EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer security"
Narrow search

Narrow search

Year of publication
Subject
All
Computer security 94 Security measures 24 Computersicherheit 20 Data protection 19 Data security 18 Computer networks 13 Computer Security 12 Datensicherheit 12 Electronic commerce 12 Information technology 12 computer security 12 Crime 10 Informationstechnik 9 Management 9 Unternehmen 9 Datenschutz 8 Electronic Commerce 8 Risk management 8 Access control 6 Business enterprises 6 Congresses 6 Information security 6 Risikomanagement 6 Computer privacy 5 Computerized method 5 Computerunterstützung 5 Datensicherung 5 Hacking 5 Information resources management 5 Internet 5 Security 5 information security 5 Business 4 Computer security. 4 Computer users 4 Data processing 4 Kongress 4 Rechnernetz 4 USA 4 Computer fraud 3
more ... less ...
Online availability
All
Undetermined 60 Free 19 CC license 1
Type of publication
All
Article 71 Book / Working Paper 54 Other 5
Type of publication (narrower categories)
All
research-article 28 Article in journal 14 Aufsatz in Zeitschrift 14 Bibliographie 13 review-article 7 Konferenzschrift 6 Congress Report 3 conceptual-paper 3 review 3 non-article 2 technical-paper 2 viewpoint 2 Article 1 Aufsatzsammlung 1 Conference paper 1 Graue Literatur 1 Konferenzbeitrag 1 Non-commercial literature 1 Thesis 1
more ... less ...
Language
All
English 120 Undetermined 9 Lithuanian 1
Author
All
Arsenovski, Sime 2 Bagchi, Aditya 2 Dandapani, Krishnan 2 Forcht, Karen A. 2 Gertz, Michael 2 Herold, Rebecca 2 Landoll, Douglas J. 2 Mattord, Herbert J. 2 Mazumdar, Chandan 2 Mitrevski, Pece 2 Ortmeier, P. J. 2 Pal, Pinakpani 2 Quigley, Marian 2 Roufaiel, Nazik S. 2 Sekulovska-Jovkovska, Ana 2 Sommestad, Teodor 2 Whitman, Michael E. 2 Abman, Ryan 1 Ahmim, Ahmed 1 Alvarez, Gonzalo 1 Amara Korba, Abdelaziz 1 Amoroso, Edward G. 1 Anastasi, Joe 1 Andress, Jason 1 Ashenden, Debi 1 Athavale, Nachiket 1 Avgerinos, Thanassis 1 Axelrod, C. Warren 1 Ball, James 1 Barde, S. S. 1 Bareiša, Eduardas 1 Barton, Laurence 1 Baskerville, Richard 1 Beckett, Charlie 1 Biddle, Robert 1 Bieder, Corinne 1 Birath, Marcus 1 Bisma, Bashir 1 Biswanath Dutta, Dr. 1 Blakely, Benjamin 1
more ... less ...
Institution
All
Blekinge Institute of Tecnology, Sweden 1 Department of Economics, University of California-Santa Barbara (UCSB) 1 Dipartimento di Ingegneria Informatica, Automatica e Gestionale "Antonio Ruberti", Facoltà di Ingegneria dell'Informazione Informatica e Statistica 1 Faculty of Economics, University of Cambridge 1 Federal Reserve Bank of Philadelphia 1 Institut für Wirtschaftsinformatik, Wirtschaftswissenschaftliche Fakultät 1 Institute of Directors 1 International Federation for Information Processing / Technical Committee Security and Protection in Information Processing Systems 1 International Federation for Information Processing / Working Group Integrity and Internal Control 1 Kaunas University of Technology 1 Working Conference on Integrity and Internal Control in Information Systems (IICIS) <5, 2002, Bonn> 1 Working Conference on Integrity and Internal Control in Information Systems <4, 2001, Brussels> 1 Working Conference on Integrity and Internal Control in Information Systems <6, 2003, Lausanne> 1 World Computer Congress <17, 2002, Montréal> 1
more ... less ...
Published in...
All
Information & Computer Security 13 Industrial Management & Data Systems 11 Managerial Auditing Journal 9 IFIP 5 International Journal of Physical Distribution & Logistics Management 2 Journal of management information systems : JMIS 2 Management Decision 2 The Bottom Line 2 COVID-19 response 1 Cambridge Working Papers in Economics 1 DIAG Technical Reports 1 Dynamic games and applications : DGA 1 Electronic commerce research and applications 1 European journal of operational research : EJOR 1 Federal Reserve Bulletin 1 Global Knowledge, Memory and Communication 1 Human Resource Management International Digest 1 IEEE transactions on engineering management : EM 1 IWI Discussion Paper Series 1 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 1 Information systems management 1 International Journal of Quality Assurance in Engineering and Technology Education (IJQAETE) 1 International Journal of Risk and Contingency Management (IJRCM) 1 International Journal of Synthetic Emotions (IJSE) 1 International journal of accounting information systems 1 International journal of electronic business : IJEB 1 Journal of Business & Industrial Marketing 1 Journal of Knowledge Management 1 Journal of information & knowledge management : JIKM 1 Journal of knowledge management 1 Law and electronic commerce 1 Management Development Review 1 Manager Journal 1 Managerial Finance 1 Managerial finance 1 Online Information Review 1 Payment Cards Center Discussion Paper 1 Serie desarrollo productivo 1 SpringerBriefs in applied sciences and technology / Safety management 1 The Antidote 1
more ... less ...
