Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Investing in IT Security: How to Determine the Maximum ThresholdEisenga, Amanda ; Jones, Travis L ; Rodriguez, WalterInternational journal of information security and privacy, 2012-07, Vol.6 (3), p.75-87 [Periódico revisado por pares]IGI GlobalTexto completo disponível |
|
2 |
Material Type: Artigo
|
Mindfully Experimenting with IT: Cases on Corporate Social Media IntroductionPoston, Robin S ; Kettinger, William JJournal of database management, 2014-04, Vol.25 (2), p.29-51 [Periódico revisado por pares]Hershey: IGI GlobalTexto completo disponível |
|
3 |
Material Type: Artigo
|
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORASimić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, AlexanderInternational journal of information security and privacy, 2013-07, Vol.7 (3), p.16-35 [Periódico revisado por pares]Hershey, PA: IGI PublishingTexto completo disponível |
|
4 |
Material Type: Artigo
|
An Integrated Security Governance Framework for Effective PCI DSS ImplementationNicho, Mathew ; Fakhry, Hussein ; Haiber, CharlesInternational journal of information security and privacy, 2011-07, Vol.5 (3), p.50-67 [Periódico revisado por pares]IGI GlobalTexto completo disponível |
|
5 |
Material Type: Artigo
|
Research Commentary on IS/IT Role in Emergency and Pandemic Management: Current and Future ResearchSiau, Keng ; Shiau, Wen-Lung ; Yu, Yuan ; Guo, JiaJournal of database management, 2021-04, Vol.32 (2), p.67-75 [Periódico revisado por pares]IGI GlobalTexto completo disponível |
|
6 |
Material Type: Artigo
|
A Survey of Security Standards Applicable to Health Information SystemsAkowuah, Francis ; Yuan, Xiaohong ; Xu, Jinsheng ; Wang, HongInternational journal of information security and privacy, 2013-10, Vol.7 (4), p.22-36 [Periódico revisado por pares]Hershey, PA: IGI PublishingTexto completo disponível |
|
7 |
Material Type: Artigo
|
Network Anomalies Detection Approach Based on Weighted VotingAlfimtsev, Alexander ; Sakulin, Sergey ; Kvitchenko, Konstantin ; Dobkacz, Leonid ; Kalgin, Yuri ; Lychkov, IgorInternational journal of information security and privacy, 2022-01, Vol.16 (1), p.1-17 [Periódico revisado por pares]Hershey: IGI GlobalSem texto completo |
|
8 |
Material Type: Artigo
|
An Ontology of Information SecurityHerzog, Almut ; Shahmehri, Nahid ; Duma, ClaudiuInternational journal of information security and privacy, 2007-10, Vol.1 (4), p.1-23 [Periódico revisado por pares]Hershey: IGI GlobalTexto completo disponível |
|
9 |
Material Type: Artigo
|
ICT R&D and Technology Knowledge Flows in KoreaJung, Woo-Jin ; Lee, Sang-Yong TomJournal of database management, 2018-10, Vol.29 (4), p.51-69 [Periódico revisado por pares]Hershey: IGI GlobalTexto completo disponível |
|
10 |
Material Type: Artigo
|
Understanding Gender Differences in Media Perceptions of Hedonic Systems: A Comparison of 2D versus 3D MediaNah, Fiona Fui-Hoon ; Eschenbrenner, BrendaJournal of database management, 2016-07, Vol.27 (3), p.23-37 [Periódico revisado por pares]Hershey: IGI GlobalTexto completo disponível |