EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Corporate security"
Narrow search

Narrow search

Year of publication
Subject
All
Corporate security 339 Unternehmenssicherheit 338 Risikomanagement 109 Data security 102 Datensicherheit 102 Risk management 101 Lieferkette 56 Supply chain 56 Betriebssicherheit 42 Sicherheit 37 Unternehmen 36 Betriebliches Informationssystem 31 Business intelligence system 30 Deutschland 29 Safety 28 Terrorism 28 Terrorismus 28 Informationsmanagement 27 Germany 26 Information management 25 Logistikunternehmen 21 USA 21 Logistics provider 20 United States 20 International security 18 Internationale Sicherheit 18 IT crime 17 IT-Kriminalität 17 Corporate culture 14 Krisenmanagement 14 Unternehmenskultur 14 Crisis management 13 National security 13 Nationale Sicherheit 13 Sicherheitstechnik 13 Welt 13 World 13 Arbeitsschutz 12 Compliance management 12 Compliance-Management 12
more ... less ...
Online availability
All
Undetermined 72 Free 31 CC license 9
Type of publication
All
Article 197 Book / Working Paper 172 Journal 9
Type of publication (narrower categories)
All
Article in journal 127 Aufsatz in Zeitschrift 127 Aufsatz im Buch 69 Book section 69 Collection of articles of several authors 23 Sammelwerk 23 Graue Literatur 16 Non-commercial literature 16 Arbeitspapier 13 Working Paper 13 Case study 12 Fallstudie 12 Hochschulschrift 11 Aufsatzsammlung 10 Guidebook 10 Ratgeber 10 Thesis 9 Konferenzschrift 8 Handbook 6 Handbuch 6 Conference proceedings 5 Lehrbuch 5 Textbook 5 Glossar enthalten 4 Glossary included 4 Article 2 Bibliografie enthalten 2 Bibliography included 2 Collection of articles written by one author 2 Sammlung 2 Accompanied by computer file 1 Bibliografie 1 Einführung 1 Elektronischer Datenträger als Beilage 1 No longer published / No longer aquired 1 Norm 1 Quelle 1 Referateorgan 1 Report 1 research-article 1
more ... less ...
Language
All
English 276 German 84 Undetermined 8 Russian 4 Ukrainian 4 French 3 Multiple languages 1 Spanish 1
more ... less ...
Author
All
Müller, Klaus-Rainer 5 Shyra, Taras 4 Fussan, Carsten 3 Gundel, Stephan 3 Lindner, Joachim 3 Nozaki, Micki Krause 3 Tipton, Harold F. 3 Williams, Zachary 3 Abrahamsen, Eirik Bjorheim 2 Aneziris, Olga 2 Ang, Wee Horng 2 Antonsen, Stian 2 Antonucci, Domenic 2 Ariano, Maria 2 Belyová, Lucia 2 Besley, Timothy 2 Bienz, Carsten 2 Bode, Christoph 2 Breitner, Michael H. 2 Campbell, George K. 2 Cavusoglu, Huseyin 2 Closs, David J. 2 Cole, Mara 2 Cook, Robert Lorin 2 Derii, Vasyl 2 Egli, Elmar 2 Engemann, Kurt J. 2 Gerbec, Marko 2 Goldberg, Michael 2 Grimaldi, John V. 2 Grothe, Martin 2 Helferich, Omar Keith 2 Herzig, Terrell W. 2 Hintsa, Juha 2 Hollnagel, Erik 2 Jakob, Mark 2 Jażdżewska-Gutta, Magdalena 2 Juranek, Steffen 2 Kaack, Jörn 2 Kim, Kwang Wook 2
more ... less ...
