EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer Security"
Narrow search

Narrow search

Year of publication
Subject
All
Computer security 94 Security measures 24 Computersicherheit 20 Data protection 19 Data security 18 Computer networks 13 Computer Security 12 Datensicherheit 12 Electronic commerce 12 Information technology 12 computer security 12 Crime 10 Informationstechnik 9 Management 9 Unternehmen 9 Datenschutz 8 Electronic Commerce 8 Risk management 8 Access control 6 Business enterprises 6 Congresses 6 Information security 6 Risikomanagement 6 Computer privacy 5 Computerized method 5 Computerunterstützung 5 Datensicherung 5 Hacking 5 Information resources management 5 Internet 5 Security 5 information security 5 Business 4 Computer security. 4 Computer users 4 Data processing 4 Kongress 4 Rechnernetz 4 USA 4 Computer fraud 3
more ... less ...
Online availability
All
Undetermined 60 Free 19 CC license 1
Type of publication
All
Article 71 Book / Working Paper 54 Other 5
Type of publication (narrower categories)
All
research-article 28 Article in journal 14 Aufsatz in Zeitschrift 14 Bibliographie 13 review-article 7 Konferenzschrift 6 Congress Report 3 conceptual-paper 3 review 3 non-article 2 technical-paper 2 viewpoint 2 Article 1 Aufsatzsammlung 1 Conference paper 1 Graue Literatur 1 Konferenzbeitrag 1 Non-commercial literature 1 Thesis 1
more ... less ...
Language
All
English 120 Undetermined 9 Lithuanian 1
Author
All
Arsenovski, Sime 2 Bagchi, Aditya 2 Dandapani, Krishnan 2 Forcht, Karen A. 2 Gertz, Michael 2 Herold, Rebecca 2 Landoll, Douglas J. 2 Mattord, Herbert J. 2 Mazumdar, Chandan 2 Mitrevski, Pece 2 Ortmeier, P. J. 2 Pal, Pinakpani 2 Quigley, Marian 2 Roufaiel, Nazik S. 2 Sekulovska-Jovkovska, Ana 2 Sommestad, Teodor 2 Whitman, Michael E. 2 Abman, Ryan 1 Ahmim, Ahmed 1 Alvarez, Gonzalo 1 Amara Korba, Abdelaziz 1 Amoroso, Edward G. 1 Anastasi, Joe 1 Andress, Jason 1 Ashenden, Debi 1 Athavale, Nachiket 1 Avgerinos, Thanassis 1 Axelrod, C. Warren 1 Ball, James 1 Barde, S. S. 1 Bareiša, Eduardas 1 Barton, Laurence 1 Baskerville, Richard 1 Beckett, Charlie 1 Biddle, Robert 1 Bieder, Corinne 1 Birath, Marcus 1 Bisma, Bashir 1 Biswanath Dutta, Dr. 1 Blakely, Benjamin 1
more ... less ...
Institution
All
Blekinge Institute of Tecnology, Sweden 1 Department of Economics, University of California-Santa Barbara (UCSB) 1 Dipartimento di Ingegneria Informatica, Automatica e Gestionale "Antonio Ruberti", Facoltà di Ingegneria dell'Informazione Informatica e Statistica 1 Faculty of Economics, University of Cambridge 1 Federal Reserve Bank of Philadelphia 1 Institut für Wirtschaftsinformatik, Wirtschaftswissenschaftliche Fakultät 1 Institute of Directors 1 International Federation for Information Processing / Technical Committee Security and Protection in Information Processing Systems 1 International Federation for Information Processing / Working Group Integrity and Internal Control 1 Kaunas University of Technology 1 Working Conference on Integrity and Internal Control in Information Systems (IICIS) <5, 2002, Bonn> 1 Working Conference on Integrity and Internal Control in Information Systems <4, 2001, Brussels> 1 Working Conference on Integrity and Internal Control in Information Systems <6, 2003, Lausanne> 1 World Computer Congress <17, 2002, Montréal> 1
more ... less ...
Published in...
All
Information & Computer Security 13 Industrial Management & Data Systems 11 Managerial Auditing Journal 9 IFIP 5 International Journal of Physical Distribution & Logistics Management 2 Journal of management information systems : JMIS 2 Management Decision 2 The Bottom Line 2 COVID-19 response 1 Cambridge Working Papers in Economics 1 DIAG Technical Reports 1 Dynamic games and applications : DGA 1 Electronic commerce research and applications 1 European journal of operational research : EJOR 1 Federal Reserve Bulletin 1 Global Knowledge, Memory and Communication 1 Human Resource Management International Digest 1 IEEE transactions on engineering management : EM 1 IWI Discussion Paper Series 1 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 1 Information systems management 1 International Journal of Quality Assurance in Engineering and Technology Education (IJQAETE) 1 International Journal of Risk and Contingency Management (IJRCM) 1 International Journal of Synthetic Emotions (IJSE) 1 International journal of accounting information systems 1 International journal of electronic business : IJEB 1 Journal of Business & Industrial Marketing 1 Journal of Knowledge Management 1 Journal of information & knowledge management : JIKM 1 Journal of knowledge management 1 Law and electronic commerce 1 Management Development Review 1 Manager Journal 1 Managerial Finance 1 Managerial finance 1 Online Information Review 1 Payment Cards Center Discussion Paper 1 Serie desarrollo productivo 1 SpringerBriefs in applied sciences and technology / Safety management 1 The Antidote 1
more ... less ...
