Information Systems Management
暂无分享,去创建一个
Anne Powell | Matt Crawford | Shannon Keller | Ben Horstmann | Chad Predmore | Anne L. Powell | S. Keller | Ben Horstmann | Chad Predmore | Matt Crawford
[1] Michael E. Whitman,et al. In defense of the realm: understanding the threats to information security , 2004, Int. J. Inf. Manag..
[2] Hock-Hai Teo,et al. An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..
[3] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[4] Eugene Schultz. Security training and awareness - fitting a square peg in a round hole , 2004, Comput. Secur..
[5] Jan Guynes Clark,et al. Why there aren't more information security research studies , 2004, Inf. Manag..
[6] E. Sandstrom,et al. Cyber security , 2005, International Symposium CIGRE/IEEE PES, 2005..
[7] Gerald V. Post,et al. Management tradeoffs in anti-virus strategies , 2000, Inf. Manag..
[8] Edward Amoroso,et al. Cyber Security , 2006 .
[9] Dagmara Scalise. 2004 Nova Awards. Better beginnings/Brockton hospital. Crossing cultural barriers for babies' sake. , 2004, Hospitals & health networks.
[10] Budi Arief,et al. Computer security impaired by legitimate users , 2004, Comput. Secur..
[11] Sushil Jajodia,et al. Intrusion Confinement by Isolation in Information Systems , 2000, J. Comput. Secur..
[12] Gayle Webb White,et al. Controlling corporate e-mail, PC use and computer security , 2001, Inf. Manag. Comput. Secur..
[13] Rossouw von Solms,et al. Towards information security behavioural compliance , 2004, Comput. Secur..