Works matching DE "INFORMATION resources management security"
1
- Financial Executive, 2005, v. 21, n. 2, p. 10
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
2
- Quality - Access to Success, 2009, v. 10, n. 11, p. 53
- Militaru, Constantin;
- Costin, Daniel
- Article
3
- Internal Auditor, 2018, v. 75, n. 5, p. 72
- Article
4
- IUP Journal of Systems Management, 2011, v. 9, n. 2, p. 7
- Singh, Rajendra;
- Malpani, Ajay
- Article
5
- Nature, 2010, v. 468, n. 7320, p. 17, doi. 10.1038/468017a
- Article
6
- Enterprise Information Systems, 2015, v. 9, n. 4, p. 384, doi. 10.1080/17517575.2013.792397
- Curiac, Daniel-Ioan;
- Pachia, Mihai
- Article
7
- Information Systems Research, 1990, v. 1, n. 3, p. 255, doi. 10.1287/isre.1.3.255
- Article
8
- Information Resources Management Journal, 2017, v. 30, n. 3, p. 58, doi. 10.4018/IRMJ.2017070104
- Duy Dang-Pham;
- Nkhoma, Mathews
- Article
9
- Requirements Engineering, 2011, v. 16, n. 1, p. 3, doi. 10.1007/s00766-010-0115-7
- Deng, Mina;
- Wuyts, Kim;
- Scandariato, Riccardo;
- Preneel, Bart;
- Joosen, Wouter
- Article
10
- MIS Quarterly, 2010, v. 34, n. 4, p. 767
- Puhakainen, Petri;
- Siponen, Mikko
- Article
11
- Communications of the Association for Information Systems, 2007, v. 20, p. 958, doi. 10.17705/1CAIS.02057
- Article
12
- Journal of Management Information Systems, 2009, v. 26, n. 3, p. 241, doi. 10.2753/MIS0742-1222260308
- Cremonini, Marco;
- Nizovtsev, Dmitri
- Article
13
- Journal of Management Information Systems, 2008, v. 25, n. 2, p. 241, doi. 10.2753/MIS0742-1222250210
- Kumar, Ram L.;
- Park, Sungjune;
- Subramaniam, Chandrasekar
- Article
14
- Journal of Finance (Wiley-Blackwell), 2007, v. 62, n. 6, p. 2587, doi. 10.1111/j.1540-6261.2007.01287.x
- Article
15
- Informatica Economica, 2009, v. 13, n. 1, p. 127
- Article
16
- Informatica Economica, 2009, v. 13, n. 1, p. 38
- Article
17
- Journal of Network & Systems Management, 2004, v. 12, n. 1, p. 137, doi. 10.1023/B:JONS.0000015702.05980.d2
- Article
18
- Journal of Financial Planning, 2009, p. 24
- Article
19
- Management Science, 1995, v. 41, n. 9, p. 1549, doi. 10.1287/mnsc.41.9.1549
- Muralidhar, Krishnamurty;
- Batra, Dinesh
- Article
20
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7142170
- Jaïdi, Faouzi;
- Labbene Ayachi, Faten;
- Bouhoula, Adel
- Article
21
- 2014
- Wu, Yulei;
- Wang, Guojun;
- Al-Dubai, Ahmed
- Editorial
22
- Journal of Information System Security, 2010, v. 6, n. 1, p. 36
- Tsohou, Aggeliki;
- Karyda, Maria;
- Kokolakis, Spyros;
- Kiountouzis, Evangelos
- Article
23
- IT Professional, 2011, v. 13, n. 1, p. 9, doi. 10.1109/MITP.2011.11
- Radack, Shirley;
- Kuhn, Rick
- Article
24
- IT Professional, 2009, v. 11, n. 3, p. 22, doi. 10.1109/MITP.2009.48
- Liu, Simon;
- Ormaner, Jerry
- Article
25
- European Science Review, 2018, n. 5/6, p. 86
- Utamuratovich, Khalmuratov Omonboy
- Article
26
- Journal of Medical Internet Research, 2011, v. 13, n. 4, p. 5, doi. 10.2196/jmir.1781
- Kim, Jeongeun;
- Bates, David W.
- Article
27
- CPA Journal, 2007, v. 77, n. 5, p. 34
- Beard, Deborah;
- Wen, H. Joseph
- Article
28
- LESIJ - Lex ET Scientia International Journal, 2010, v. 17, n. 2, p. 281
- Păun, Cristian Teodor;
- Simion, Emil
- Article
29
- LESIJ - Lex ET Scientia International Journal, 2010, v. 17, n. 2, p. 270
- Article
30
- Journal of Information Systems, 2014, v. 28, n. 1, p. 227, doi. 10.2308/isys-50696
- Raschke, Robyn L.;
- Krishen, Anjala S.;
- Kachroo, Pushkin
- Article
31
- International Journal of Information Security, 2008, v. 7, n. 6, p. 421, doi. 10.1007/s10207-008-0058-x
- Bryans, Jeremy;
- Koutny, Maciej;
- Mazaré, Laurent;
- Ryan, Peter
- Article
32
- Information World / Bilgi Dünyası, 2011, v. 12, n. 1, p. 105, doi. 10.15612/bd.2011.224
- AYDIN, Cengiz;
- ÖZDEMİRCİ, Fahrettin
- Article
33
- Information Systems Research, 2009, v. 20, n. 2, p. 198, doi. 10.1287/isre.1080.0180
- Cavusoglu, Huseyin;
- Raghunathan, Srinivasan;
- Cavusoglu, Hasan
- Article
34
- Information Systems Research, 2009, v. 20, n. 1, p. 79, doi. 10.1287/isre.1070.0160
- D’Arcy, John;
- Hovav, Anat;
- Galletta, Dennis
- Article
35
- Revista de Ingeniería, 2010, n. 31, p. 109, doi. 10.16924/riua.v0i31.217
- Gómez, Ricardo;
- Pérez, Diego Hernán;
- Donoso, Yezid;
- Herrera, Andrea
- Article
36
- Management Science, 2014, v. 60, n. 3, p. 638, doi. 10.1287/mnsc.2013.1763
- Cezar, Asunur;
- Cavusoglu, Huseyin;
- Raghunathan, Srinivasan
- Article
37
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2013, v. 3, n. 2, p. 163
- Narimanova, Olena V.;
- Trifonova, Ekaterina A.
- Article
38
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2013, v. 3, n. 1, p. 69
- Khoroshko, Vladimir O.;
- Khokhlachova, Yulia E.
- Article
39
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2013, v. 3, n. 1, p. 61
- Kozlovsky, Valery V.;
- Lysenko, Roman M.
- Article
40
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2013, v. 3, n. 1, p. 50
- Article
41
- Journal of Health Care Compliance, 2010, v. 12, n. 4, p. 55
- Article
42
- Journal of Financial Service Professionals, 2012, v. 66, n. 6, p. 36
- Weber, Richard M.;
- Horn, Brian D.
- Article