Search for: security
- Related search terms
- Security+in+information
- security+of+information
- security+by+design+information
- security of information systems by design
- Security by Design in Enterprise Architecture: A Methodology Proposal
-
Coping With Systems Risk: Security Planning Models for Management Decision Making
Year: 1998 / Volume: 22 / Issue: 4
$15.00 -
Fear Appeals and Information Security Behaviors: An Empirical Study
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?
Year: 2018 / Volume: 42 / Issue: 4
$15.00 -
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Growth and Sustainability of Managed Security Services Networks: An Economic Perspective
Year: 2012 / Volume: 36 / Issue: 4
$15.00 -
Is Cybersecurity a Team Sport? A Multilevel Examination of Workgroup Information Security Effectiveness
Year: 2020 / Volume: 44 / Issue: 2
$15.00 -
Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China
Year: 2016 / Volume: 40 / Issue: 1
$15.00 -
Quality Competition and Market Segmentation in the Security Software Market
Year: 2014 / Volume: 38 / Issue: 2
$15.00 -
Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard
Year: 2006 / Volume: 30 / Issue: SI
$15.00 -
Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions
Year: 2010 / Volume: 34 / Issue: 3
$15.00