Source
All
Other ZBW resources 50 USB Cologne (EcoSocSci) 45 ECONIS (ZBW) 17 BASE 10 RePEc 7 EconStor 1
Showing 111 - 120 of 130
Cover Image
Can computer security really make a difference?
Hannaford, Craig S. - In: Managerial Auditing Journal 10 (1995) 5, pp. 10-15
Computer crime and the abuse of computer and telecommunications systems have become a serious threat to the integrity of information systems. The Organization for Economic Co‐operation and Development has addressed this problem as has Interpol. National governments such as Canada have enacted...
Persistent link: https://www.econbiz.de/10014929478
Saved in:
Cover Image
Inadequate security encourages the thief
Mills, Alan - In: Industrial Management & Data Systems 95 (1995) 2, pp. 3-5
broadly similar conclusions. Many organizations do not have basic computer security procedures in place. Simple matters such … 1994. This shows that, while computer fraud and abuse is a growth industry, many organizations do not seem to take computer … security seriously. Also considers a survey conducted by an undergraduate of Leeds Metropolitan University. This reached …
Persistent link: https://www.econbiz.de/10014824622
Saved in:
Cover Image
White‐collar Computer Crimes : A Threat to Auditors and Organization
Roufaiel, Nazik S.; Dorweiler, Vernon - In: Managerial Auditing Journal 9 (1994) 3, pp. 3-12
Describes the auditor′s responsibility in the expanding arena of computer‐related criminal activity within the organization and the organization′s liability for criminal activity. Formulates professional standards of conduct from these definitions of responsibility, both for the auditor...
Persistent link: https://www.econbiz.de/10014929429
Saved in:
Cover Image
New Technologies and Future Trends in Computer Security
Forcht, Karen A.; Pierson, Joan - In: Industrial Management & Data Systems 94 (1994) 8, pp. 30-36
, sale of contaminated software, and why today there is a greater need for computer security. Refers to the Berne Convention …
Persistent link: https://www.econbiz.de/10014824607
Saved in:
Cover Image
Using Experts for Detecting and Litigating Computer Crime
Rushinek, Avi; Rushinek, Sara F. - In: Managerial Auditing Journal 8 (1993) 7
Whilst the development of a crime‐proof computer operating system seems very unlikely, more could be done to deter, discover, litigate and punish computer criminals. Because of the limited sophistication of security devices, experts shy away from them, while managers and attorneys (unaware of...
Persistent link: https://www.econbiz.de/10014929414
Saved in:
Cover Image
Computer Security in Large Corporations: Attitudes and Practices of CEOs
Wright, Phillip C. - In: Management Decision 31 (1993) 7
Reports a study which investigated the attitudes, knowledge and practices of CEOs in the computer security area. It was …
Persistent link: https://www.econbiz.de/10014933583
Saved in:
Cover Image
PC‐security Evaluation
Gollmann, Dieter; Wichmann, Peer - In: Managerial Auditing Journal 7 (1992) 5
Reports on the evaluation of a set of commercial PC‐security products. Argues how, and why, this analysis differs from the kind of security evaluation described in the IT security evaluation criteria published recently by some national security agencies. Draws on an in‐depth examination down...
Persistent link: https://www.econbiz.de/10014929393
Saved in:
Cover Image
HOW SECURE IS YOUR IT?
Garvin, Karen - In: Management Development Review 5 (1992) 2
A recent survey has found that computing and IT are essential for effective management, yet costly security breaches, losses and theft are widespread. Urges corporate users to implement contingency plans in the large number of cases where none at present exists.
Persistent link: https://www.econbiz.de/10014936689
Saved in:
Cover Image
Violations of Intellectual Property Rights: An Examination of Pacific Region Abuses and Responses
Barton, Laurence - In: International Journal of Physical Distribution & … 22 (1992) 6, pp. 20-23
The systematic stealing of patents, copyright ownership and industrial secrets remain a complex and costly dilemma for corporate interests worldwide. Analyses the role which organizations in the Pacific Region have played, both in the cause and control of these abuses. Western manufacturers,...
Persistent link: https://www.econbiz.de/10014794304
Saved in:
Cover Image
Software Management and Accountability
Williams, Len - In: Industrial Management & Data Systems 92 (1992) 4, pp. 13-15
Software is protected by copyright law which means that the owner of the copyright holds exclusive rights to the reproduction and distribution of his or her work. How therefore does the Federation Against Software Theft (FAST) help, advise and control companies on use and misuse of software?
Persistent link: https://www.econbiz.de/10014824540
Saved in:
  • First
  • Prev
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...