Institution
All
Springer Fachmedien Wiesbaden 4 Steinbeis-Hochschule Berlin 4 De Gruyter Oldenbourg 2 Healthcare Information and Management Systems Society. 2 Akademija Ekonomičnych Nauk Ukraïny <Donezk, Ukraine> 1 Berufsgenossenschaft Handel und Warenlogistik 1 Club des Directeurs de Sécurité des Entreprises 1 DAK-Gesundheit 1 Deutsches Institut für Interne Revision <Frankfurt, Main> / Arbeitskreis Interne Revision in der Versicherungswirtschaft 1 Deutsches Institut für Interne Revision <Frankfurt, Main> / Arbeitskreis Sicherheitsvorkehrungen in Kreditinstituten 1 Deutschland / Bundeswehr / Universität München 1 Europäische Kommission / Generaldirektion Energie und Verkehr 1 Generolo Jono Žemaičio Lietuvos Karo Akademija <Vilnius> 1 Institut Problem Rynka 1 International Conference on Management of Ergonomic Design, Industrial Safety and Health Care Systems <2016, Kharagpur> 1 MWV Medizinisch Wissenschaftliche Verlagsges. mbH & Co. KG 1 Meždunarodnaja naučno-praktičeskaja konferencija "Ėkonomičeskaja bezopasnostʹ Rossii: problemy i perspektivy" <2., Nischni Nowgorod, 2014> 1 Nuclear Energy Agency 1 Otto-von-Guericke-Universität Magdeburg / Fakultät für Wirtschaftswissenschaft 1 Rheinisch-Westfälischer Technischer Überwachungs-Verein <Essen> / Anlagentechnik 1 Richard Boorberg Verlag 1 Rossijskaja Akademija Estestvennych Nauk 1 Sicherheitsforum Baden-Württemberg - Die Wirtschaft Schützt Ihr Wissen 1 Sicherheitsgewerberechtstag <11, 2010, Berlin> 1 Specialists Meeting on in Core Instrumentation and Reactor Assessment 1 Specialists' Meeting on in Core Instrumentation and Reactor Assessment <1988, Cadarache> 1 Steinbeis-Transfer-Institut Business Academy <Berlin> 1 Steinbeis-Transfer-Institut Management und Business <Berlin> 1 Taylor and Francis 1 Technische Universität Chemnitz 1 The MIT Press 1 Vseukraïnsʹka naukovo-praktyčna internet-konferencija "Ekonomična bezpeka deržavy ta subʺjektiv pidpryjemnycʹkoï dijalʹnosti v Ukraïni: problemy ta šljachy ïch vyrišennja" <2014, Lemberg> 1 Vseukraïnsʹka naukovo-praktyčna konferencija "Formuvannja stratehiï socialʹno-ekonomičnoho rozvytku pidpryjemnycʹkych struktur v Ukraïni" <3, 2017, Lemberg> 1 medhochzwei Verlag GmbH 1
more ... less ...
Published in...
All
Risk governance of offshore oil and gas operations 11 Global supply chain security : emerging topics in research, practice and policy 6 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 6 International journal of risk assessment and management : IJRAM 5 SpringerLink / Bücher 5 Journal of business logistics : JBL 4 Managing information risk and the economics of security 4 Transfer-Dokumentation-Report / Vertiefungsrichtung 4 Verslas : teorija ir praktika : Vilniaus Gedimino Technikos Universiteto mokslo žurnalas 4 International journal of business information systems : IJBIS 3 International journal of physical distribution & logistics management : IJPD & LM 3 International journal of shipping and transport logistics : IJSTL 3 Journal of business ethics : JOBE 3 Journal of management information systems : JMIS 3 Managementmaßnahmen gegen Produktpiraterie und Industriespionage 3 Managing risk and security : the safeguard of long-term success for logistics service providers 3 Supply chain safety management : security and robustness in logistics 3 Healthcare Information and Management Systems Society 2 IIR-Schriftenreihe 2 IWI-Diskussionsbeiträge 2 Information systems research : ISR 2 International journal of accounting information systems 2 International journal of logistics systems and management 2 International journal of quality & reliability management 2 International journal of technology management : IJTM 2 International journal of value chain management : IJVCM 2 Journal of air transport management 2 Journal of organizational behavior management 2 Managing business risk : a practical guide to protecting your business 2 Managing the Future Supply Chain : current concepts and solutions for reliability and robustness 2 Maritime policy and management : MPM 2 Occupational safety & health guide series 2 Praxis 2 Security and insecurity in business history : case studies in the perception and negotiation of threats 2 Springer eBook Collection 2 SteinbeisBBA / TransferDokumentation-Report 2 Technovation : the international journal of technological innovation, entrepreneurship and technology management 2 Transfer-Dokumentation-Report 2 Transport reviews : a transnational transdisciplinary journal 2 Transportation journal : a journal of the Association for Supply Chain Management 2
more ... less ...
