EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer Security"
Narrow search

Narrow search

Year of publication
Subject
All
Computer security 94 Security measures 24 Computersicherheit 20 Data protection 19 Data security 18 Computer networks 13 Computer Security 12 Datensicherheit 12 Electronic commerce 12 Information technology 12 computer security 12 Crime 10 Informationstechnik 9 Management 9 Unternehmen 9 Datenschutz 8 Electronic Commerce 8 Risk management 8 Access control 6 Business enterprises 6 Congresses 6 Information security 6 Risikomanagement 6 Computer privacy 5 Computerized method 5 Computerunterstützung 5 Datensicherung 5 Hacking 5 Information resources management 5 Internet 5 Security 5 information security 5 Business 4 Computer security. 4 Computer users 4 Data processing 4 Kongress 4 Rechnernetz 4 USA 4 Computer fraud 3
more ... less ...
Online availability
All
Undetermined 60 Free 19 CC license 1
Type of publication
All
Article 71 Book / Working Paper 54 Other 5
Type of publication (narrower categories)
All
research-article 28 Article in journal 14 Aufsatz in Zeitschrift 14 Bibliographie 13 review-article 7 Konferenzschrift 6 Congress Report 3 conceptual-paper 3 review 3 non-article 2 technical-paper 2 viewpoint 2 Article 1 Aufsatzsammlung 1 Conference paper 1 Graue Literatur 1 Konferenzbeitrag 1 Non-commercial literature 1 Thesis 1
more ... less ...
Language
All
English 120 Undetermined 9 Lithuanian 1
Author
All
Arsenovski, Sime 2 Bagchi, Aditya 2 Dandapani, Krishnan 2 Forcht, Karen A. 2 Gertz, Michael 2 Herold, Rebecca 2 Landoll, Douglas J. 2 Mattord, Herbert J. 2 Mazumdar, Chandan 2 Mitrevski, Pece 2 Ortmeier, P. J. 2 Pal, Pinakpani 2 Quigley, Marian 2 Roufaiel, Nazik S. 2 Sekulovska-Jovkovska, Ana 2 Sommestad, Teodor 2 Whitman, Michael E. 2 Abman, Ryan 1 Ahmim, Ahmed 1 Alvarez, Gonzalo 1 Amara Korba, Abdelaziz 1 Amoroso, Edward G. 1 Anastasi, Joe 1 Andress, Jason 1 Ashenden, Debi 1 Athavale, Nachiket 1 Avgerinos, Thanassis 1 Axelrod, C. Warren 1 Ball, James 1 Barde, S. S. 1 Bareiša, Eduardas 1 Barton, Laurence 1 Baskerville, Richard 1 Beckett, Charlie 1 Biddle, Robert 1 Bieder, Corinne 1 Birath, Marcus 1 Bisma, Bashir 1 Biswanath Dutta, Dr. 1 Blakely, Benjamin 1
more ... less ...
Institution
All
Blekinge Institute of Tecnology, Sweden 1 Department of Economics, University of California-Santa Barbara (UCSB) 1 Dipartimento di Ingegneria Informatica, Automatica e Gestionale "Antonio Ruberti", Facoltà di Ingegneria dell'Informazione Informatica e Statistica 1 Faculty of Economics, University of Cambridge 1 Federal Reserve Bank of Philadelphia 1 Institut für Wirtschaftsinformatik, Wirtschaftswissenschaftliche Fakultät 1 Institute of Directors 1 International Federation for Information Processing / Technical Committee Security and Protection in Information Processing Systems 1 International Federation for Information Processing / Working Group Integrity and Internal Control 1 Kaunas University of Technology 1 Working Conference on Integrity and Internal Control in Information Systems (IICIS) <5, 2002, Bonn> 1 Working Conference on Integrity and Internal Control in Information Systems <4, 2001, Brussels> 1 Working Conference on Integrity and Internal Control in Information Systems <6, 2003, Lausanne> 1 World Computer Congress <17, 2002, Montréal> 1
more ... less ...
Published in...
