Pascal and Francis Bibliographic Databases


Search results

Your search

kw.\*:("security management")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 32

  • Page / 2


Selection :

  • and

Information security management standards: Problems and solutionsSIPONEN, Mikko; WILLISON, Robert.Information & management. 2009, Vol 46, Num 5, pp 267-270, issn 0378-7206, 4 p.Article

Improving information security management: An analysis of ID―password usage and a new login vulnerability measureYOUNGSOK BANG; LEE, Dong-Joo; BAE, Yoon-Soo et al.International journal of information management. 2012, Vol 32, Num 5, pp 409-418, issn 0268-4012, 10 p.Article

Applying ISO 17799:2005 in information security managementLEE, Ming-Chang; CHANG, To.International journal of services and standards (Print). 2007, Vol 3, Num 3, pp 352-373, issn 1740-8849, 22 p.Article

Security management in Wireless Sensor Networks for healthcareOH, Tae; CHOI, Young B; RYOO, Jungwoo et al.International journal of mobile communications (Print). 2011, Vol 9, Num 2, pp 187-207, issn 1470-949X, 21 p.Article

Anatomy of an ambush : security risks facing international humanitarian assistanceBURKLE, Frederick M.Disasters (Print). 2005, Vol 29, Num 1, pp 26-37, issn 0361-3666, 12 p.Article

Connect, communicate, collaborate and create: Implementing an enterprise-wide social collaboration platform at KPMG - Part two: Realizing valueHUGHES, Ceri; CHAPEL, Alex.Business information review. 2013, Vol 30, Num 4, pp 191-195, issn 0266-3821, 5 p.Article

Towards adaptive security for convergent wireless sensor networks in beyond 3G environmentsMITSEVA, Anelia; AIVALOGLOU, Efthimia; MARCHITTI, Maria et al.Wireless communications and mobile computing (Print). 2010, Vol 10, Num 9, pp 1193-1207, issn 1530-8669, 15 p.Article

Authentication traffics modeling and analysis in next generation wireless networksYAN ZHANG; SHAOQIU XIAO; MINGTUO ZHOU et al.Wireless communications and mobile computing (Print). 2008, Vol 8, Num 5, pp 615-625, issn 1530-8669, 11 p.Article

Factors influencing information security management in small- and medium-sized enterprises: A case study from TurkeyYILDIRIM, Ebru Yeniman; AKALP, Gizem; AYTAC, Serpil et al.International journal of information management. 2011, Vol 31, Num 4, pp 360-365, issn 0268-4012, 6 p.Article

Incident-centered information security: Managing a strategic balance between prevention and responseBASKERVILLE, Richard; SPAGNOLETTI, Paolo; JONGWOO KIM et al.Information & management. 2014, Vol 51, Num 1, pp 138-151, issn 0378-7206, 14 p.Article

Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policiesSON, Jai-Yeol.Information & management. 2011, Vol 48, Num 7, pp 296-302, issn 0378-7206, 7 p.Article

Integrated e-enterprise security design and implementation : a case study of e-service in supply chain managementSHIH, Stephen C; WEN, H. Joseph.International journal of electronic business. 2005, Vol 3, Num 2, pp 154-173, issn 1470-6067, 20 p.Article

Threat evaluation method for distributed network environmentHAN, Keun-Hee; KIM, Il-Gon; LEE, Kang-Won et al.Journal of information science and engineering. 2006, Vol 22, Num 4, pp 889-907, issn 1016-2364, 19 p.Article

Task force deployment for big eventsDRECHSEL, J; KIMMS, A.Safety science. 2008, Vol 46, Num 9, pp 1289-1305, issn 0925-7535, 17 p.Article

Security management: The processROBERTS, D. W.Lecture notes in computer science. 1998, pp 366-376, issn 0302-9743, isbn 3-540-65474-7Conference Paper

An empirical study of mobile securities management systems adoption: a Task-Technology Fit perspectiveZHENHUA LIU; QINGFEI MIN; SHAOBO JI et al.International journal of mobile communications (Print). 2010, Vol 8, Num 2, pp 230-243, issn 1470-949X, 14 p.Article

Protective measures and vulnerability indices for the Enhanced Critical Infrastructure Protection ProgrammePETIT, Frederic; BUEHRING, William; WHITFIELD, Ronald et al.International journal of critical infrastructures. 2011, Vol 7, Num 3, pp 200-219, issn 1475-3219, 20 p.Article

A situation awareness model for information security risk managementWEBB, Jeb; AHMAD, Atif; MAYNARD, Sean B et al.Computers & security. 2014, Vol 44, pp 1-15, issn 0167-4048, 15 p.Article

Towards semantic web-based management of security services : Next-generation network and service managementGARCIA CLEMENTE, Félix J; MARTINEZ PEREZ, Gregorio; ORTEGA, Andrés Munoz et al.Annales des télécommunications. 2008, Vol 63, Num 3-4, pp 183-193, issn 0003-4347, 11 p.Article

Aggregating vulnerability metrics in enterprise networks using attack graphsHOMER, John; SU ZHANG; XINMING OU et al.Journal of computer security. 2013, Vol 21, Num 4, pp 561-597, issn 0926-227X, 37 p.Article

Forewarning of sustainable utilization of regional water resources: a model based on BP neural network and set pair analysisJIN, Ju-Liang; WEI, Yi-Ming; ZOU, Le-Le et al.Natural hazards (Dordrecht). 2012, Vol 62, Num 1, pp 115-127, issn 0921-030X, 13 p.Article

Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South KoreaHOVAV, Anat; D'ARCY, John.Information & management. 2012, Vol 49, Num 2, pp 99-110, issn 0378-7206, 12 p.Article

Computer security: An introduction to computer security: the NIST handbookGUTTMAN, Barbara; ROBACK, Edward A.NIST special publication. 1995, Num 800-12, issn 1048-776X, 287 p.Serial Issue

CISOs and organisational culture: Their own worst enemy?ASHENDEN, Debi; SASSE, Angela.Computers & security. 2013, Vol 39, pp 396-405, issn 0167-4048, 10 p., bArticle

Complexity is dead, long live complexity! How software can help service providers manage security and complianceTHALMANN, Stefan; BACHLECHNER, Daniel; DEMETZ, Lukas et al.Computers & security. 2014, Vol 45, pp 172-185, issn 0167-4048, 14 p.Article

  • Page / 2