Works matching DE "BUSINESS enterprise security"
1
- ISSA Journal, 2018, v. 16, n. 7, p. 8
- Article
2
- ISSA Journal, 2018, v. 16, n. 7, p. 7
- Article
3
- ISSA Journal, 2018, v. 16, n. 7, p. 6
- Article
4
- ISSA Journal, 2017, v. 15, n. 12, p. 10
- Article
5
- ISSA Journal, 2016, v. 14, n. 12, p. 37
- Article
6
- ISSA Journal, 2016, v. 14, n. 12, p. 22
- Article
7
- ISSA Journal, 2016, v. 14, n. 12, p. 14
- Article
8
- Financial Executive, 2003, v. 19, n. 7, p. 50
- Article
9
- Quality - Access to Success, 2009, v. 10, n. 11, p. 53
- Militaru, Constantin;
- Costin, Daniel
- Article
10
- Economic Computation & Economic Cybernetics Studies & Research, 2015, v. 49, n. 4, p. 323
- Liu-Rong ZHAO;
- Shu-E MEI;
- Wei-Jun ZHONG
- Article
12
- Trends & Issues in Crime & Criminal Justice, 2003, n. 244, p. 1
- Charlton, Kate;
- Taylor, Natalie
- Article
13
- Public Relations Quarterly, 2002, v. 47, n. 2, p. 40
- Article
14
- IEEM Revista de Negocios, 2015, p. 24
- Article
15
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2015, n. 375, p. 9, doi. 10.15611/pn.2015.375.01
- Article
16
- Research Papers of the Wroclaw University of Economics / Prace Naukowe Uniwersytetu Ekonomicznego we Wroclawiu, 2012, n. 260, p. 442
- Article
17
- Journal of International Management Studies, 2015, v. 15, n. 1, p. 29, doi. 10.18374/jims-15-1.3
- Article
18
- Journal of Information Systems Technology & Planning, 2010, v. 3, n. 6, p. 1
- Dawson, Maurice;
- Burrell, Darrell Norman;
- Rahim, Emad;
- Brewster, Stephen
- Article
19
- IT: Information Technology, 2013, v. 55, n. 6, p. 239, doi. 10.1524/itit.2013.2004
- Article
20
- IT: Information Technology, 2013, v. 55, n. 6, p. 225, doi. 10.1524/itit.2013.2002
- Matulevičius, Raimundas;
- Ahmed, Naved
- Article
21
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 31, doi. 10.1002/jcaf.22037
- Ciesielski, Jack T.;
- Weirich, Thomas R.
- Article
22
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 1, doi. 10.1002/jcaf.22028
- Article
23
- Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 3, p. 7, doi. 10.1002/jcaf.22029
- Article
24
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 13, doi. 10.1002/jcaf.20701
- Wright Jr., Harry R.;
- Mooney, J. Lowell;
- Parham, Abbie Gail
- Article
25
- Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 3, doi. 10.1002/jcaf.20700
- Article
26
- Journal of Applied Business & Economics, 2014, v. 16, n. 6, p. 69
- Nykodym, Nick;
- Patrick, Brian Anse;
- Ariss, Sonny
- Article
29
- People & Strategy, 2016, v. 39, n. 1, p. 6
- Article
30
- People & Strategy, 2016, v. 39, n. 1, p. 4
- Article
32
- Journal of Business Continuity & Emergency Planning, 2018, v. 12, n. 1, p. 40, doi. 10.69554/mtbp4821
- Article
33
- MIS Quarterly, 2017, v. 41, n. 3, p. 893
- Angst, Corey M.;
- Block, Emily S.;
- D'Arcy, John;
- Kelley, Ken
- Article
34
- Communications of the Association for Information Systems, 2007, v. 20, p. 958, doi. 10.17705/1CAIS.02057
- Article
35
- Communications of the Association for Information Systems, 2005, v. 16, p. 937, doi. 10.17705/1CAIS.01648
- Boukhonine, Serguei;
- Krotov, Vlad;
- Rupert, Barry
- Article
36
- Journal of Finance (Wiley-Blackwell), 2007, v. 62, n. 6, p. 2587, doi. 10.1111/j.1540-6261.2007.01287.x
- Article
37
- Brookings Review, 2002, v. 20, n. 3, p. 20, doi. 10.2307/20081048
- Litan, Robert;
- Orszag, Peter
- Article
38
- WIREs: Data Mining & Knowledge Discovery, 2017, v. 7, n. 5, p. n/a, doi. 10.1002/widm.1211
- Cheng, Long;
- Liu, Fang;
- Yao, Danfeng (Daphne)
- Article
39
- Journal of International Law & International Relations, 2011, v. 6, n. 2, p. 83
- MACKIEWICZ WOLFE, WOJTEK;
- LEUNG EVANS, ANNETTE S.
- Article
40
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 1, p. 47, doi. 10.1080/19393555.2011.629341
- Article
41
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 4, p. 213, doi. 10.1080/19393551003762223
- Vijayaraghavan, V.;
- Paul, Sanjoy;
- Rajarathnam, N.
- Article
42
- Environmental Quality Management, 2010, v. 20, n. 1, p. 101, doi. 10.1002/tqem.20273
- Article
43
- Advanced Management Journal (03621863), 1982, v. 47, n. 1, p. 4
- Article
44
- Electronic Commerce Research, 2008, v. 8, n. 3, p. 115, doi. 10.1007/s10660-008-9017-x
- Du, Rong;
- Foo, Ernest;
- Boyd, Colin
- Article
45
- Electronic Commerce Research, 2006, v. 6, n. 3/4, p. 305, doi. 10.1007/s10660-006-8677-7
- Herrmann, Peter;
- Herrmann, Gaby
- Article
46
- Electronic Commerce Research, 2006, v. 6, n. 3/4, p. 355, doi. 10.1007/s10660-006-8679-5
- Priggouris, Ioannis;
- Hadjiefthymiades, Stathes
- Article
47
- Africa Research Bulletin: Economic, Financial & Technical Series, 2005, v. 42, n. 5, p. 16565
- Article
48
- Journal of Strategic Security, 2017, v. 10, n. 1, p. 1, doi. 10.5038/1944-0472.10.1.1528
- Reid, Iain D.;
- Gozna, Lynsey F.;
- Boon, Julian C. W.
- Article
49
- Varstvoslovje: Journal of Criminal Justice & Security, 2012, v. 14, n. 3, p. 331
- Bernik, Igor;
- Prislan, Kaja
- Article
50
- Technology Innovation Management Review, 2013, p. 65, doi. 10.22215/timreview718
- Rajala, Arto;
- Westerlund, Mika;
- Murtonen, Mervi;
- Starck, Kim
- Article