Search for: security+of+information
-
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
Year: 2015 / Volume: 39 / Issue: 1
$15.00 -
Threats to Information Systems: Today's Reality, Yesterday's Understanding
Year: 1992 / Volume: 16 / Issue: 2
$15.00 -
Differential Effects of Prior Experience on the Malware Resolution Process
Year: 2014 / Volume: 38 / Issue: 3
$15.00 -
The Information Center Concept: A Normative Model and a Study of Six Installations
Year: 1987 / Volume: 11 / Issue: 4
$15.00 -
The Consequences of Information Technology Control Weaknesses on Management Information Systems: The Case of Sarbanes-Oxley Internal Control Reports
Year: 2012 / Volume: 36 / Issue: 1
$15.00 -
The Impact of Malicious Agents on the Enterprise Software Industry
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Beyond Deterrence: An Expanded View of Employee Computer Abuse
Year: 2013 / Volume: 37 / Issue: 1
$15.00 -
Are Markets for Vulnerabilities Effective?
Year: 2012 / Volume: 36 / Issue: 1
$15.00 -
Discovering and Disciplining Computer Abuse in Organizations: A Field Study
Year: 1990 / Volume: 14 / Issue: 1
$15.00 -
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Year: 2015 / Volume: 39 / Issue: 1
$15.00