Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
Loading…
Productivity vs security: mitigating conflicting goals in organizations
Mayer, Peter, Gerber, Nina, McDermott, Ronja, Volkamer, Melanie, Vogt, Joachim
Published in Information management & computer security (01.01.2017)
Published in Information management & computer security (01.01.2017)
Get full text
Journal Article
Loading…
Loading…
Loading…
Logical acquisition and analysis of data from android mobile devices
Srivastava, Himanshu, Tapaswi, Shashikala
Published in Information management & computer security (09.11.2015)
Published in Information management & computer security (09.11.2015)
Get full text
Journal Article
Loading…
A conceptual model and empirical assessment of HR security risk management
Kumah, Peace, Yaokumah, Winfred, Okai, Eric Saviour Aryee
Published in Information management & computer security (08.07.2019)
Published in Information management & computer security (08.07.2019)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Information security in supply chains: a management control perspective
P N, Sindhuja, Kunnathur, Anand S.
Published in Information management & computer security (09.11.2015)
Published in Information management & computer security (09.11.2015)
Get full text
Journal Article
Loading…
Taxonomy of technological risks of open source software in the enterprise adoption context
Silic, Mario, Back, Andrea, Silic, Dario
Published in Information management & computer security (09.11.2015)
Published in Information management & computer security (09.11.2015)
Get full text
Journal Article
Loading…
Loading…
A model-based approach to support privacy compliance
Alshammari, Majed, Simpson, Andrew
Published in Information management & computer security (08.10.2018)
Published in Information management & computer security (08.10.2018)
Get full text
Journal Article
Loading…
Tightroping between APT and BCI in small enterprises
Kaukola, Jesse, Ruohonen, Jukka, Tuomisto, Antti, Hyrynsalmi, Sami, Leppänen, Ville
Published in Information management & computer security (10.07.2017)
Published in Information management & computer security (10.07.2017)
Get full text
Journal Article
Loading…
Loading…
Understanding passwords – a taxonomy of password creation strategies
Kävrestad, Joakim, Eriksson, Fredrik, Nohlberg, Marcus
Published in Information management & computer security (08.07.2019)
Published in Information management & computer security (08.07.2019)
Get full text
Journal Article