Information Management & Computer Security

Titel Veröffentlichungsdatum Sprache Zitate
A conceptual architecture for real‐time intrusion monitoring2000/05/01English11
Intranets for organizational innovation2001/05/01English10
EDI security: a model of EDI risks and associated controls1997/05/01English10
Expert systems in medicine: academic illusion or real power?2000/05/01English10
Controlling corporate e‐mail, PC use and computer security2001/05/01English10
Towards an insider threat prediction specification language2006/08/01English10
Data mining as a technique for knowledge management in business process redesign2005/09/01English10
A holistic framework for mCRM – data mining perspective2009/06/05English10
Shaping security behaviour through discipline and agility2011/10/11English10
Goal directed project management methodology for the support of ERP implementation and optimal adaptation procedure2005/02/01English10
Management versus security specialists: an empirical study on security related perceptions2008/06/06English10
On the imbalance of the security problem space and its expected consequences2007/10/16English10
Evaluating the performance of open source software projects using data envelopment analysis2008/11/21English10
The landscape of cybercrime in Greece2011/06/07English10
Knowledge and information management in e‐learning environments; the user agent architecture2002/10/01English10
A model for the future of electronic commerce1997/12/01English10
Software piracy among academics: an empirical study in Brunei Darussalam2000/03/01English10
The biometric technologies business case: a systematic approach2005/04/01English9
Information security in business environments1996/03/01English9
Ethics and information technology use: a survey of US based SMEs2000/12/01English9
Protecting personal privacy on the Internet2002/05/01English9
Neural Networks and Expert Systems: New Horizons in Business Finance Applications1993/01/01English9
E‐supply chain management: an evaluation of current web initiatives2006/03/01English9
Achieving automated intrusion response: a prototype implementation2006/05/01English9
Driving safely on the information superhighway1997/03/01English9
Community management support through community‐based information networks1999/08/01English9
Doing business on the Internet: marketing and security aspects1996/10/01English9
RECOT: an expert system for the reduction of environmental cost in the textile industry2004/07/01English9
On security preparations against possible IS threats across industries2006/08/01English9
Human‐related problems of information security in East African cross‐cultural environments2010/11/23English9