Works matching DE "INFORMATION services security measures"
1
- Communications Law: Journal of Computer, Media & Telecommunications Law, 2016, v. 21, n. 1, p. 6
- Article
2
- Asian Journal of Innovation & Policy, 2015, v. 4, n. 3, p. 307, doi. 10.7545/ajip.2015.4.3.307
- Gyu-hee Hwang;
- In-Joong Ju;
- Ga-woon Ban;
- Kack-Hee Lee
- Article
3
- Financial Executive, 2003, v. 19, n. 9, p. 11
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
4
- International Journal of Pure & Applied Sciences & Technology, 2015, v. 29, n. 1, p. 1
- Dzarma, Daniel Ezra;
- Jibasen, Danjuma
- Article
5
- Anuario de Propiedad Intelectual, 2020, n. 2019, p. 315
- Article
6
- Internal Auditor, 2008, v. 65, n. 2, p. 71
- Article
7
- Internal Auditor, 1999, v. 56, n. 4, p. 14
- Article
8
- 2015
- Pao, Hsing-Kuo;
- Lee, Yuh‐Jye;
- Huang, Chun‐Ying
- Other
9
- Bulletin of the Atomic Scientists, 1955, v. 11, n. 4, p. 165, doi. 10.1080/00963402.1955.11453595
- Phelps, John B.;
- Brown Jr., Ralph S.;
- Goudsmit, S. A.
- Article
10
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 293, doi. 10.18372/2225-5036.20.7558
- Article
11
- Studies in Conflict & Terrorism, 2000, v. 23, n. 2, p. 129, doi. 10.1080/105761000265566
- Article
12
- Knowledge & Information Systems, 2015, v. 45, n. 3, p. 589, doi. 10.1007/s10115-014-0809-0
- Ashouri-Talouki, Maede;
- Baraani-Dastjerdi, Ahmad;
- Selçuk, Ali
- Article
13
- Communications of the Association for Information Systems, 2015, v. 36, p. 337
- Salisbury, W. David;
- Ferratt, Thomas W.;
- Wynn Jr., Donald
- Article
14
- Communications of the Association for Information Systems, 2011, v. 28, p. 329, doi. 10.17705/1CAIS.02822
- Fenz, Stefan;
- Ekelhart, Andreas;
- Neubauer, Thomas
- Article
15
- Communications of the Association for Information Systems, 2011, v. 28, p. 561, doi. 10.17705/1CAIS.02833
- Gillon, Kirstin;
- Branz, Louis;
- Culnan, Mary;
- Dhillon, Gurpreet;
- Hodgkinson, Robert;
- MacWillson, Alastair
- Article
16
- Health Informatics Journal, 2002, v. 8, n. 2, p. 95, doi. 10.1177/146045820200800207
- Article
17
- Military Engineer / Hadmérnök, 2018, v. 13, n. 2, p. 415
- Article
18
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 203, doi. 10.1080/19393550802178573
- Article
19
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 2, p. 80, doi. 10.1080/19393550801983783
- Singleton, TommieW.;
- Singleton, AaronJ.
- Article
20
- Strategic Finance, 2002, v. 84, n. 5, p. 26
- Gordon, Lawrence A.;
- Loeb, Martin P.
- Article
21
- Quality Progress, 2016, v. 49, n. 10, p. 13
- Article
22
- Scientific Bulletin of National Mining University, 2012, n. 5, p. 101
- Babenko, T. V.;
- Tretiak, O. M.;
- Kruchinin, O. V.;
- Tymofieiev, D. S.
- Article
23
- Automation & Remote Control, 2009, v. 70, n. 3, p. 491, doi. 10.1134/S000511790903014X
- Nesteruk, F.;
- Nesteruk, L.;
- Nesteruk, G.
