Understanding and Prioritizing Technology Management Challenges
暂无分享,去创建一个
[1] Steven A. Morris,et al. Exploration of Information System Process Improvements and Firm Performance , 2008, J. Comput. Inf. Syst..
[2] S. Rahtz. How Safe Is Your Data , 1991 .
[3] Simon Robinson. The Nature of Responsibility in a Professional Setting , 2009 .
[4] Esther H. Highland,et al. How safe is your data: Joseph M. Pujals Information Center, April 1988, p. 46 , 1988 .
[5] K. Rae,et al. Quality of internal control procedures: Antecedents and moderating effect on organisational justice and employee fraud , 2008 .
[6] Wei Wang,et al. Innovate with Complex Information Technologies: A Theoretical Model and Empirical Examination , 2008, J. Comput. Inf. Syst..
[7] Shuchih Ernest Chang,et al. Exploring organizational culture for information security management , 2007, Ind. Manag. Data Syst..
[8] John E. Anderson,et al. Why users (fail to) read computer usage policies , 2008, Ind. Manag. Data Syst..
[9] Robert Joseph Skovira. Framing the Corporate Security Problem: The Ecology of Security , 2007 .
[10] B. Rouge,et al. EXECUTIVE INFORMATION FOR STRATEGIC DECISION MAKING , 2008 .
[11] Robert L. Totterdale. Enterprise content management- a usability study. , 2008 .
[12] Dave Clitherow,et al. Combining high availability and disaster recovery solutions for critical IT environments , 2008, IBM Syst. J..
[13] Sue Conger. Personal Information Privacy: A Multi-Party Endeavor , 2009, J. Electron. Commer. Organ..