Source
All
ECONIS (ZBW) 351 USB Cologne (EcoSocSci) 23 EconStor 2 RePEc 1 Other ZBW resources 1
Showing 1 - 50 of 378
Cover Image
Global supply chains made visible through logistics security management
Mora Lozano, Pablo Emilio; Montoya-Torres, Jairo R. - In: Logistics 8 (2024) 1, pp. 1-39
Background: For several years, two of the major concerns of logistics managers are (i) the visibility of global supply chains and (ii) the uncertainty in deciding which existing logistics security program is the most appropriate according to the security levels for their organization. This last...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014507566
Saved in:
Cover Image
Wirtschaftsschutz in der digitalen Ära : Resilienzmanagement und proaktive Open Source Intelligence als Mittel der Wahl
Röhl, André; Starz, Philipp - 2024
Die zunehmenden geopolitischen Spannungen, vor allem durch den Konflikt zwischen Russland und der Ukraine, stellen Deutschland und seine Unternehmen vor eine komplexe Bedrohungslage, die mit erhöhten Risiken aufgrund von Sabotageaktivitäten und Wirtschaftsspionage einhergeht. Vor diesem...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014528635
Saved in:
Cover Image
Chief information security officer : a vital component of organizational information security management
Ciekanowski, Marek; Żurawski, Sławomir; Ciekanowski, … - In: European research studies 27 (2024) 2, pp. 35-46
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014536370
Saved in:
Cover Image
Analytical planning stability research : No reason for nervousness!
Inderfurth, Karl - Otto-von-Guericke-Universität Magdeburg / Fakultät … - 2024
Planning stability or its counterpart, planning nervousness, is a challenging issue for many companies as well as for scientists who try to analyze and explain this phenomenon. Research in this area mainly concentrates on the field of production and materials planning where current replanning...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015135793
Saved in:
Cover Image
Enterprise security management : textbook
Žyvko, Zinaïda Bohdanivna; Holovach, Tetiana; … - 2023
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014389064
Saved in:
Cover Image
Securing containerized supply chain through public and private partnership
Nikoofal, Mohammad Ebrahim; Pourakbar, Morteza; Gumus, … - In: Production and operations management : the flagship … 32 (2023) 7, pp. 2341-2361
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014328666
Saved in:
Cover Image
Cybersecurity : Technology and Governance
Jøsang, Audun - 2025
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015135607
Saved in:
Cover Image
Global supply chains security : a comparative analysis of emerging threats and traceability solutions
Gokkaya, Betul; Karafili, Erisa; Aniello, Leonardo - In: Benchmarking : an international journal 32 (2025) 3, pp. 917-942
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015398503
Saved in:
Cover Image
Loss control auditing : a guide for conducting fire, safety, and security audits
Dunlap, E. Scott - 2024 - Second edition
"Loss Control Auditing: A Guide for Conducting Fire, Safety, and Security Audits is a one-stop resource for both developing and executing a loss control audit program. This fully updated second edition addresses loss control auditing from the perspectives of workplace safety, physical security,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014515337
Saved in:
Cover Image
Unternehmenssicherheit : Handbuch für Wirtschaft und Behörden
Gundel, Stephan; Aping, Heinz-Werner - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014529979
Saved in:
Cover Image
Business security and ethical considerations in AI-driven Digital Twins
Dashore, Pankaj; Dashore, Rachana - In: Harnessing AI and digital twin technologies in businesses, (pp. 72-82). 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015193857
Saved in:
Cover Image
A safety risk assessment for ship boarding parties from fuzzy Bayesian networks perspective
Turna, İdris - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015394849
Saved in:
Cover Image
Intelligent systems in diverse domains : digital transformation
Alabido, Zeina Moammer - In: Strengthening industrial cybersecurity to protect …, (pp. 26-56). 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014526995
Saved in:
Cover Image
Applications of augmented reality in industrial unit processes
Farinha, João; Thomaz, João; Ramos, Pedro; Coelho, Bruno - In: Business continuity management and resilience : …, (pp. 162-198). 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014535872
