Works matching DE "BUSINESS enterprise security"
Results: 78
The Failure of Compliance.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 8
- By:
- Publication type:
- Article
Infosec Standards.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 7
- By:
- Publication type:
- Article
Fine, I'll Comply.
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 6
- By:
- Publication type:
- Article
News That You Can Use...
- Published in:
- ISSA Journal, 2017, v. 15, n. 12, p. 10
- Publication type:
- Article
Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 37
- By:
- Publication type:
- Article
Secure Network Design: Micro Segmentation.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 22
- By:
- Publication type:
- Article
Enterprise Security Architecure: Key for Aligning Security Goals with Business Goals.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 14
- By:
- Publication type:
- Article
The role of unarmed security in active killer defence.
- Published in:
- Journal of Business Continuity & Emergency Planning, 2018, v. 12, n. 1, p. 40, doi. 10.69554/mtbp4821
- By:
- Publication type:
- Article
Promises and Perils of Internet based Networking.
- Published in:
- Journal of Global Information Technology Management, 2010, v. 13, n. 3, p. 1, doi. 10.1080/1097198X.2010.10856517
- By:
- Publication type:
- Article
Strategies for Sharing and Protecting Sensitive Information.
- Published in:
- Financial Executive, 2003, v. 19, n. 7, p. 50
- By:
- Publication type:
- Article
A Conversation with Paul Fricano.
- Published in:
- 2016
- Publication type:
- Interview
The Cause Is Also the Cure.
- Published in:
- 2016
- By:
- Publication type:
- Opinion
The Human Factor in Enterprise Security.
- Published in:
- 2016
- By:
- Publication type:
- Opinion
Ensuring the Secure Enterprise.
- Published in:
- People & Strategy, 2016, v. 39, n. 1, p. 6
- By:
- Publication type:
- Article
The People + Strategy Vision.
- Published in:
- People & Strategy, 2016, v. 39, n. 1, p. 4
- By:
- Publication type:
- Article
Short-cuts in issuance decisions and subsequent small firm performance.
- Published in:
- Journal of Economics & Finance, 2008, v. 32, n. 3, p. 260, doi. 10.1007/s12197-007-9019-x
- By:
- Publication type:
- Article
The Second Immutable Law of Security Administration.
- Published in:
- IT Professional, 2009, v. 11, n. 6, p. 4, doi. 10.1109/MITP.2009.134
- By:
- Publication type:
- Article
Insider Threat: Prevention, Detection, Mitigation, and Deterrence.
- Published in:
- 2017
- By:
- Publication type:
- Book Review
Dealing with Cybersmear: How to Protect Your Organization from Online Defamation.
- Published in:
- Public Relations Quarterly, 2002, v. 47, n. 2, p. 40
- By:
- Publication type:
- Article
WHEN DO IT SECURITY INVESTMENTS MATTER? ACCOUNTING FOR THE INFLUENCE OF INSTITUTIONAL FACTORS IN THE CONTEXT OF HEALTHCARE DATA BREACHES.
- Published in:
- MIS Quarterly, 2017, v. 41, n. 3, p. 893
- By:
- Publication type:
- Article
HOW TO PROTECT YOUR BUSINESS (Book Review).
- Published in:
- 1985
- Publication type:
- Book Review
Let's get the facts!
- Published in:
- Management Review, 1977, v. 66, n. 6, p. 2
- By:
- Publication type:
- Article
Twenty Steps to Preventing Theft in Business.
- Published in:
- Management Review, 1972, v. 61, n. 3, p. 10
- By:
- Publication type:
- Article
AN ECONOMIC ANALYSIS OF THE INTERACTION BETWEEN FIREWALL, IDS AND VULNERABILITY SCAN.
- Published in:
- Economic Computation & Economic Cybernetics Studies & Research, 2015, v. 49, n. 4, p. 323
- By:
- Publication type:
- Article
Revenue Recognition: How It Will Impact Three Key Sectors.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 31, doi. 10.1002/jcaf.22037
- By:
- Publication type:
- Article
A Method for Aligning Cash Flow and Contribution Margins More Effectively.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 1, doi. 10.1002/jcaf.22028
- By:
- Publication type:
- Article
Minimizing the Cost of Malware.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 7, doi. 10.1002/jcaf.22029
- By:
- Publication type:
- Article
Your firm's mobile devices: How secure are they?
