Works matching DE "INFORMATION storage %26 retrieval systems -- Securities"
Results: 29
AT LONG LAST, MEET EDGAR!
- Published in:
- Financial Executive, 1993, v. 9, n. 1, p. 44
- By:
- Publication type:
- Article
Behind the scenes with EDGAR: it works!
- Published in:
- Financial Executive, 1988, v. 4, n. 2, p. 43
- By:
- Publication type:
- Article
An Overview of XBRL Compliance.
- Published in:
- CPA Journal, 2013, v. 83, n. 8, p. 67
- By:
- Publication type:
- Article
Approaching Zero A Study in Zero-Day Exploits Origins, Cases, and Trends.
- Published in:
- Norwich University Journal of Information Assurance (NUJIA), 2006, v. 2, n. 2, p. 1
- By:
- Publication type:
- Article
Empirical results of an experimental study on the role of password strength and cognitive load on empStephen Mujeyeloyee productivity.
- Published in:
- Online Journal of Applied Knowledge Management, 2016, v. 4, n. 1, p. 99, doi. 10.36965/ojakm.2016.4(1)99-116
- By:
- Publication type:
- Article
THE MODERATING EFFECT OF WORKING EXPERIENCE ON HEALTH INFORMATION SYSTEM SECURITY POLICIES COMPLIANCE BEHAVIOUR.
- Published in:
- Malaysian Journal of Computer Science, 2015, v. 28, n. 2, p. 70
- By:
- Publication type:
- Article
Differential Response of Small versus Large Investors to 10-K Filings on EDGAR.
- Published in:
- Accounting Review, 2004, v. 79, n. 3, p. 571, doi. 10.2308/accr.2004.79.3.571
- By:
- Publication type:
- Article
The Mask of ZoRRo: preventing information leakage from documents.
- Published in:
- Knowledge & Information Systems, 2015, v. 45, n. 3, p. 705, doi. 10.1007/s10115-014-0811-6
- By:
- Publication type:
- Article
Goodbye EDGAR, Hello IDEA.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2009, v. 20, n. 2, p. 119, doi. 10.1002/jcaf.20474
- By:
- Publication type:
- Article
What's the Future for EDGAR?
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 1999, v. 10, n. 4, p. 121, doi. 10.1002/(SICI)1097-0053(199922)10:4<121::AID-JCAF12>3.0.CO;2-2
- By:
- Publication type:
- Article
EDGAR: Has It Lived Up to Expectations?
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 1995, v. 6, n. 4, p. 109
- By:
- Publication type:
- Article
Joe Blogg's Hacking Supercomputer A discussion on how the inexpensive and pervasive availability of Cloud Computing to the Common Man is forcing the metamorphosis of Information Systems Security.
- Published in:
- iSChannel, 2012, v. 7, n. 1, p. 5
- By:
- Publication type:
- Article
How To Use EDGAR.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 1992, v. 4, n. 2, p. 153, doi. 10.1002/jcaf.3970040206
- By:
- Publication type:
- Article
EDGAR - The SEC's Solution to a Tidal Wave of Paper.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 1991, v. 3, n. 2, p. 197, doi. 10.1002/jcaf.3970030206
- By:
- Publication type:
- Article
The EDGAR Watch.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 1990, v. 2, n. 1, p. 87, doi. 10.1002/jcaf.3970020111
- By:
- Publication type:
- Article
EDGAR: Will It Be the End of the SEC's "Paper Chase"?
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 1989, v. 1, n. 1, p. 85, doi. 10.1002/jcaf.3970010111
- By:
- Publication type:
- Article
Special Issue on the Design and Engineering of Cryptographic Solutions for Secure Information Systems.
- Published in:
- 2014
- Publication type:
- Editorial
The Incremental Information Content of SEC 10-K Reports Filed under the EDGAR System.
- Published in:
- Journal of Accounting, Auditing & Finance, 2000, v. 15, n. 1, p. 25, doi. 10.1177/0148558X0001500102
- By:
- Publication type:
- Article
Who Uses Financial Statements? A Demographic Analysis of Financial Statement Downloads from EDGAR.
- Published in:
- Accounting Horizons, 2017, v. 31, n. 3, p. 55, doi. 10.2308/acch-51736
- By:
- Publication type:
- Article
Assurance on XBRL for Financial Reporting.
- Published in:
- Accounting Horizons, 2008, v. 22, n. 3, p. 353, doi. 10.2308/acch.2008.22.3.353
- By:
- Publication type:
- Article
Protecting the privacy of children: Weller v Associated Newspapers Ltd [2015] EWCA Civ 1176.
- Published in:
- Communications Law: Journal of Computer, Media & Telecommunications Law, 2016, v. 21, n. 1, p. 16
- By:
- Publication type:
- Article
Information protection based on nanosecond synchronization of time scales in meteor burst channel.
- Published in:
- Automation & Remote Control, 2008, v. 69, n. 6, p. 1065, doi. 10.1134/S0005117908060167
- By:
- Publication type:
- Article
Evolution of the Criminal Legal Frameworks for Preventing and Combating Cybercrime.
- Published in:
- Journal of Eastern European Criminal Law, 2014, n. 1, p. 84
- By:
- Publication type:
- Article
VIEW SEC REPORTS VIA THE WEB.
- Published in:
- Strategic Finance, 2006, v. 88, n. 1, p. 23
- By:
- Publication type:
- Article
The Causes, Security Issues, and Preventive Actions Associated with Data Integrity.
- Published in:
- Communications of the IIMA, 2011, v. 11, n. 1, p. 17
- By:
- Publication type:
- Article
Short Signcryption Scheme for the Internet of Things.
- Published in:
- Informatica (03505596), 2011, v. 35, n. 4, p. 521
- By:
- Publication type:
- Article
Extraction of Structure and Content from the Edgar Database: A Template-Based Approach.
- Published in:
- Journal of Emerging Technologies in Accounting, 2007, v. 4, p. 69, doi. 10.2308/jeta.2007.4.1.69
- By:
- Publication type:
- Article
A HIPAA-Compliant Architecture for Securing Clinical Images.
- Published in:
- Journal of Digital Imaging, 2006, v. 19, n. 2, p. 172, doi. 10.1007/s10278-005-9248-5
- By:
- Publication type:
- Article
The Use of Electronic Brokerage Systems in China: A Modified e-Commerce Model.
- Published in:
- Canadian Journal of Administrative Sciences (John Wiley & Sons, Inc.), 2012, v. 29, n. 1, p. 99, doi. 10.1002/cjas.213
- By:
- Publication type:
- Article