- Article
24
- Automatika: Journal for Control, Measurement, Electronics, Computing & Communications, 2015, v. 56, n. 1, p. 69, doi. 10.7305/automatika.2015.04.587
- Solic, Kresimir;
- Ocevcic, Hrvoje;
- Blazevic, Damir
- Article
25
- Multimedia Tools & Applications, 2019, v. 78, n. 7, p. 8017, doi. 10.1007/s11042-018-6573-5
- Zhong, Shangping;
- Jia, Cunmin;
- Chen, Kaizhi;
- Dai, Peng
- Article
26
- Business Management / Biznes Upravlenie, 2017, n. 2, p. 38
- Article
27
- Journal of Information System Security, 2018, v. 14, n. 1, p. 3
- Åhlfeldt, Rose-Mharie;
- Nohlberg, Marcus;
- Söderström, Eva;
- Lennerholt, Christian;
- van Laere, Joeri
- Article
28
- Journal of Information System Security, 2010, v. 6, n. 1, p. 36
- Tsohou, Aggeliki;
- Karyda, Maria;
- Kokolakis, Spyros;
- Kiountouzis, Evangelos
- Article
29
- Journal of Information System Security, 2010, v. 6, n. 1, p. 20
- Aggelinos, George;
- Katsikas, Sokratis
- Article
30
- Journal of Information System Security, 2009, v. 5, n. 2, p. 26
- Luse, Andy;
- Scheibe, Kevin P.;
- Townsend, Anthony M.
- Article
31
- Journal of Information System Security, 2009, v. 5, n. 2, p. 42
- Goodall, John R.;
- Lutters, Wayne G.;
- Komlodi, Anita
- Article
32
- IT Professional, 2009, v. 11, n. 3, p. 60, doi. 10.1109/MITP.2009.60
- Miller, H. Gilbert;
- Murphy, Richard H.
- Article
33
- Agenda: Empowering Women for Gender Equity, 2006, n. 68, p. 131
- Article
34
- Journal of Positive Management, 2017, v. 8, n. 1, p. 78, doi. 10.12775/JPM.2017.006
- Article
35
- CPA Journal, 1997, v. 67, n. 11, p. 84
- Article
36
- Modern Physics Letters B, 2014, v. 28, n. 12, p. 1, doi. 10.1142/S0217984914500948
- Article
37
- ComputerWorld Hong Kong, 2016, p. 8
- Article
38
- British Journal of Healthcare Computing & Information Management, 2010, p. 6
- Article
39
- Journal of Digital Forensics, Security & Law, 2017, v. 12, n. 3, p. 77
- Kuznetsova, Olga Anatolyevna;
- Bondarenko, Natalia
- Article
40
- Journal of Decision Systems, 2018, v. 27, p. 173, doi. 10.1080/12460125.2018.1468177
- Almeida, Luís;
- Respício, Ana
- Article
41
- Trends in Information Management, 2010, v. 6, n. 1, p. 62
- Ahmed, M.;
- Sharif, L.;
- Issa-Salwe, A.;
- Alharby, A.
- Article
42
- Journal of Military & Strategic Studies, 2012, v. 14, n. 2, p. 1
- Article
43
- inFinance, 2012, v. 126, n. 3, p. 44
- Article
44
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 4, p. 342
- Article
45
- Information Systems Research, 2011, v. 22, n. 3, p. 606, doi. 10.1287/isre.1100.0341
- Mookerjee, Vijay;
- Mookerjee, Radha;
- Bensoussan, Alain
- Article
46
- Management Science, 2007, v. 53, n. 1, p. 101, doi. 10.1287/mnsc.1060.0603
- Menon, Syam;
- Sarkar, Sumit
- Article
47
- AARMS: Academic & Applied Research in Military & Public Management Science, 2017, v. 16, n. 1, p. 5
- KOVÁCS, Lászóo;
- NEMESLAKI, András;
- ORBÓK, Ákos;
- SZABÓ, András
- Article
48
- International Journal of Market Research, 2016, v. 58, n. 1, p. 19, doi. 10.2501/IJMR-2016-004
- Nunan, Daniel;
- Di Domenico, MariaLaura
- Article