Works matching DE "BUSINESS enterprise security"
1
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2012, n. 260, p. 442
- Article
2
- Journal of International Law & International Relations, 2011, v. 6, n. 2, p. 83
- MACKIEWICZ WOLFE, WOJTEK;
- LEUNG EVANS, ANNETTE S.
- Article
3
- IT Professional, 2014, v. 16, n. 5, p. 9, doi. 10.1109/MITP.2014.76
- Chang, J. Morris;
- Ho, Pao-Chung;
- Chang, Teng-Chang
- Article
4
- ComputerWorld Hong Kong, 2016, p. 44
- Article
5
- ComputerWorld Hong Kong, 2016, p. 42
- Article
6
- ComputerWorld Hong Kong, 2016, p. 8
- Article
7
- ComputerWorld Hong Kong, 2015, p. 34
- Article
8
- Technology Innovation Management Review, 2013, p. 65, doi. 10.22215/timreview718
- Rajala, Arto;
- Westerlund, Mika;
- Murtonen, Mervi;
- Starck, Kim
- Article
9
- Brookings Review, 2002, v. 20, n. 3, p. 20, doi. 10.2307/20081048
- Litan, Robert;
- Orszag, Peter
- Article
10
- Varstvoslovje: Journal of Criminal Justice & Security, 2012, v. 14, n. 3, p. 331
- Bernik, Igor;
- Prislan, Kaja
- Article
11
- Journal of Global Information Technology Management, 2010, v. 13, n. 3, p. 1, doi. 10.1080/1097198X.2010.10856517
- Jain Palvia, Shailendra C.;
- Pancaro, Rudy
- Article
12
- MIS Quarterly, 2017, v. 41, n. 3, p. 893
- Angst, Corey M.;
- Block, Emily S.;
- D'Arcy, John;
- Kelley, Ken
- Article
13
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1389, doi. 10.1007/s11235-011-9651-9
- Kang, Jonggu;
- Lee, Jaepil;
- Hwang, Chungtae;
- Chang, Hangbae
- Article
14
- WIREs: Data Mining & Knowledge Discovery, 2017, v. 7, n. 5, p. n/a, doi. 10.1002/widm.1211
- Cheng, Long;
- Liu, Fang;
- Yao, Danfeng (Daphne)
- Article
15
- Journal of Physical Security, 2016, v. 9, n. 2, p. 10
- Article
16
- IT: Information Technology, 2013, v. 55, n. 6, p. 225, doi. 10.1524/itit.2013.2002
- Matulevičius, Raimundas;
- Ahmed, Naved
- Article
17
- IT: Information Technology, 2013, v. 55, n. 6, p. 239, doi. 10.1524/itit.2013.2004
- Article
18
- Journal of Finance (Wiley-Blackwell), 2007, v. 62, n. 6, p. 2587, doi. 10.1111/j.1540-6261.2007.01287.x
- Article
19
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2015, n. 375, p. 9, doi. 10.15611/pn.2015.375.01
- Article
20
- International Journal on Information Technologies & Security, 2012, v. 4, n. 4, p. 85
- Article
21
- IEEE Internet Computing, 2003, v. 7, n. 4, p. 60, doi. 10.1109/MIC.2003.1215661
- Polk, William T.;
- Hastings, Nelson E.;
- Malpani, Ambarish
- Article
22
- Technometrics, 2010, v. 52, n. 3, p. 283, doi. 10.1198/TECH.2010.09174
- Article
23
- ISSA Journal, 2018, v. 16, n. 7, p. 8
- Article
24
- ISSA Journal, 2018, v. 16, n. 7, p. 7
- Article
25
- ISSA Journal, 2018, v. 16, n. 7, p. 6
- Article
26
- ISSA Journal, 2017, v. 15, n. 12, p. 10
- Article
27
- ISSA Journal, 2016, v. 14, n. 12, p. 37
- Article
28
- ISSA Journal, 2016, v. 14, n. 12, p. 22
- Article
29
- ISSA Journal, 2016, v. 14, n. 12, p. 14
- Article
30
- IEEM Revista de Negocios, 2015, p. 24
- Article
31
- Ekonomski Vjesnik, 2018, v. 31, n. 1, p. 217
- Article
32
- Journal of International Management Studies, 2015, v. 15, n. 1, p. 29, doi. 10.18374/jims-15-1.3
- Article
33
- Journal of Economics & Finance, 2008, v. 32, n. 3, p. 260, doi. 10.1007/s12197-007-9019-x
- Cudd, Mike;
- Eduardo, Marcelo;
- Roberts, Lloyd
- Article
34
- Journal of Business Continuity & Emergency Planning, 2018, v. 12, n. 1, p. 40, doi. 10.69554/mtbp4821
- Article
35
- International Journal of Micrographics & Optical Technology, 2009, v. 27, n. 1/2, p. 10
- Article
36
- Utah Law Review, 2008, v. 2008, n. 2, p. 563
- Mullady, Jr, Raymond G.;
- Hansen, Scott D.
- Article
37
- Journal Scientific & Applied Research, 2015, v. 7, p. 72, doi. 10.46687/jsar.v7i1.167
- Article
38
- Economic Computation & Economic Cybernetics Studies & Research, 2015, v. 49, n. 4, p. 323
- Liu-Rong ZHAO;
- Shu-E MEI;
- Wei-Jun ZHONG
- Article
39
- Africa Research Bulletin: Economic, Financial & Technical Series, 2005, v. 42, n. 5, p. 16565
- Article
40
- IT Professional, 2009, v. 11, n. 6, p. 4, doi. 10.1109/MITP.2009.134
- Article
41
- Advanced Management Journal (03621863), 1982, v. 47, n. 1, p. 4
- Article
42
- Electronic Commerce Research, 2006, v. 6, n. 3/4, p. 355, doi. 10.1007/s10660-006-8679-5
- Priggouris, Ioannis;
- Hadjiefthymiades, Stathes
- Article
43
- Electronic Commerce Research, 2006, v. 6, n. 3/4, p. 305, doi. 10.1007/s10660-006-8677-7
- Herrmann, Peter;
- Herrmann, Gaby
- Article
44
- Management Review, 1977, v. 66, n. 6, p. 2
- Article
45
- Management Review, 1972, v. 61, n. 3, p. 10
- Article
46
- International Journal of Information Security, 2014, v. 13, n. 2, p. 97, doi. 10.1007/s10207-013-0205-x
- Gouglidis, Antonios;
- Mavridis, Ioannis;
- Hu, Vincent
- Article
47
- International Journal of Information Security, 2014, v. 13, n. 2, p. 199, doi. 10.1007/s10207-014-0230-4
- Nuñez, David;
- Agudo, Isaac
- Article
48
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1670, doi. 10.1002/sec.863
- Moral-García, Santiago;
- Moral-Rubio, Santiago;
- Rosado, David G.;
- Fernández, Eduardo B.;
- Fernández-Medina, Eduardo
- Article
49
- Journal of Applied Business & Economics, 2014, v. 16, n. 6, p. 69
- Nykodym, Nick;
- Patrick, Brian Anse;
- Ariss, Sonny
- Article