Works matching DE "INFORMATION technology safety measures"
Results: 13
Ann Landers and the Name Thieves.
- Published in:
- Strategic Finance, 2001, v. 83, n. 4, p. 63
- By:
- Publication type:
- Article
Characterizing Cybersecurity Threats to Organizations in Support of Risk Mitigation Decisions.
- Published in:
- e-Service Journal, 2020, v. 12, n. 2, p. 1, doi. 10.2979/eservicej.12.2.01
- By:
- Publication type:
- Article
Critical Infrastructures: IT Security and Threats from Private Sector Ownership.
- Published in:
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 3, p. 127, doi. 10.1080/19393555.2011.652289
- By:
- Publication type:
- Article
Exploring primary pupils’ experiences and understandings of ‘e-safety’.
- Published in:
- Education & Information Technologies, 2009, v. 14, n. 2, p. 127, doi. 10.1007/s10639-008-9083-7
- By:
- Publication type:
- Article
SECURITIZING INNOVATION TO PROTECT TRADE SECRETS BETWEEN "THE EAST" AND "THE WEST": A Neo- aSchumpeterian Public Legal Reading.
- Published in:
- UCLA Pacific Basin Law Journal, 2020, v. 37, n. 1, p. 59, doi. 10.5070/p8371048804
- By:
- Publication type:
- Article
A DISCUSSION ABOUT CULTURE AND INFORMATION SECURITY POLICY COMPLIANCE: A SUB-CULTURALLY BOUND DETERMINANT--REDEFINING THE HOFSTEDE HYPOTHESIS.
- Published in:
- Issues in Information Systems, 2015, v. 16, n. 4, p. 202
- By:
- Publication type:
- Article
CHECKING BACK.
- Published in:
- ITNOW, 2016, v. 58, n. 2, p. 26, doi. 10.1093/itnow/bww041
- By:
- Publication type:
- Article
MalPEFinder: fast and retrospective assessment of data breaches in malware attacks.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 8, p. 899, doi. 10.1002/sec.390
- By:
- Publication type:
- Article
Information Theft Untended.
- Published in:
- Management Review, 1999, v. 88, n. 11, p. 6
- By:
- Publication type:
- Article
What You Don't Know Is Limiting Your Potential for Success: Are You Willing to Accept the Risks...For Not Knowing?
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 40
- By:
- Publication type:
- Article
Why Risk Management Is Hard.
- Published in:
- ISSA Journal, 2016, v. 14, n. 1, p. 27
- By:
- Publication type:
- Article
A watermarking technique to improve the security level in face recognition systems.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 22, p. 23805, doi. 10.1007/s11042-016-4109-4
- By:
- Publication type:
- Article
Managing Information Technology Security in the Context of Cyber Crime Trends.
- Published in:
- International Journal of Computers, Communications & Control, 2013, v. 8, n. 1, p. 97
- By:
- Publication type:
- Article