Managing information security on a shoestring budget
Annals of cases on information technology
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
A Mark-Up Language for the Specification of Information Security Governance Requirements
International Journal of Information Security and Privacy
Governing Information Security: Governance Domains and Decision Rights Allocation Patterns
Information Resources Management Journal
Hi-index | 0.00 |
_cf_loadingtexthtml="";_cf_contextpath="";_cf_ajaxscriptsrc="/CFIDE/scripts/ajax";_cf_jsonprefix='//';_cf_clientid='0C2C84B924F515223991F67D2BD8C6CE';Information Security Governance function settab() { var mytabs = ColdFusion.Layout.getTabLayout('citationdetails'); mytabs.on('tabchange', function(tabpanel,activetab) { document.cookie = 'picked=' + '1480217' + ',' + activetab.id; }) }function letemknow(){ ColdFusion.Window.show('letemknow');}function testthis(){alert('test');}function loadalert(){ alert("I am in the load alert"); }function loadalert2(){ alert("I am in the load alert2"); } google.load('visualization', '1', {packages:['orgchart']}); google.setOnLoadCallback(drawChart); function drawChart() { var data = new google.visualization.DataTable(); data.addColumn('string', 'Name'); data.addColumn('string', 'Manager'); data.addColumn('string', 'ToolTip'); data.addRows([ [{v:'0', f:'CCS for this Book