Works matching DE "BUSINESS enterprise security"
Results: 78
KONCEPCJA KWANTYFIKACJI BEZPIECZEņSTWA STRATEGICZNEGO PRZEDSIEBIORSTWA.
- Published in:
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2012, n. 260, p. 442
- By:
- Publication type:
- Article
EXPLORING FACTORS INFLUENCING ADOPTION OF SOCIAL NETWORKING.
- Published in:
- Journal of International Management Studies, 2015, v. 15, n. 1, p. 29, doi. 10.18374/jims-15-1.3
- By:
- Publication type:
- Article
A Complicated Intersection.
- Published in:
- Brookings Review, 2002, v. 20, n. 3, p. 20, doi. 10.2307/20081048
- By:
- Publication type:
- Article
HK firms look for end-to-end outsourced security services.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 44
- By:
- Publication type:
- Article
SIEM--an organization nerve center.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 42
- By:
- Publication type:
- Article
Industry Panel unearths Shadow IT challenges, solutions.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 8
- Publication type:
- Article
People analytics to identify insider fraud.
- Published in:
- ComputerWorld Hong Kong, 2015, p. 34
- By:
- Publication type:
- Article
The study on a convergence security service for manufacturing industries.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1389, doi. 10.1007/s11235-011-9651-9
- By:
- Publication type:
- Article
AN EMPIRICAL ANALYSIS OF THE INDEPENDENT RELATIONSHIP OF THE USAGE OF ANTI-FRAUD CONTROLS AND THE LOSSES THEY REDUCE.
- Published in:
- Journal of Forensic Studies in Accounting & Business, 2011, v. 3, n. 1, p. 9
- By:
- Publication type:
- Article
Politica de Securitate a Informaţiilor în viziunea standardului ISO/IEC 27001:2005.
- Published in:
- Quality - Access to Success, 2009, v. 10, n. 11, p. 53
- By:
- Publication type:
- Article
Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®.
- Published in:
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 1, p. 47, doi. 10.1080/19393555.2011.629341
- By:
- Publication type:
- Article
iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts.
- Published in:
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 4, p. 213, doi. 10.1080/19393551003762223
- By:
- Publication type:
- Article
HOW TO PROTECT YOUR BUSINESS (Book Review).
- Published in:
- 1985
- Publication type:
- Book Review
Security policy verification for multi-domains in cloud systems.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 2, p. 97, doi. 10.1007/s10207-013-0205-x
- By:
- Publication type:
- Article
BlindIdM: A privacy-preserving approach for identity management as a service.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 2, p. 199, doi. 10.1007/s10207-014-0230-4
- By:
- Publication type:
- Article
China's Energy Investments and the Corporate Social Responsibility Imperative.
- Published in:
- Journal of International Law & International Relations, 2011, v. 6, n. 2, p. 83
- By:
- Publication type:
- Article
Public Key Infrastructures that Satisfy Security Goals.
- Published in:
- IEEE Internet Computing, 2003, v. 7, n. 4, p. 60, doi. 10.1109/MIC.2003.1215661
- By:
- Publication type:
- Article
The other side of competitive vigilance.
- Published in:
- Advanced Management Journal (03621863), 1982, v. 47, n. 1, p. 4
- By:
- Publication type:
- Article
Strategies for Sharing and Protecting Sensitive Information.
- Published in:
- Financial Executive, 2003, v. 19, n. 7, p. 50
- By:
- Publication type:
- Article
Is HR Helping or Hurting Your Security?
- Published in:
- Journal of Physical Security, 2016, v. 9, n. 2, p. 10
- By:
- Publication type:
- Article
Insider Threat: Prevention, Detection, Mitigation, and Deterrence.
- Published in:
- 2017
- By:
- Publication type:
- Book Review
A METHOD OF ESTIMATION OF RESOURCE COMPONENT OF THE ECONOMIC SECURITY SYSTEM.
- Published in:
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2015, n. 375, p. 9, doi. 10.15611/pn.2015.375.01
- By:
- Publication type:
- Article
Dealing with Cybersmear: How to Protect Your Organization from Online Defamation.
- Published in:
- Public Relations Quarterly, 2002, v. 47, n. 2, p. 40
- By:
- Publication type:
- Article
WHEN DO IT SECURITY INVESTMENTS MATTER? ACCOUNTING FOR THE INFLUENCE OF INSTITUTIONAL FACTORS IN THE CONTEXT OF HEALTHCARE DATA BREACHES.
