Author of the publication

Cyber Security Exercises: Testing an Organization?s Ability to Prevent, Detect, and Respond to Cyber Security Events.

, , and . HICSS, IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A view from the entry level: student perceptions of critical information systems job attributes.. SIGCPR, page 57-64. ACM, (2001)The requisite variety of skills for IT professionals., , , , and . Commun. ACM, 53 (6): 144-148 (2010)A Typology of Requisite Skills for Information Technology Professionals., , , , , , and . HICSS, page 1-10. IEEE Computer Society, (2011)Ethical Decision-Making in an IT Context: The Roles of Personal Moral Philosophies and Moral Intensity., , and . HICSS, IEEE Computer Society, (2006)Information Security Cultures of Four Professions: A Comparative Study., , and . HICSS, page 454. IEEE Computer Society, (2008)The Information Technology Workforce: A Comparison of Critical Skills of Clients and Service Providers., , , , , , , and . IS Management, 29 (1): 2-12 (2012)IT Workforce Trends: Implications For IS Programs., , , , , , and . Commun. Assoc. Inf. Syst., (2006)The Dynamics of Alignment: Insights from a Punctuated Equilibrium Model, , and . Organization Science, 12 (2): 179-197 (2001)The Role of Exercises in Training the Nation's Cyber First-Responders., and . AMCIS, page 560. Association for Information Systems, (2004)The Impact of Sourcing on the IT Workforce Pipeline., , and . AMCIS, page 390. Association for Information Systems, (2006)