Information Management & Computer Security

Titel Veröffentlichungsdatum Sprache Zitate
Comparison of sub‐Saharan Africa's e‐government status with developed and transitional nations2008/07/18English16
Identifying risks during information system development: managing the process2002/08/01English16
Information systems outsourcing success factors: a review and some results2005/12/01English16
Towards usable privacy policy display and management2012/03/16English16
Optimizing investment decisions in selecting information security remedies2011/06/07English16
Determinants of the critical success factor of disaster recovery planning for information systems2009/07/17English16
A framework for analyzing e‐commerce security2002/10/01English16
Decision support through knowledge management: the role of the artificial intelligence2003/12/01English16
Keystroke dynamics on a mobile handset: a feasibility study2003/10/01English15
Information security management (3): the Code of Practice for Information Security Management (BS 7799)1998/12/01English15
Trust, privacy, and security in electronic business: the case of the GCC countries2006/05/01English15
The importance of technology trust in Web services security2002/12/01English15
Towards a “business‐led” approach to information systems development2000/12/01English15
On biometrics‐based authentication and identification from a privacy‐protection perspective2004/02/01English14
A practical application of CMM to medical security capability2008/03/21English14
Information privacy compliance in the healthcare industry2008/03/21English14
Conceptualizing strategic issues in information technology outsourcing2005/09/01English14
A risk‐control framework for e‐marketplace participation: the findings of seven cases2007/05/01English14
The application of signature recognition to transparent handwriting verification for mobile devices2007/06/12English14
Evaluation and selection of an antivirus and content filtering software2002/03/01English14
How well are information risks being communicated to your computer end‐users?2007/10/16English14
Human aspects of information security2013/03/15English14
Integrating fuzzy logic into decision suppport systems: current research and future prospects2003/05/01English14
Information security management and modelling1999/03/01English14
Formalizing information security requirements2001/03/01English14
Securing SCADA systems2008/10/10English13
Cyberterrorism, computer crime, and reality2004/04/01English13
Biometric authentication: assuring access to information2002/03/01English13
Shielding your company against information compromise2000/08/01English13
The evolution of information technology1998/08/01English13