ExLibris header image
SFX Logo
Title: A framework for selection of strategy for management of security measures
Source:

Journal of Risk Research [1366-9877] Abrahamsen, Eirik yr:2015


Collapse list of basic services Basic
Full text
Full text available via Taylor & Francis Journals Complete
GO
Document delivery
Request document via Library/Bibliothek GO
Users interested in this article also expressed an interest in the following:
1. Graves, J. "What is intellectual property and how do you protect it?" Network security 2017.2 (2017): 9-11. Link to SFX for this item
2. Qayoumi, Mohammad H. "Addressing Information Security Risk." EDUCAUSE quarterly 28.4 (2005): 7-11. Link to Full Text for this item Link to SFX for this item
3. "An integrated approach to workplace security." Employment relations today 32.1 (2005): 41-46. Link to Full Text for this item Link to SFX for this item
4. Anikin, Igor V. "Information security risk assessment and management method in computer networks." Control and Communications (SIBCON), 2015 International Siberian Conference on 1-5. Link to Full Text for this item Link to SFX for this item
5. Hwang, I. "Security Awareness: The First Step in Information Security Compliance Behavior." The journal of computer information systems. 61.4: 1-12. Link to SFX for this item
6. Samuelson, P. "Apple v. Samsung and the upcoming design patent wars?" Communications of the ACM 59.7 (2016): 22-24. Link to SFX for this item
7. Bolls, J. "Computer based testing - Bolls u. W. Scott Street, Sec'y of Va. Bd. of Bar Exmnrs., August 11, 2009, case no. 090915." Computer Law & Security Review: the international journal of technology law and practice 29.4 (2013): 446-449. Link to SFX for this item
8. Whitman, Michael E. "Enemy at the gate." Communications of the ACM 46.8 (2003): 91-95. Link to SFX for this item
9. Strauss, C. "Multiobjective Decision Support in IT-Risk Management." International journal of information technology & decision making 1.2 (2002): 251-268. Link to SFX for this item
10. Kim, S. "Auditing methodology on legal compliance of enterprise information systems." International journal of technology management 54.2 (2011): 270-287. Link to SFX for this item
11. Sheehan, Joanne P. P. "Protect Your Staff from Workplace Violence." Nursing management 31.3 (2000): 24-25. Link to SFX for this item
12. "Keeping data safe. The threat of security breaches can fuel preventive strategies." Healthcare informatics : the business magazine for information and communication systems. 31.2: 37-39. Link to SFX for this item
13. Samuelson, P. "Legally Speaking: Apple v. Samsung and the Upcoming Design Patent Wars?" Communications of the ACM 59.7 (2016): 22-. Link to SFX for this item
14. Jouini, M. "Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems." Procedia computer science 83 (2016): 1084-1089. Link to SFX for this item
15. Cusumano, Michael A. "The Apple-Samsung lawsuits." Communications of the ACM 56.1 (2013): 28-31. Link to SFX for this item
16. Yeh, Q. "Threats and countermeasures for information system security: A cross-industry study." Information & management 44.5 (2007): 480-491. Link to SFX for this item
17. Loch, H. D. "Threats to Information Systems: Today's Reality, Yesterday's Understanding." MIS quarterly 16.2 (1992): 173-186. Link to Full Text for this item Link to SFX for this item
18. Parsons, K. "The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies." Computers & security 66 (2017): 40-51. Link to SFX for this item
19. "Advanced automated software testing; frameworks for refined practice." Reference and Research Book News 27.2 (2012). Link to SFX for this item
20. Fedosov, V E. "The Capanda hydro development in Angola." Hydrotechnical construction 24.8 (1990): 537-542. Link to SFX for this item
View More...
View Less...
Select All Clear All

Expand list of advanced services Advanced