Language
English
German
^M
Dutch
Spanish
Title:
A framework for selection of strategy for management of security measures
Source:
Journal of Risk Research [1366-9877] Abrahamsen, Eirik yr:2015
Basic
Full text
Full text available via
Taylor & Francis Journals Complete
Year:
Volume:
Issue:
Start Page:
Document delivery
Request document via
Library/Bibliothek
Users interested in this article also expressed an interest in the following:
description
1.
Graves, J.
"What is intellectual property and how do you protect it?"
Network security
2017.2 (2017): 9-11.
description
2.
Qayoumi, Mohammad H.
"Addressing Information Security Risk."
EDUCAUSE quarterly
28.4 (2005): 7-11.
description
3.
"An integrated approach to workplace security."
Employment relations today
32.1 (2005): 41-46.
description
4.
Anikin, Igor V.
"Information security risk assessment and management method in computer networks."
Control and Communications (SIBCON), 2015 International Siberian Conference on
1-5.
description
5.
Hwang, I.
"Security Awareness: The First Step in Information Security Compliance Behavior."
The journal of computer information systems.
61.4: 1-12.
description
6.
Samuelson, P.
"Apple v. Samsung and the upcoming design patent wars?"
Communications of the ACM
59.7 (2016): 22-24.
description
7.
Bolls, J.
"Computer based testing - Bolls u. W. Scott Street, Sec'y of Va. Bd. of Bar Exmnrs., August 11, 2009, case no. 090915."
Computer Law & Security Review: the international journal of technology law and practice
29.4 (2013): 446-449.
description
8.
Whitman, Michael E.
"Enemy at the gate."
Communications of the ACM
46.8 (2003): 91-95.
description
9.
Strauss, C.
"Multiobjective Decision Support in IT-Risk Management."
International journal of information technology & decision making
1.2 (2002): 251-268.
description
10.
Kim, S.
"Auditing methodology on legal compliance of enterprise information systems."
International journal of technology management
54.2 (2011): 270-287.
description
11.
Sheehan, Joanne P. P.
"Protect Your Staff from Workplace Violence."
Nursing management
31.3 (2000): 24-25.
description
12.
"Keeping data safe. The threat of security breaches can fuel preventive strategies."
Healthcare informatics : the business magazine for information and communication systems.
31.2: 37-39.
description
13.
Samuelson, P.
"Legally Speaking: Apple v. Samsung and the Upcoming Design Patent Wars?"
Communications of the ACM
59.7 (2016): 22-.
description
14.
Jouini, M.
"Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems."
Procedia computer science
83 (2016): 1084-1089.
description
15.
Cusumano, Michael A.
"The Apple-Samsung lawsuits."
Communications of the ACM
56.1 (2013): 28-31.
description
16.
Yeh, Q.
"Threats and countermeasures for information system security: A cross-industry study."
Information & management
44.5 (2007): 480-491.
description
17.
Loch, H. D.
"Threats to Information Systems: Today's Reality, Yesterday's Understanding."
MIS quarterly
16.2 (1992): 173-186.
description
18.
Parsons, K.
"The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies."
Computers & security
66 (2017): 40-51.
description
19.
"Advanced automated software testing; frameworks for refined practice."
Reference and Research Book News
27.2 (2012).
description
20.
Fedosov, V E.
"The Capanda hydro development in Angola."
Hydrotechnical construction
24.8 (1990): 537-542.
View More...
View Less...
Select All
Clear All
Save Citations
Select Format
ProCite
Reference Manager
RefWorks
EndNote
Submit citation export
Advanced
Author
Other articles by this author? -- in
GeoRef
author:
Abrahamsen, Eirik B
Pettersen, Kenneth
Aven, Terje
Kaufmann, Mareile
Rosqvist, Tony
last name
initials
Other articles by this author? -- in
Online Contents Geosciences
author:
Abrahamsen, Eirik B
Pettersen, Kenneth
Aven, Terje
Kaufmann, Mareile
Rosqvist, Tony
last name
initials
Web Search
Find related information in
a Web Search Engine
Excite
Google
HotBot
Ixquick
ZOO
Ask
Yahoo!
Bing
Naver
Search Terms:
Search for related information in
Google Scholar
Article Title
Author Name
Journal Title
Other Search
Search Terms:
A service provided by the
Library of the Wissenschaftspark Albert Einstein
, Potsdam, Germany.
© 2005 SFX by Ex Libris Inc.