IT compliance of industrial information systems: Technology management and industrial engineering perspective
暂无分享,去创建一个
[1] Peter Jemmeson,et al. Using the Internet for competitive advantage , 1997 .
[2] Sangkyun Kim,et al. Assessment Methodology on Maturity Level of ISMS , 2005, KES.
[3] Sangkyun Kim,et al. A study on decision consolidation methods using analytic models for security systems , 2007, Comput. Secur..
[4] Sangkyun Kim,et al. A Case Study on the Real-Time Click Stream Analysis System , 2004, CIS.
[5] Milorad M. Novicevic,et al. The Sarbanes-Oxley Act as a hologram of post-Enron disclosure: a critical realist commentary , 2004 .
[6] Rolf Moulton,et al. Applying information security governance , 2003, Comput. Secur..
[7] Ilyoo B. Hong,et al. Information technology to support any‐time, any‐place team meetings in Korean organizations , 1999 .
[8] Sangkyun Kim,et al. Security of the internet-based instant messenger: Risks and safeguards , 2005, Internet Res..
[9] Sangkyun Kim,et al. A Case Study on the Development of Employee Internet Management System , 2005, ICCSA.
[10] Sangkyun Kim,et al. Security Engineering Methodology Based on Problem Solving Theory , 2006, ICCSA.
[11] Sangkyun Kim,et al. Implementation of the Security System for Instant Messengers , 2004, CIS.
[12] Ronald L. Krutz,et al. The CISSP Prep Guide: Mastering the Ten Domains of Computer Security , 2001 .
[13] Waiman Cheung,et al. The use of the World Wide Web for commercial purposes , 1998 .