- Published in:
- MIS Quarterly, 2017, v. 41, n. 3, p. 893
- By:
- Publication type:
- Article
MANAGEMENT OF INFORMATION SECURITY: CHALLENGES AND RESEARCH DIRECTIONS.
- Published in:
- Communications of the Association for Information Systems, 2007, v. 20, p. 958, doi. 10.17705/1CAIS.02057
- Publication type:
- Article
Future Security Approaches and Biometrics.
- Published in:
- Communications of the Association for Information Systems, 2005, v. 16, p. 937, doi. 10.17705/1CAIS.01648
- By:
- Publication type:
- Article
EL GASTO EN SEGURIDAD DE LAS EMPRESAS: PERCEPCIONES Y REALIDADES.
- Published in:
- IEEM Revista de Negocios, 2015, p. 24
- By:
- Publication type:
- Article
Servitization in a Security Business: Changing the Logic of Value Creation.
- Published in:
- Technology Innovation Management Review, 2013, p. 65, doi. 10.22215/timreview718
- By:
- Publication type:
- Article
THE ROLE AND IMPORTANCE OF REPORTING DURING THE SECURITY ASSESSMENT OF EMPLOYEES OF INSTITUTIONS OF BOSNIA AND HERZEGOVINA.
- Published in:
- International Journal on Information Technologies & Security, 2012, v. 4, n. 4, p. 85
- By:
- Publication type:
- Article
Enterprise data breach: causes, challenges, prevention, and future directions.
- Published in:
- WIREs: Data Mining & Knowledge Discovery, 2017, v. 7, n. 5, p. n/a, doi. 10.1002/widm.1211
- By:
- Publication type:
- Article
EXAMINING THE ROLE OF THE CHIEF INFORMATION SECURITY OFFICER (CISO) & SECURITY PLAN.
- Published in:
- Journal of Information Systems Technology & Planning, 2010, v. 3, n. 6, p. 1
- By:
- Publication type:
- Article
Company Profiles.
- Published in:
- Journal of Offender Monitoring, 2002, v. 15, n. 1, p. 12
- Publication type:
- Article
Comment.
- Published in:
- Technometrics, 2010, v. 52, n. 3, p. 283, doi. 10.1198/TECH.2010.09174
- By:
- Publication type:
- Article
Let's get the facts!
- Published in:
- Management Review, 1977, v. 66, n. 6, p. 2
- By:
- Publication type:
- Article
Twenty Steps to Preventing Theft in Business.
- Published in:
- Management Review, 1972, v. 61, n. 3, p. 10
- By:
- Publication type:
- Article
The Failure of Compliance.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 8
- By:
- Publication type:
- Article
Infosec Standards.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 7
- By:
- Publication type:
- Article
Fine, I'll Comply.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 6
- By:
- Publication type:
- Article
News That You Can Use...
- Published in:
- ISSA Journal, 2017, v. 15, n. 12, p. 10
- Publication type:
- Article
Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 37
- By:
- Publication type:
- Article
Secure Network Design: Micro Segmentation.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 22
- By:
- Publication type:
- Article
Enterprise Security Architecure: Key for Aligning Security Goals with Business Goals.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 14
- By:
- Publication type:
- Article
Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 225, doi. 10.1524/itit.2013.2002
- By:
- Publication type:
- Article
Integrating Security Aspects into Business Process Models.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 239, doi. 10.1524/itit.2013.2004
- By:
- Publication type:
- Article
A MODERN SURVEY ON PROBLEMS OF BUSINESS ORGANIZATION'S SECURITY.
- Published in:
- Journal Scientific & Applied Research, 2015, v. 7, p. 72, doi. 10.46687/jsar.v7i1.167
- By:
- Publication type:
- Article
TRADE PERSPECTIVES IN THE CONTEXT OF SAFETY, SECURITY, PRIVACY AND LOYALTY.
- Published in:
- Ekonomski Vjesnik, 2018, v. 31, n. 1, p. 217
- By:
- Publication type:
- Article
Revenue Recognition: How It Will Impact Three Key Sectors.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 31, doi. 10.1002/jcaf.22037
- By:
- Publication type:
- Article
A Method for Aligning Cash Flow and Contribution Margins More Effectively.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 1, doi. 10.1002/jcaf.22028
- By:
- Publication type:
- Article
Minimizing the Cost of Malware.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 7, doi. 10.1002/jcaf.22029
- By:
- Publication type:
- Article
Your firm's mobile devices: How secure are they?
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 13, doi. 10.1002/jcaf.20701
- By:
- Publication type:
- Article