All
Information & Computer Security 13 Industrial Management & Data Systems 11 Managerial Auditing Journal 9 IFIP 5 International Journal of Physical Distribution & Logistics Management 2 Journal of management information systems : JMIS 2 Management Decision 2 The Bottom Line 2 COVID-19 response 1 Cambridge Working Papers in Economics 1 DIAG Technical Reports 1 Dynamic games and applications : DGA 1 Electronic commerce research and applications 1 European journal of operational research : EJOR 1 Federal Reserve Bulletin 1 Global Knowledge, Memory and Communication 1 Human Resource Management International Digest 1 IEEE transactions on engineering management : EM 1 IWI Discussion Paper Series 1 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 1 Information systems management 1 International Journal of Quality Assurance in Engineering and Technology Education (IJQAETE) 1 International Journal of Risk and Contingency Management (IJRCM) 1 International Journal of Synthetic Emotions (IJSE) 1 International journal of accounting information systems 1 International journal of electronic business : IJEB 1 Journal of Business & Industrial Marketing 1 Journal of Knowledge Management 1 Journal of information & knowledge management : JIKM 1 Journal of knowledge management 1 Law and electronic commerce 1 Management Development Review 1 Manager Journal 1 Managerial Finance 1 Managerial finance 1 Online Information Review 1 Payment Cards Center Discussion Paper 1 Serie desarrollo productivo 1 SpringerBriefs in applied sciences and technology / Safety management 1 The Antidote 1
more ... less ...
Source
All
Other ZBW resources 50 USB Cologne (EcoSocSci) 45 ECONIS (ZBW) 17 BASE 10 RePEc 7 EconStor 1
Showing 101 - 110 of 130
Cover Image
Crises and revolutions in information technology: lessons learned from Y2K
Cannon, Alan R.; Woszczynski, Amy B. - In: Industrial Management & Data Systems 102 (2002) 6, pp. 318-324
In an environment in which information technology has become a critical link between and among suppliers and customers, organizations were recently threatened by potential systems failures that could have erased the gains of the past decade. Although experts predicted that Y2K could lead to...
Persistent link: https://www.econbiz.de/10014823699
Saved in:
Cover Image
B2B [B to B] and beyond : new business models built on trust
DeMaio, Harry B. - 2001
Persistent link: https://www.econbiz.de/10004683932
Saved in:
Cover Image
Auditing and security : AS/400, NT, UNIX, networks, and disaster recovery plans
Musaji, Yusufali F. - 2001
Persistent link: https://www.econbiz.de/10004731795
Saved in:
Cover Image
Consumer privacy rights: CPR and the age of the Internet
Nakra, Prema - In: Management Decision 39 (2001) 4, pp. 272-279
In recent months several high‐profile breaches of consumer privacy have raised public concern about data gathering on the Web. The issue of privacy has led to lawsuits by consumers and consumer advocacy groups and investigations by government regulations. As businesses wrestle with the...
Persistent link: https://www.econbiz.de/10014934939
Saved in:
Cover Image
Integrity and internal control in information systems : strategic views on the need for control ; IFIP TC11 WG11.5 Third Working Conference on Integrity and Internal Control in Information Systems, November 18-19, 1999, Amsterdam, The Netherlands
Van Biene-Hershey, Margaret E. (contributor) - 2000
Persistent link: https://www.econbiz.de/10004846694
Saved in:
Cover Image
Cyber attacks against supply chain management systems: a short note
Warren, Matthew; Hutchinson, William - In: International Journal of Physical Distribution & … 30 (2000) 7/8, pp. 710-716
Supply chain management (SCM) is increasingly dependent on electronic systems. At the same time, the vulnerability of these systems to attack from malicious individuals or groups is growing. This paper examines some of the forms such attacks can take, and their relevance to the supply function....
Persistent link: https://www.econbiz.de/10014793405
Saved in:
Cover Image
Ever‐widening ripples
Kippenberger, T - In: The Antidote 4 (1999) 2, pp. 14-16
Discloses that one of the first organizations to hit the Y2K problem in the UK was the DVLC license authority, which discovered, in 1970, that its 30 expiry dates, over the year 2000 threshold, would not be accepted ‐ other organizations also camp up against this in the UK; in the USA the...
Persistent link: https://www.econbiz.de/10015018156
Saved in:
Cover Image
Cyberspace security management
Chou, David C.; Yen, David C.; Lin, Binshan; Hong‐Lam … - In: Industrial Management & Data Systems 99 (1999) 8, pp. 353-361
Through the tremendous growth of Internet users during the last few years, organizations now realize the potential market of the information highway. However, these organizations now face the problem of Internet security. The open environment of the Internet contributes greatly to its success,...
Persistent link: https://www.econbiz.de/10014824808
Saved in:
Cover Image
Sound practice guidance on information security issued December 8, 1997
In: Federal Reserve Bulletin (1998) Feb, pp. 96-96
Persistent link: https://www.econbiz.de/10005386879
Saved in:
Cover Image
Computer viruses: how companies can protect their systems
Hubbard, Joan C.; Forcht, Karen A. - In: Industrial Management & Data Systems 98 (1998) 1, pp. 12-16
A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads itself to still other programs. Today’s society has seen a dramatic increase in the use of computers; as a result, businesses...
Persistent link: https://www.econbiz.de/10014824733
Saved in:
  • First
  • Prev
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...