Talent discovery for cyber security: An organisational perspective
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo,et al. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[2] James Conrad. Seeking help: the important role of ethical hackers , 2012, Netw. Secur..
[3] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[4] Lawrence M. Seiford,et al. Data envelopment analysis (DEA) - Thirty years on , 2009, Eur. J. Oper. Res..
[5] Kecheng Liu,et al. Semiotics in Information Systems Engineering , 2000 .
[6] Hung-Tso Lin,et al. Personnel selection using analytic network process and fuzzy data envelopment analysis approaches , 2010, Comput. Ind. Eng..
[7] Lily Sun,et al. An ontological modelling of user requirements for personalised information provision , 2010, Inf. Syst. Frontiers.
[8] B. Fruytier,et al. Talent management and the relevance of context: Towards a pluralistic approach , 2013 .
[9] Helmut Volger,et al. ITU – International Telecommunication Union , 2000, A Concise Encyclopedia of the United Nations.
[10] Marjan Krisper,et al. Multi-criteria decision making in ontologies , 2013, Inf. Sci..
[11] Robert E. Lewis,et al. Talent management: A critical review , 2006 .
[12] Tracey Caldwell,et al. Plugging the cyber-security skills gap , 2013 .
[13] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[14] Thompson S. H. Teo. Meeting the challenges of knowledge management at the Housing and Development Board , 2005, Decis. Support Syst..
[15] Kamel Mellahi,et al. Strategic talent management: A review and research agenda , 2009 .
[16] Francesco M. Donini,et al. Automating competence management through non-standard reasoning , 2011, Eng. Appl. Artif. Intell..
[17] Gabriella Pasi,et al. Personal ontologies: Generation of user profiles based on the YAGO ontology , 2013, Inf. Process. Manag..
[18] Joseph Weiss,et al. Cyber Security Policy Guidebook: Bayuk/Cyber Security Policy , 2012 .
[19] H.A.M. Luiijf,et al. National Cyber Security Framework Manual , 2013 .
[20] Jennifer E. Rowley,et al. The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..
[21] Jennifer L. Bayuk,et al. Cyber Security Policy Guidebook , 2012 .
[22] T. L. Saaty. A Scaling Method for Priorities in Hierarchical Structures , 1977 .
[23] Dorothy E. Leidner,et al. Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..
[24] Nicky Dries,et al. What is the meaning of ‘talent’ in the world of work? , 2013 .
[25] W. A. Schiemann. From talent management to talent optimization , 2014 .
[26] Karsten Lundqvist,et al. An ontological approach to competency management , 2008 .
[27] Mehmet Altinöz,et al. Effects of Talent Management on Organizational Trust: A Field Study , 2013 .
[28] Mohammed Alsaigh,et al. Information analytics for healthcare service discovery. , 2014, Journal of healthcare engineering.