Management of Information Security
Management of Information Security
Why computer scientists should attend hacker conferences
Communications of the ACM - The disappearing computer
Management Information Systems: Managing the Digital Firm (10th Edition)
Management Information Systems: Managing the Digital Firm (10th Edition)
Synergy between data warehousing and knowledge management: three industries reviewed
International Journal of Information Technology and Management
An Investigation of Knowledge Management within a University IT Group
Information Resources Management Journal
Guidelines for designing IT security management tools
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
International Journal of Human-Computer Studies
Role-Based and Service-Oriented Security Management in the E-Government Environment
EGOV '09 Proceedings of the 8th International Conference on Electronic Government
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Heuristics for evaluating IT security management tools
Proceedings of the Seventh Symposium on Usable Privacy and Security
Secure mobile sales force automation: the case of independent sales agencies
Information Systems and e-Business Management
Hi-index | 0.00 |
The major benefits of knowledge management, particularly as it pertains to security measures, makes it critical that organizations have a mechanism for defining and identifying knowledge needs.