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 13, doi. 10.1002/jcaf.20701
- By:
- Publication type:
- Article
Mega-disasters: Is your IT battle-ready.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 3, doi. 10.1002/jcaf.20700
- By:
- Publication type:
- Article
From Tactical to Strategic Deception Detection: Application of Psychological Synthesis.
- Published in:
- Journal of Strategic Security, 2017, v. 10, n. 1, p. 1, doi. 10.5038/1944-0472.10.1.1528
- By:
- Publication type:
- Article
Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 225, doi. 10.1524/itit.2013.2002
- By:
- Publication type:
- Article
Integrating Security Aspects into Business Process Models.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 239, doi. 10.1524/itit.2013.2004
- By:
- Publication type:
- Article
Servitization in a Security Business: Changing the Logic of Value Creation.
- Published in:
- Technology Innovation Management Review, 2013, p. 65, doi. 10.22215/timreview718
- By:
- Publication type:
- Article
A MODERN SURVEY ON PROBLEMS OF BUSINESS ORGANIZATION'S SECURITY.
- Published in:
- Journal Scientific & Applied Research, 2015, v. 7, p. 72, doi. 10.46687/jsar.v7i1.167
- By:
- Publication type:
- Article
Public Key Infrastructures that Satisfy Security Goals.
- Published in:
- IEEE Internet Computing, 2003, v. 7, n. 4, p. 60, doi. 10.1109/MIC.2003.1215661
- By:
- Publication type:
- Article
Vpliv informacijskega bojevanja na slovenske organizacije.
- Published in:
- Varstvoslovje: Journal of Criminal Justice & Security, 2012, v. 14, n. 3, p. 331
- By:
- Publication type:
- Article
The other side of competitive vigilance.
- Published in:
- Advanced Management Journal (03621863), 1982, v. 47, n. 1, p. 4
- By:
- Publication type:
- Article
TRADE PERSPECTIVES IN THE CONTEXT OF SAFETY, SECURITY, PRIVACY AND LOYALTY.
- Published in:
- Ekonomski Vjesnik, 2018, v. 31, n. 1, p. 217
- By:
- Publication type:
- Article
Enterprise data breach: causes, challenges, prevention, and future directions.
- Published in:
- WIREs: Data Mining & Knowledge Discovery, 2017, v. 7, n. 5, p. n/a, doi. 10.1002/widm.1211
- By:
- Publication type:
- Article
Enterprise security pattern: a new type of security pattern.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1670, doi. 10.1002/sec.863
- By:
- Publication type:
- Article
China's Energy Investments and the Corporate Social Responsibility Imperative.
- Published in:
- Journal of International Law & International Relations, 2011, v. 6, n. 2, p. 83
- By:
- Publication type:
- Article
Politica de Securitate a Informaţiilor în viziunea standardului ISO/IEC 27001:2005.
- Published in:
- Quality - Access to Success, 2009, v. 10, n. 11, p. 53
- By:
- Publication type:
- Article
A Complicated Intersection.
- Published in:
- Brookings Review, 2002, v. 20, n. 3, p. 20, doi. 10.2307/20081048
- By:
- Publication type:
- Article
IDENTITY THEFT LITIGATION: A ROADMAP FOR DEFENSE AND PROTECTION.
- Published in:
- Utah Law Review, 2008, v. 2008, n. 2, p. 563
- By:
- Publication type:
- Article
Implementing Business Watch: Problems and Solutions.
- Published in:
- Trends & Issues in Crime & Criminal Justice, 2003, n. 244, p. 1
- By:
- Publication type:
- Article
EL GASTO EN SEGURIDAD DE LAS EMPRESAS: PERCEPCIONES Y REALIDADES.
- Published in:
- IEEM Revista de Negocios, 2015, p. 24
- By:
- Publication type:
- Article
A METHOD OF ESTIMATION OF RESOURCE COMPONENT OF THE ECONOMIC SECURITY SYSTEM.
- Published in:
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2015, n. 375, p. 9, doi. 10.15611/pn.2015.375.01
- By:
- Publication type:
- Article
KONCEPCJA KWANTYFIKACJI BEZPIECZEņSTWA STRATEGICZNEGO PRZEDSIEBIORSTWA.
- Published in:
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2012, n. 260, p. 442
- By:
- Publication type:
- Article
Security policy verification for multi-domains in cloud systems.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 2, p. 97, doi. 10.1007/s10207-013-0205-x
- By:
- Publication type:
- Article
BlindIdM: A privacy-preserving approach for identity management as a service.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 2, p. 199, doi. 10.1007/s10207-014-0230-4
- By:
- Publication type:
- Article