{"title":"HIPAA201: A Framework Approach to HIPAA Security Readiness","authors":"David MacLeod, Brian T. Geffert, David Deckter","doi":"10.1201/9781351073547-54","DOIUrl":"https://doi.org/10.1201/9781351073547-54","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125060427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Work with a Managed Security Service Provider","authors":"Laurie Hill McQuillan","doi":"10.1201/9781351073547-26","DOIUrl":"https://doi.org/10.1201/9781351073547-26","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121910656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The International Dimensions of Cyber-Crime","authors":"Ed Gabrys","doi":"10.1201/9781351073547-55","DOIUrl":"https://doi.org/10.1201/9781351073547-55","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133934708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organizing for Success: Some Human Resources Issues in Information Security","authors":"Jeffrey H. Fenton, James M. Wolfe","doi":"10.1201/9781351073547-30","DOIUrl":"https://doi.org/10.1201/9781351073547-30","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117230526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"It Is All about Control","authors":"Hare Chris","doi":"10.1201/9781351073547-2","DOIUrl":"https://doi.org/10.1201/9781351073547-2","url":null,"abstract":"","PeriodicalId":274926,"journal":{"name":"Information Security Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128327858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}