The effect of organizational and individual characteristics on corporate intranet utilizations | 2008/06/06 | English | 13 |
Information security and business continuity management in interorganizational IT relationships | 2012/11/23 | English | 13 |
Identifying linkages between statements in information security policy, procedures and controls | 2012/10/05 | English | 12 |
The role of service level agreements in IT service delivery | 1998/08/01 | English | 12 |
SIEM‐based framework for security controls automation | 2012/10/05 | English | 12 |
A personalized rhythm click‐based authentication system | 2010/06/08 | English | 12 |
E‐commerce policies and customer privacy | 2003/03/01 | English | 12 |
Implications of ICT for knowledge management in globalization | 2003/10/01 | English | 12 |
The impact of IT on SMEs in the United States | 2004/09/01 | English | 12 |
A framework for outsourcing IS/IT security services | 2006/10/01 | English | 12 |
Effects on employees' information security abilities by e‐learning | 2009/11/20 | English | 12 |
Corporate system security: towards an integrated management approach | 1999/12/01 | English | 12 |
Information Technology and Innovation | 1994/05/01 | English | 12 |
Investigating corporate intranet effectiveness: a conceptual framework | 2007/06/12 | English | 12 |
Information privacy | 1995/03/01 | English | 12 |
A modular approach to ERP system selection | 2006/10/01 | English | 12 |
What ERP systems can tell us about Sarbanes‐Oxley | 2005/09/01 | English | 12 |
A security standards' framework to facilitate best practices' awareness and conformity | 2010/11/23 | English | 12 |
The long‐term effects of information security e‐learning on organizational learning | 2011/07/19 | English | 12 |
A framework for preventing money laundering in banks | 2012/07/13 | English | 12 |
Managed IT services: the role of IT standards | 2008/10/10 | English | 11 |
An empirical study of ERP success evaluations by business and IT managers | 2007/08/21 | English | 11 |
Exploring the importance and implementation of COBIT processes in Saudi organizations | 2009/06/05 | English | 11 |
Knowledge management for Chinese medicines: a conceptual model | 2005/07/01 | English | 11 |
Addressing dynamic issues in information security management | 2011/03/22 | English | 11 |
Health service employees and information security policies: an uneasy partnership? | 2012/10/05 | English | 11 |
How well are corporate ethics codes and policies applied in the trenches? | 2004/04/01 | English | 11 |
The Second Annual Global Information Security Survey | 1999/08/01 | English | 11 |
Information security baselines | 1995/05/01 | English | 11 |
The golden rules for implementing the balanced business scorecard | 1997/12/01 | English | 11 |