Saved in:
Cover Image
Information Security : Opportunities and Limitations
Liedtke, Thomas - 2024
This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015100709
Saved in:
Cover Image
Security and privacy challenges in blockchain-based supply chain management : a comprehensive analysis
Vashishth, Tarun Kumar; Sharma, Vikas; Sharma, Kewal Krishan - In: Achieving secure and transparent supply chains with …, (pp. 70-91). 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014487662
Saved in:
Cover Image
The development of corporate security in the context of countering threats to doing business
Shyra, Taras; Salyga, Kostiantyn; Derii, Vasyl; … - In: Business: Theory and Practice 22 (2021) 1, pp. 211-221
The principal purpose of the study is to determine the main parameters of corporate security development in the enterprise in the context of determining the level of impact of external and internal threats. The study uses survey methods on the main internal and external threats that may affect...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012703673
Saved in:
Cover Image
Shapeshifting Securities
Couture, Wendy Gerwick - 2021
This essay demonstrates that, because of the flexible definition of “security,” certain interests have the potential to fall in and out of the definition, and thus in and out of securities regulation. This essay coins this potentiality “shapeshifting.” The phenomenon of shapeshifting...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013250476
Saved in:
Cover Image
Information Security Assurance and the Role of Security Configuration Management : Substantive and Symbolic Perspectives
Sun, Chia-Ming; Wang, Yen-Yao; Yang, Chen-Bin - 2021
This paper explores whether IT and audit professionals have different perceptions of the substantive and symbolic perspectives of information security assurance and the role of security configuration management (SCM) using a mixture of qualitative and quantitative approaches. Importance...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013216685
Saved in:
Cover Image
The development of corporate security in the context of countering threats to doing business
Shyra, Taras; Salyga, Kostiantyn; Derii, Vasyl; … - In: Verslas : teorija ir praktika : Vilniaus Gedimino … 22 (2021) 1, pp. 211-221
The principal purpose of the study is to determine the main parameters of corporate security development in the enterprise in the context of determining the level of impact of external and internal threats. The study uses survey methods on the main internal and external threats that may affect...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012604266
Saved in:
Cover Image
Protective shields : the drivers of adopting information security standards and complementarity with different security standards
Sun, Chia-Ming; Lin, Kui-Ying; Lai, Yu-Hsin - In: International journal of services and standards : IJSS 13 (2023) 3/4, pp. 195-220
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014430204
Saved in:
Cover Image
Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis
Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, … - In: Journal of management information systems : JMIS 40 (2023) 4, pp. 1099-1138
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014582250
Saved in:
Cover Image
Ekonomična bezpeka pidpryjemstva v umovach cyfrovizacii͏̈ rynku praci : teoretyčni ta praktyčni aspekty : monohrafija
Andrіi͏̈v, Natalija Mykolai͏̈vna - 2023 - Naukove vydannja
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014537470
Saved in:
Cover Image
Cultivating security culture for information security success : a mixed-methods study based on anthropological perspective
Tejay, Gurvirender P. S.; Mohammed, Zareef A. - In: Information & management : the internat. journal of … 60 (2023) 3, pp. 1-20
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014305661
Saved in:
Cover Image
Organizational perspectives on converged security operations
Mattord, Herbert; Kotwica, Kathleen; Whitman, Michael; … - In: Information & Computer Security 32 (2023) 2, pp. 218-235
Purpose The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises. Design/methodology/approach This paper is the first phase in a planned multiphase project to better understand...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015344452
Saved in:
Cover Image
Providing the corporate security strategy in the management system of the enterprise
Shyra, Taras; Shtyrov, Oleksandr; Korchynskyy, Ivan; … - In: Verslas: Teorija ir praktika / Business: Theory and Practice 21 (2020) 2, pp. 737-745
