:::

詳目顯示

回上一頁
題名:A Laboratory Study Designed for Reducing the Gap between Information Security Knowledge and Implementation
書刊名:International Journal of Electronic Commerce Studies
作者:Elitzur, RevitalSai, Ying
出版日期:2010
卷期:1:1
頁次:頁37-49
主題關鍵詞:Information securityBusiness enablerLaboratory experiment
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:0
  • 點閱點閱:1
期刊論文
1.Mercuri, R. T.(2003)。Analyzing security cost。Communication of ACM,46(6)。  new window
2.Gaulke, M.(2002)。Risk management in IT projects。Information Systems Control Journal,5。  new window
3.Swartz, N.(2008)。Record data breaches in 2007。Information Management Journal,42(2)。  new window
4.Purser, S. A.(2004)。Improving the ROI of the security management process。Journal of Computers & Security,23(7),542-546。  new window
5.White, B.(2008)。Where the holes are: New tools help companies identify the real security risks in their computer systems -- before the hackers。Wall Street Journal,9,R12。  new window
研究報告
1.Allen, J.、Carnegie Mellon Software Engineering Institute(2005)。Governing for enterprise security。Carnegie Mellon Software Engineering Institute。  new window
圖書
1.Information Systems Audit and Control Association(2005)。CISA Review Manual。Information Systems Audit and Control Association。  new window
2.Levine, D. M.、Stephan, D. F.、Krehbiel, T. C.、Berenson, M. L.(2008)。Statistics for managers。Pearson Prentice Hall。  new window
單篇論文
1.Elitzur, R.(2008)。Automotive company information technology manager interviews,Los Angeles:Loyola Marymount University, California。  new window
其他
1.Chronology of Data Breaches(2008)。Privacy Rights Clearinghouse。  new window
2.Torres, M.(20080910)。Florida attorney general warns about identity theft after Bank of New York Mellon loses data。  new window
圖書論文
1.Freedman, J. B.(2005)。Information security: Is silence golden?。Americas Conference on Information Systems。Nebraska:Omaha。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE