Works matching DE "CORPORATE security measures"
Results: 21
Corporate risk from extremist groups.
- Published in:
- Journal of Business Continuity & Emergency Planning, 2018, v. 12, n. 1, p. 17, doi. 10.69554/lacz7489
- By:
- Publication type:
- Article
Keeping Data Under Lock & Key.
- Published in:
- Financial Executive, 2004, v. 20, n. 5, p. 20
- By:
- Publication type:
- Article
Making Sensible Investments in Security.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 46
- By:
- Publication type:
- Article
Are Companies Unwittingly Supporting Terrorism?
- Published in:
- Financial Executive, 2003, v. 19, n. 5, p. 11
- Publication type:
- Article
Education in IT Security: A Case Study in Banking Industry.
- Published in:
- GSTF Journal on Computing, 2013, v. 3, n. 3, p. 21, doi. 10.7603/s40601-013-0019-8
- By:
- Publication type:
- Article
Using Automated Identity and Access Management Controls.
- Published in:
- CPA Journal, 2008, v. 78, n. 9, p. 66
- By:
- Publication type:
- Article
NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS.
- Published in:
- MIS Quarterly, 2010, v. 34, n. 3, p. 487, doi. 10.2307/25750688
- By:
- Publication type:
- Article
MARKET VALUE OF VOLUNTARY DISCLOSURES CONCERNING INFORMATION SECURITY.
- Published in:
- MIS Quarterly, 2010, v. 34, n. 3, p. 567, doi. 10.2307/25750692
- By:
- Publication type:
- Article
INTELLIGENCE ANALYSIS IN CORPORATE SECURITY.
- Published in:
- Megatrend Review / Megatrend Revija, 2014, v. 11, n. 4, p. 301, doi. 10.5937/MegRev1404301M
- By:
- Publication type:
- Article
WHAT YOUR BUSINESS SHOULD KNOW ABOUT INTERNET SECURITY.
- Published in:
- Strategic Finance, 2000, v. 82, n. 5, p. 50
- By:
- Publication type:
- Article
AVERTING A "CYBER PEARL HARBOR" WITHOUT SINKING CORPORATE AMERICA: THE RAMIFICATIONS OF CYBERSECURITY REGULATIONS ON THE PRIVATE SECTOR.
- Published in:
- Contract Management, 2013, v. 53, n. 4, p. 34
- By:
- Publication type:
- Article
Human-as-a-security-sensor for harvesting threat intelligence.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0040-0
- By:
- Publication type:
- Article
CYBERSECURITY AND THE BOARD.
- Published in:
- Internal Auditor, 2014, v. 71, n. 6, p. 21
- By:
- Publication type:
- Article
Update.
- Published in:
- Internal Auditor, 2014, v. 71, n. 6, p. 15
- Publication type:
- Article
The Company Oracle: Corporate Security and Diviner-Detectives in Angola's Diamond Mines.
- Published in:
- Comparative Studies in Society & History, 2017, v. 59, n. 3, p. 574, doi. 10.1017/S0010417517000172
- By:
- Publication type:
- Article
Corporate real estate finance -- structuring security and enforcement.
- Published in:
- Journal of Corporate Treasury Management, 2010, v. 4, n. 1, p. 46
- By:
- Publication type:
- Article
It's the Law.
- Published in:
- CDS Review, 2010, v. 103, n. 2, p. 23
- By:
- Publication type:
- Article
Surveillance: The "Digital Trail of Breadcrumbs".
- Published in:
- Culture Unbound: Journal of Current Cultural Research, 2010, v. 2, p. 9, doi. 10.3384/cu.2000.1525.10219
- By:
- Publication type:
- Article
RETURN ON INFORMATION SECURITY INVESTMENTS: Myths vs Realities.
- Published in:
- Strategic Finance, 2002, v. 84, n. 5, p. 26
- By:
- Publication type:
- Article
KURUMSAL BİLGİ GÜVENLİĞİNDE GÜVENLİK TESTLERİ VE ÖNERİLER.
- Published in:
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2011, v. 26, n. 1, p. 89
- By:
- Publication type:
- Article
Security design and firm dynamics under long-term moral hazard.
- Published in:
- Applied Stochastic Models in Business & Industry, 2016, v. 32, n. 6, p. 852, doi. 10.1002/asmb.2208
- By:
- Publication type:
- Article