Three basic variants of the strategy for ensuring corporate security of an industrial enterprise ('survival', 'stabilization' and 'support') are proposed, the choice of one of which is associated with the results of assessing the level of corporate security. By applying the hierarchy analysis...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012703640
Saved in:
Cover Image
The becoming of coal mining and the security around it : the case of Colombia
Jakobsen, Line Jespersgaard - 2020
Social protection is emerging in Nepal as a key state instrument to reduce social exclusion and inequality by providing cash and social transfers to the most vulnerable households, targeting the socially excluded and challenging inter-generational poverty. In 2016-17, over 2.2 million persons in...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012419428
Saved in:
Cover Image
Software vulnerabilities and bug bounty programs
Bienz, Carsten; Juranek, Steffen - 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012265128
Saved in:
Cover Image
Assessment of economic security of enterprises : theoretical and methodological aspects
Shynkar, Svitlana; Gontar, Zoriana; Dubyna, Mariya; … - In: Verslas : teorija ir praktika : Vilniaus Gedimino … 21 (2020) 1, pp. 261-271
The main objective of the study is to formulate a new approach of assessing economic security for industrial enterprises, indicating a different approach from existing ones, to allow for the very specifics of economic activity, and to allow the use of qualitative and quantitative indicators. We...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012225140
Saved in:
Cover Image
Providing the corporate security strategy in the management system of the enterprise
Shyra, Taras; Shtyrov, Oleksandr; Korchynskyy, Ivan; … - In: Verslas : teorija ir praktika : Vilniaus Gedimino … 21 (2020) 2, pp. 737-745
Three basic variants of the strategy for ensuring corporate security of an industrial enterprise (“survival”, “stabilization” and “support”) are proposed, the choice of one of which is associated with the results of assessing the level of corporate security. By applying the hierarchy...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012502580
Saved in:
Cover Image
The coupling of safety and security : exploring interrelations in theory and practice
Bieder, Corinne (ed.); Pettersen Gould, Kenneth (ed.) - 2020
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013472874
Saved in:
Cover Image
Software Vulnerabilities and Bug Bounty Programs
Bienz, Carsten; Juranek, Steffen - 2020
Many software developers employ bug bounty programs that award a prize for the detection of bugs in their software. We analyze, in a model with asymmetric information, under which conditions a bug bounty program is beneficial for a software developer. In our model, a bug bounty program allows...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014097789
Saved in:
Cover Image
Formation of organizational support for the management of the economic security of engineering enterprises : methodical and practical aspects
Khalina, Olena; Bazyliuk, Volodymyr; Chornenka, Olena; … - In: Verslas : teorija ir praktika : Vilniaus Gedimino … 20 (2019), pp. 317-328
Difficult conditions of functioning and the severity of forecasting possible changes in the conduct of business stimulate a search for new ways to improve economic security management for engineering enterprises. The purpose of our article is to develop a methodological framework for the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012221240
Saved in:
Cover Image
Wirtschaftsschutz in der Praxis : Herausforderungen an die Sicherheit im Zeitalter von Digitalisierung und Krise
Vogt, Christian (ed.); Hennies, Patrick (ed.);  … - 2022
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012587187
Saved in:
Cover Image
Supply chain security certification and operational performance : the role of upstream complexity
Tong, Xu; Lai, Kee-hung; Lo, Chris K. Y.; Cheng, T. C. E. - In: International journal of production economics 247 (2022), pp. 1-13
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013337656
Saved in:
Cover Image
As strong as the weakest link : transport and supply chain security
Jażdżewska-Gutta, Magdalena; Borkowski, Przemysław - In: Transport reviews : a transnational transdisciplinary … 42 (2022) 6, pp. 762-783
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013412888
Saved in:
Cover Image
A review of models for transport security and of their relevance for supply chains
Zamparini, Luca - In: Transport reviews : a transnational transdisciplinary … 42 (2022) 6, pp. 784-800
