Information Security and Knowledge Management: Solutions Through Analogies?
暂无分享,去创建一个
[1] Alexander Hars,et al. Working for free? Motivations of participating in open source projects , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[2] Hal R. Varian,et al. Information rules - a strategic guide to the network economy , 1999 .
[3] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[4] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[5] Taya M. Malone,et al. The Future of Work: How the New Order of Business Will Shape Your Organization, Your Management Style and Your Life , 2004 .
[6] Dale A. Stirling,et al. Information rules , 2003, SGMD.
[7] H. Chesbrough. The Era of Open Innovation , 2003 .
[8] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[9] Bruce Schneier,et al. Beyond fear - thinking sensibly about security in an uncertain world , 2003 .
[10] Deborah A. Frincke,et al. A Human Endeavor: Lessons from Shakespeare and Beyond , 2005, IEEE Secur. Priv..
[11] D. MacKenzie,et al. The use of knowledge about society , 2008 .
[12] Jianyi Lin,et al. Computer crime and security survey , 2002 .
[13] Robert C. Ellickson,et al. Order Without Law: How Neighbors Settle Disputes , 1991 .
[14] H. Varian,et al. A STRATEGIC GUIDE TO THE NETWORK ECONOMY , 2002 .
[15] G. Probst,et al. Wissen managen-wie Unternehmen ihre wertvollste Ressource optimal nutzen , 1998 .
[16] W. Swap,et al. Resource allocation beyond firm boundaries: A multi-level model for Open Source innovation , 2004 .
[17] Jay Liebowitz,et al. Knowledge Management Handbook , 1999 .