Works matching DE "BUSINESS enterprise security"
1
- ISSA Journal, 2018, v. 16, n. 7, p. 8
- Article
2
- ISSA Journal, 2018, v. 16, n. 7, p. 7
- Article
3
- ISSA Journal, 2018, v. 16, n. 7, p. 6
- Article
4
- ISSA Journal, 2017, v. 15, n. 12, p. 10
- Article
5
- ISSA Journal, 2016, v. 14, n. 12, p. 37
- Article
6
- ISSA Journal, 2016, v. 14, n. 12, p. 22
- Article
7
- ISSA Journal, 2016, v. 14, n. 12, p. 14
- Article
8
- Journal Scientific & Applied Research, 2015, v. 7, p. 72, doi. 10.46687/jsar.v7i1.167
- Article
9
- Brookings Review, 2002, v. 20, n. 3, p. 20, doi. 10.2307/20081048
- Litan, Robert;
- Orszag, Peter
- Article
10
- Journal of Information Systems Technology & Planning, 2010, v. 3, n. 6, p. 1
- Dawson, Maurice;
- Burrell, Darrell Norman;
- Rahim, Emad;
- Brewster, Stephen
- Article
11
- Journal of Forensic Studies in Accounting & Business, 2011, v. 3, n. 1, p. 9
- Singleton, Tommie;
- Atkinson, Keith E.
- Article
12
- ITNOW, 2013, v. 55, n. 2, p. 30, doi. 10.1093/itnow/bwt013
- Article
13
- WIREs: Data Mining & Knowledge Discovery, 2017, v. 7, n. 5, p. n/a, doi. 10.1002/widm.1211
- Cheng, Long;
- Liu, Fang;
- Yao, Danfeng (Daphne)
- Article
14
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2015, n. 375, p. 9, doi. 10.15611/pn.2015.375.01
- Article
15
- International Journal on Information Technologies & Security, 2012, v. 4, n. 4, p. 85
- Article
16
- Journal of Physical Security, 2016, v. 9, n. 2, p. 10
- Article
17
- Journal of Business Continuity & Emergency Planning, 2018, v. 12, n. 1, p. 40, doi. 10.69554/mtbp4821
- Article
18
- ComputerWorld Hong Kong, 2016, p. 44
- Article
19
- ComputerWorld Hong Kong, 2016, p. 42
- Article
20
- ComputerWorld Hong Kong, 2016, p. 8
- Article
21
- ComputerWorld Hong Kong, 2015, p. 34
- Article
22
- Economic Computation & Economic Cybernetics Studies & Research, 2015, v. 49, n. 4, p. 323
- Liu-Rong ZHAO;
- Shu-E MEI;
- Wei-Jun ZHONG
- Article
23
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2012, n. 260, p. 442
- Article
27
- People & Strategy, 2016, v. 39, n. 1, p. 6
- Article
28
- People & Strategy, 2016, v. 39, n. 1, p. 4
- Article
29
- Trends & Issues in Crime & Criminal Justice, 2003, n. 244, p. 1
- Charlton, Kate;
- Taylor, Natalie
- Article
30
- Communications of the Association for Information Systems, 2007, v. 20, p. 958, doi. 10.17705/1CAIS.02057
- Article
31
- Communications of the Association for Information Systems, 2005, v. 16, p. 937, doi. 10.17705/1CAIS.01648
- Boukhonine, Serguei;
- Krotov, Vlad;
- Rupert, Barry
- Article
32
- Journal of Finance (Wiley-Blackwell), 2007, v. 62, n. 6, p. 2587, doi. 10.1111/j.1540-6261.2007.01287.x
- Article
33
- Journal of International Law & International Relations, 2011, v. 6, n. 2, p. 83
- MACKIEWICZ WOLFE, WOJTEK;
- LEUNG EVANS, ANNETTE S.
- Article
34
- Utah Law Review, 2008, v. 2008, n. 2, p. 563
- Mullady, Jr, Raymond G.;
- Hansen, Scott D.
- Article
35
- Advanced Management Journal (03621863), 1982, v. 47, n. 1, p. 4
- Article
36
- Journal of International Management Studies, 2015, v. 15, n. 1, p. 29, doi. 10.18374/jims-15-1.3
- Article
37
- Journal of Economics & Finance, 2008, v. 32, n. 3, p. 260, doi. 10.1007/s12197-007-9019-x
- Cudd, Mike;
- Eduardo, Marcelo;
- Roberts, Lloyd
- Article
38
- Environmental Quality Management, 2010, v. 20, n. 1, p. 101, doi. 10.1002/tqem.20273
- Article
39
- International Journal of Information Security, 2014, v. 13, n. 2, p. 97, doi. 10.1007/s10207-013-0205-x
- Gouglidis, Antonios;
- Mavridis, Ioannis;
- Hu, Vincent
- Article
40
- International Journal of Information Security, 2014, v. 13, n. 2, p. 199, doi. 10.1007/s10207-014-0230-4
- Nuñez, David;
- Agudo, Isaac
- Article
41
- Ekonomski Vjesnik, 2018, v. 31, n. 1, p. 217
- Article
42
- IEEE Internet Computing, 2003, v. 7, n. 4, p. 60, doi. 10.1109/MIC.2003.1215661
- Polk, William T.;
- Hastings, Nelson E.;
- Malpani, Ambarish
- Article
43
- Varstvoslovje: Journal of Criminal Justice & Security, 2012, v. 14, n. 3, p. 331
- Bernik, Igor;
- Prislan, Kaja
- Article
44
- Journal of Offender Monitoring, 2002, v. 15, n. 1, p. 12
- Article
45
- Electronic Commerce Research, 2008, v. 8, n. 3, p. 115, doi. 10.1007/s10660-008-9017-x
- Du, Rong;
- Foo, Ernest;
- Boyd, Colin
- Article
46
- Electronic Commerce Research, 2006, v. 6, n. 3/4, p. 305, doi. 10.1007/s10660-006-8677-7
- Herrmann, Peter;
- Herrmann, Gaby
- Article
47
- Electronic Commerce Research, 2006, v. 6, n. 3/4, p. 355, doi. 10.1007/s10660-006-8679-5
- Priggouris, Ioannis;
- Hadjiefthymiades, Stathes
- Article
48
- MIS Quarterly, 2017, v. 41, n. 3, p. 893
- Angst, Corey M.;
- Block, Emily S.;
- D'Arcy, John;
- Kelley, Ken
- Article
50
- Management Review, 1977, v. 66, n. 6, p. 2
- Article