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013412890
Saved in:
Cover Image
An evaluation of practitioners' perceptions of a security risk assessment methodology in air traffic management projects
Bernsmed, Karin; Bour, Guillaume; Lundgren, Martin; … - In: Journal of air transport management 102 (2022), pp. 1-18
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013272666
Saved in:
Cover Image
Antecedents and outcomes of supply chain security practices : the role of organizational security culture and supply chain disruption occurrence
Asamoah, David; Nuertey, Dorcas; Agyei-Owusu, Benjamin; … - In: International journal of quality & reliability management 39 (2022) 4, pp. 1059-1082
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013169524
Saved in:
Cover Image
Strengthening information technology security through the failure modes and effects analysis approach
Asllani, Arben; Lari, Alireza; Lari, Nasim - In: International journal of quality innovation 4 (2018) 5, pp. 1-22
Proper protection of information systems is a major quality issue of organizational risk management. Risk management is a process whereby risk factors are identified and then virtually eliminated. Failure modes and effects analysis (FMEA) is a risk management methodology for identifying...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011919233
Saved in:
Cover Image
The security and insecurity of enterprises : constructing and negotiating dangers, hazards, and threats in business history
Jakob, Mark; Kleinöder, Nina - In: Security and insecurity in business history : case …, (pp. 9-26). 2021
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013263199
Saved in:
Cover Image
The threat of insolvency : Czech enterprises searching for financial security in the early 1990s
Schäffler, Eva - In: Security and insecurity in business history : case …, (pp. 253-277). 2021
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013263218
Saved in:
Cover Image
Professionelles Sicherheitsmanagement für Unternehmen : Leitfaden für erfolgreiche Corporate Security
Timtschenko, Felix - 2021
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012586724
Saved in:
Cover Image
Governance and leadership in health and safety : a guide for board members and executive management
Al Hashmi, Waddah S. Ghanem; Arnold, Bob - 2021
"This book is a leadership guide to the effective implementation of the ISO 45001:2018 standard. It takes the high-level leadership and top management principles put forward in ISO 45001 and develops them into a comprehensive discourse on how, at the very top of any organization, large or small,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012429753
Saved in:
Cover Image
Security and insecurity in business history : case studies in the perception and negotiation of threats
Jakob, Mark (ed.); Kleinöder, Nina (ed.);  … - 2021 - 1st edition
In der Unternehmensgeschichte wurde das Thema „Sicherheit“ bislang wenig systematisch bearbeitet. Der Band macht einen ersten Versuch, die Ansätze der Historischen Sicherheitsforschung auf Unternehmen anzuwenden und die historische Dynamik von „Sicherheit“ jenseits statischer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012813672
Saved in:
Cover Image
AEO-Programme weltweit : Stand 2017
Weerth, Carsten - 2017
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011659946
Saved in:
Cover Image
IT-Sicherheit in Produktionsanlagen
Niemann, Karl-Heinz - 2017
Dieses Dokument befasst sich mit der IT-Sicherheit von Produktionsanlagen. Es richtet sich an kleine und mittlere Unternehmen, welche auf der Suche nach einem einfachen Vorgehensmodell für die Sicherstellung der IT-Sicherheit im Produktionsbereich sind. Um Leser für die Notwendigkeit der...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011735949
Saved in:
Cover Image
IT security in production facilities
Niemann, Karl-Heinz - 2017
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10011735958
Saved in:
Cover Image
Digital Listening für Unternehmen : Entscheiderwissen für Corporate Security, Personenschutz, Market Intelligence und Personalmarketing
Grothe, Martin - 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012236416
Saved in:
Cover Image
Credentials safety and system security pay-off and trade-off : comfort level security assurance framework
Ur Rehman, Habib; Nazir, Mohammed; Mustafa, Khurram - In: Strategic system assurance and business analytics, (pp. 255-274). 2020
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012240972
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...