The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mikko T. Siponen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tero Vartiainen, Mikko T. Siponen
    Universality thesis in IS ethics education - an empirical study. [Citation Graph (0, 0)][DBLP]
    ECIS, 2003, pp:- [Conf]
  2. Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman
    Mini Track: 'Information Systems Security Management'. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  3. Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman
    Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  4. Mikko T. Siponen, Richard Baskerville, Tapio Kuivalainen
    Integrating Security into Agile Development Methods. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  5. Mikko T. Siponen, Gurpreet Dhillon
    Information Systems Security Management: Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  6. Mikko T. Siponen, Carl Stucke
    Effective Anti-Spam Strategies in Companies: An International Study. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  7. Mikko T. Siponen, Tero Vartiainen
    End-User Ethics Teaching: Issues and a Solution based on Universalization. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  8. Seppo Pahnila, Mikko T. Siponen, Adam Mahmood
    Employees' Behavior towards IS Security Policy Compliance. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:156- [Conf]
  9. Tero Vartiainen, Mikko T. Siponen
    Defects, Usefulness and Usability of Ethics Theories in IS Ethics Education. [Citation Graph (0, 0)][DBLP]
    ICEIS (5), 2004, pp:179-186 [Conf]
  10. Pekka Abrahamsson, Juhani Warsta, Mikko T. Siponen, Jussi Ronkainen
    New Directions on Agile Methods: A Comparative Analysis. [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:244-254 [Conf]
  11. Mikko T. Siponen, Richard Baskerville
    A New Paradigm for Adding Security Into IS Development Methods. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:99-112 [Conf]
  12. Mikko T. Siponen
    Policies for Construction of Information Systems' Security Guidelines: Five Approaches. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:111-120 [Conf]
  13. Mikko T. Siponen
    On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:401-410 [Conf]
  14. Mikko T. Siponen
    A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:437-452 [Conf]
  15. Mikko T. Siponen
    Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:91-108 [Conf]
  16. Mikko T. Siponen
    New Directions on IS Security Methods. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:325-336 [Conf]
  17. Mikko T. Siponen, Jorma Kajava
    Ontology of Organizational IT Security Awareness - From Theoretical Foundations to Practical Framework. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:327-333 [Conf]
  18. Mikko T. Siponen
    The relevance of software rights: An anthology of the divergence of sociopolitical doctrines. [Citation Graph (0, 0)][DBLP]
    AI Soc., 2001, v:15, n:1-2, pp:128-148 [Journal]
  19. Mikko T. Siponen
    Information security standards focus on the existence of process, not its content. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:8, pp:97-100 [Journal]
  20. Mikko T. Siponen
    A conceptual foundation for organizational information security awareness. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:1, pp:31-41 [Journal]
  21. Mikko T. Siponen
    Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:197-209 [Journal]
  22. Mikko T. Siponen
    Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:5, pp:210-224 [Journal]

  23. Software Piracy: Original Insights from a Criminological Perspective. [Citation Graph (, )][DBLP]


  24. New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory. [Citation Graph (, )][DBLP]


  25. Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online Newspapers. [Citation Graph (, )][DBLP]


  26. Employees' Adherence to Information Security Policies: An Empirical Study. [Citation Graph (, )][DBLP]


  27. Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. [Citation Graph (, )][DBLP]


  28. Technical opinion - Are employees putting your company at risk by not following information security policies? [Citation Graph (, )][DBLP]


  29. Compliance with Information Security Policies: An Empirical Investigation. [Citation Graph (, )][DBLP]


  30. A review of information security issues and respective research contributions. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002