Heim
Forschungstrends
Wissenschaftliche Artikel
Zeitschriften
Wissenschaftliche Zeitschriften
Open Access Journals
Zeitschriftensuche
Kontakt
Melden Sie sich an
Login
Sprache
English
German
Information Management & Computer Security
Titel
Veröffentlichungsdatum
Sprache
Zitate
Comparison of sub‐Saharan Africa's e‐government status with developed and transitional nations
2008/07/18
English
16
Identifying risks during information system development: managing the process
2002/08/01
English
16
Information systems outsourcing success factors: a review and some results
2005/12/01
English
16
Towards usable privacy policy display and management
2012/03/16
English
16
Optimizing investment decisions in selecting information security remedies
2011/06/07
English
16
Determinants of the critical success factor of disaster recovery planning for information systems
2009/07/17
English
16
A framework for analyzing e‐commerce security
2002/10/01
English
16
Decision support through knowledge management: the role of the artificial intelligence
2003/12/01
English
16
Keystroke dynamics on a mobile handset: a feasibility study
2003/10/01
English
15
Information security management (3): the Code of Practice for Information Security Management (BS 7799)
1998/12/01
English
15
Trust, privacy, and security in electronic business: the case of the GCC countries
2006/05/01
English
15
The importance of technology trust in Web services security
2002/12/01
English
15
Towards a “business‐led” approach to information systems development
2000/12/01
English
15
On biometrics‐based authentication and identification from a privacy‐protection perspective
2004/02/01
English
14
A practical application of CMM to medical security capability
2008/03/21
English
14
Information privacy compliance in the healthcare industry
2008/03/21
English
14
Conceptualizing strategic issues in information technology outsourcing
2005/09/01
English
14
A risk‐control framework for e‐marketplace participation: the findings of seven cases
2007/05/01
English
14
The application of signature recognition to transparent handwriting verification for mobile devices
2007/06/12
English
14
Evaluation and selection of an antivirus and content filtering software
2002/03/01
English
14
How well are information risks being communicated to your computer end‐users?
2007/10/16
English
14
Human aspects of information security
2013/03/15
English
14
Integrating fuzzy logic into decision suppport systems: current research and future prospects
2003/05/01
English
14
Information security management and modelling
1999/03/01
English
14
Formalizing information security requirements
2001/03/01
English
14
Securing SCADA systems
2008/10/10
English
13
Cyberterrorism, computer crime, and reality
2004/04/01
English
13
Biometric authentication: assuring access to information
2002/03/01
English
13
Shielding your company against information compromise
2000/08/01
English
13
The evolution of information technology
1998/08/01
English
13
«
‹ Durchlässig
Nächste ›
»