Information Management & Computer Security

Titel Veröffentlichungsdatum Sprache Zitate
Preparation, detection, and analysis: the diagnostic work of IT security incident response2010/03/23English35
Information management of automatic data capture: an overview of technical developments2002/08/01English34
Issues in cybersecurity; understanding the potential risks associated with hackers/crackers2002/10/01English34
Managing and controlling computer misuse1999/10/01English33
A survey of intrusion detection and prevention systems2010/10/12English33
Role of trust in e‐business success2004/02/01English33
An analysis of mobile credit card usage intentions2007/08/21English32
Supporting decision making in risk management through an evidence‐based information systems project risk checklist2008/06/06English32
Global e‐commerce: a framework for understanding and overcoming the trust barrier2003/08/01English32
The application of information security policies in large UK‐based organizations: an exploratory investigation2003/08/01English32
Information security management objectives and practices: a parsimonious framework2008/07/18English31
Information systems security issues and decisions for small businesses2005/09/01English31
Enhancing Web privacy and anonymity in the digital era2004/07/01English30
Understanding and transforming organizational security culture2010/03/23English30
A vocabulary test to assess information security awareness2010/11/23English30
A business approach to effective information technology risk analysis and management1996/03/01English29
Novel biometric digital signatures for Internet‐based applications2001/12/01English28
A test of interventions for security threats from social engineering2008/11/21English27
An exploratory study of the critical factors affecting the acceptability of e‐learning in Nigerian universities2006/10/01English27
A cross‐cultural investigation of situational information security awareness programs2008/10/10English26
BI and ERP integration2005/12/01English26
A conceptual framework for information technology governance effectiveness in private organizations2012/06/01English26
Internet marketing practices1996/12/01English26
Internet‐based EDI trust and security1998/03/01English24
Trust in Web‐based electronic commerce security1998/10/01English24
The use of business process modelling in information systems security analysis and design2000/08/01English24
A Security Framework for Information Systems Outsourcing1994/10/01English24
A cyclic approach to business continuity planning2004/09/01English24
Death by a thousand facts2012/03/16English24
Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system2005/07/01English23