Siponen, Mikko T.
131  Ergebnisse:
Personensuche X
?
1

Executives' Commitment to Information Security : Interac..:

Menon, Nirup M. ; Siponen, Mikko T.
ACM SIGMIS Database: the DATABASE for Advances in Information Systems.  51 (2020)  2 - p. 36-53 , 2020
 
?
3

Executives' Commitment to Information Security: Interaction..:

Menon, Nirup M. ; Siponen, Mikko T.
ACM SIGMIS Database: the DATABASE for Advances in Information Systems.  51 (2020)  2 - p. 36-53 , 2020
 
?
 
?
5

Unauthorized copying of software : an empirical study of..:

Siponen, Mikko T. ; Vartiainen, Tero
ACM SIGCAS Computers and Society.  37 (2007)  1 - p. 30-43 , 2007
 
?
6

A review of information security issues and respective rese..:

Siponen, Mikko T. ; Oinas-Kukkonen, Harri
ACM SIGMIS Database: the DATABASE for Advances in Information Systems.  38 (2007)  1 - p. 60-80 , 2007
 
?
7

A review of information security issues and respective rese..:

Siponen, Mikko T. ; Oinas-Kukkonen, Harri
ACM SIGMIS Database: the DATABASE for Advances in Information Systems.  38 (2007)  1 - p. 60-80 , 2007
 
?
8

Analysis of modern IS security development approaches: towa..:

Siponen, Mikko T.
Information and Organization.  15 (2005)  4 - p. 339-375 , 2005
 
?
9

An analysis of the traditional IS security approaches: impl..:

Siponen, Mikko T
European Journal of Information Systems.  14 (2005)  3 - p. 303-315 , 2005
 
?
10

New directions on agile methods : a comparative analysis:

, In: Proceedings of the 25th International Conference on Software Engineering,
 
?
11

On the Role of Human Mortality in Information System Securi..:

, In: Advances in Information Resources Management; Advanced Topics in Information Resources Management, Volume 2,
Siponen, Mikko T. - p. 301-319 , 2003
 
?
12

A conceptual foundation for organizational information secu..:

Siponen, Mikko T.
Information Management & Computer Security.  8 (2000)  1 - p. 31-41 , 2000
 
?
13

Critical analysis of different approaches to minimizing use..:

Siponen, Mikko T.
Information Management & Computer Security.  8 (2000)  5 - p. 197-209 , 2000
 
?
 
1-15