023 | 10 | 2023 |
The common body of knowledge: A framework to promote relevant information security research KJ Knapp, FN Ford, TE Marshall, RK Rainer Journal of Digital Forensics, Security and Law 2 (1), 1, 2007 | 9 | 2007 |