Source
All
Other ZBW resources 50 USB Cologne (EcoSocSci) 45 ECONIS (ZBW) 17 BASE 10 RePEc 7 EconStor 1
Showing 121 - 130 of 130
Cover Image
Collaring the Computer Criminal: An Analysis of Information Security for Network Computing
Tang, Michael T. - In: Managerial Auditing Journal 6 (1991) 3
Recent shifts from mainframes to networking technologies have given business the ability to meet challenges in the competitive markets with accurate, timely data distribution. Meanwhile, the blossoming of data communication has created the potential thorns of computer crimes. This article...
Persistent link: https://www.econbiz.de/10014929354
Saved in:
Cover Image
Computer‐related Crimes: An Educational and Professional Challenge
Roufaiel, Nazik S. - In: Managerial Auditing Journal 5 (1990) 4
Emphasis is placed on the influence of computer crimes on accounting education and training programmes. Computer‐related crimes and their definition, perpetrators, modi operandi , and methods of prevention and detection, are discussed. Recommendations are given for improving the whole delivery...
Persistent link: https://www.econbiz.de/10014929340
Saved in:
Cover Image
Countering Computer Virus Threat
Collier, Paul A.; Spaul, Barry J. - In: Managerial Auditing Journal 5 (1990) 4
Internal auditors have an important role in communicating the threat posed by the spread of computer viruses and advising on appropriate control strategies. Computer virus is defined, distinguishing between “true” viruses and other rogue software like logic bombs, Trojan horses and worms....
Persistent link: https://www.econbiz.de/10014929343
Saved in:
Cover Image
Ethics, Law and Computer Hacking
Vinten, Gerald - In: Managerial Auditing Journal 5 (1990) 4
Computer hacking is discussed sequentially with respect to: social and business ethics, fraud legislation, computer misuse legislation and computer controls. Enacting computer‐specific statutes is the approach that is increasingly popular – UK, US and Canadian responses are described. But...
Persistent link: https://www.econbiz.de/10014929347
Saved in:
Cover Image
Trustworthiness and the MS‐DOS Environment
Herweg, Ralf; Gliss, Hans - In: Managerial Auditing Journal 5 (1990) 4
The problems peculiar to use of microcomputers operating in MS‐DOS are outlined. These include outside threats as well as inherent flaws in the system. Protective measures are discussed in relation to typical threats, and basic methods for making microcomputers secure are described.
Persistent link: https://www.econbiz.de/10014929767
Saved in:
Cover Image
Personal Data: The Act Begins to Bite
Tarrant, Peter - In: Industrial Management & Data Systems 90 (1990) 1, pp. 11-14
Managers responsible for personal data held on computer need to be aware of and comply with the terms of the Data Protection Act 1984. Registration and compliance with the eight data protection principles are essential requirements. The role of the Registrar in ensuring enforcement of the Act is...
Persistent link: https://www.econbiz.de/10014824490
Saved in:
Cover Image
Computer Crime
In: Industrial Management & Data Systems 87 (1987) 7/8, pp. 28-31
The Computer Crime Casebook published by BIS Applied Systems Limited is examined. Computer crime is growing but there is an increasing armoury of security measures to combat if Three case studies are given. Methods of breaching the security of personal computers are examined with their possible...
Persistent link: https://www.econbiz.de/10014825199
Saved in:
Cover Image
The Automated Office and Computer Crime: A Preliminary Assessment
Blatchford, Clive - In: Industrial Management & Data Systems 86 (1986) 1/2, pp. 14-19
The opportunity for computer‐related crime in the automated office/distributed environment is greater than in the larger, centrally driven data‐processing facilities, where access to equipment is usually easier and there is no hierarchy of physical controls as in a separate computer data...
Persistent link: https://www.econbiz.de/10014825143
Saved in:
Cover Image
The Management Role in Protecting Corporate Data Resources
Carter, Roy - In: Industrial Management & Data Systems 86 (1986) 5/6, pp. 16-17
, acquisition and evolution. The Data Protection Act has implications for all companies and any failure of computer security may …
Persistent link: https://www.econbiz.de/10014825155
Saved in:
Cover Image
Multi‐user Systems: Network or Central Processor?
Ramsden, Steven - In: Industrial Management & Data Systems 86 (1986) 7/8, pp. 16-17
Multi‐user systems fall into two main categories — shared single processors and networked microcomputers. Both have significantly different features but one they should have in common is the ability to provide satisfactory record layout safeguards. Practical experience has shown that a...
Persistent link: https://www.econbiz.de/10014825158
Saved in:
  • First
  • Prev
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...