EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer security"
Narrow search

Narrow search

Year of publication
Subject
All
Computer security 94 Security measures 24 Computersicherheit 20 Data protection 19 Data security 18 Computer networks 13 Computer Security 12 Datensicherheit 12 Electronic commerce 12 Information technology 12 computer security 12 Crime 10 Informationstechnik 9 Management 9 Unternehmen 9 Datenschutz 8 Electronic Commerce 8 Risk management 8 Access control 6 Business enterprises 6 Congresses 6 Information security 6 Risikomanagement 6 Computer privacy 5 Computerized method 5 Computerunterstützung 5 Datensicherung 5 Hacking 5 Information resources management 5 Internet 5 Security 5 information security 5 Business 4 Computer security. 4 Computer users 4 Data processing 4 Kongress 4 Rechnernetz 4 USA 4 Computer fraud 3
more ... less ...
Online availability
All
Undetermined 60 Free 19 CC license 1
Type of publication
All
Article 71 Book / Working Paper 54 Other 5
Type of publication (narrower categories)
All
research-article 28 Article in journal 14 Aufsatz in Zeitschrift 14 Bibliographie 13 review-article 7 Konferenzschrift 6 Congress Report 3 conceptual-paper 3 review 3 non-article 2 technical-paper 2 viewpoint 2 Article 1 Aufsatzsammlung 1 Conference paper 1 Graue Literatur 1 Konferenzbeitrag 1 Non-commercial literature 1 Thesis 1
more ... less ...
Language
All
English 120 Undetermined 9 Lithuanian 1
Author
All
Arsenovski, Sime 2 Bagchi, Aditya 2 Dandapani, Krishnan 2 Forcht, Karen A. 2 Gertz, Michael 2 Herold, Rebecca 2 Landoll, Douglas J. 2 Mattord, Herbert J. 2 Mazumdar, Chandan 2 Mitrevski, Pece 2 Ortmeier, P. J. 2 Pal, Pinakpani 2 Quigley, Marian 2 Roufaiel, Nazik S. 2 Sekulovska-Jovkovska, Ana 2 Sommestad, Teodor 2 Whitman, Michael E. 2 Abman, Ryan 1 Ahmim, Ahmed 1 Alvarez, Gonzalo 1 Amara Korba, Abdelaziz 1 Amoroso, Edward G. 1 Anastasi, Joe 1 Andress, Jason 1 Ashenden, Debi 1 Athavale, Nachiket 1 Avgerinos, Thanassis 1 Axelrod, C. Warren 1 Ball, James 1 Barde, S. S. 1 Bareiša, Eduardas 1 Barton, Laurence 1 Baskerville, Richard 1 Beckett, Charlie 1 Biddle, Robert 1 Bieder, Corinne 1 Birath, Marcus 1 Bisma, Bashir 1 Biswanath Dutta, Dr. 1 Blakely, Benjamin 1
more ... less ...
Institution
All
Blekinge Institute of Tecnology, Sweden 1 Department of Economics, University of California-Santa Barbara (UCSB) 1 Dipartimento di Ingegneria Informatica, Automatica e Gestionale "Antonio Ruberti", Facoltà di Ingegneria dell'Informazione Informatica e Statistica 1 Faculty of Economics, University of Cambridge 1 Federal Reserve Bank of Philadelphia 1 Institut für Wirtschaftsinformatik, Wirtschaftswissenschaftliche Fakultät 1 Institute of Directors 1 International Federation for Information Processing / Technical Committee Security and Protection in Information Processing Systems 1 International Federation for Information Processing / Working Group Integrity and Internal Control 1 Kaunas University of Technology 1 Working Conference on Integrity and Internal Control in Information Systems (IICIS) <5, 2002, Bonn> 1 Working Conference on Integrity and Internal Control in Information Systems <4, 2001, Brussels> 1 Working Conference on Integrity and Internal Control in Information Systems <6, 2003, Lausanne> 1 World Computer Congress <17, 2002, Montréal> 1
more ... less ...
Published in...
All
Information & Computer Security 13 Industrial Management & Data Systems 11 Managerial Auditing Journal 9 IFIP 5 International Journal of Physical Distribution & Logistics Management 2 Journal of management information systems : JMIS 2 Management Decision 2 The Bottom Line 2 COVID-19 response 1 Cambridge Working Papers in Economics 1 DIAG Technical Reports 1 Dynamic games and applications : DGA 1 Electronic commerce research and applications 1 European journal of operational research : EJOR 1 Federal Reserve Bulletin 1 Global Knowledge, Memory and Communication 1 Human Resource Management International Digest 1 IEEE transactions on engineering management : EM 1 IWI Discussion Paper Series 1 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 1 Information systems management 1 International Journal of Quality Assurance in Engineering and Technology Education (IJQAETE) 1 International Journal of Risk and Contingency Management (IJRCM) 1 International Journal of Synthetic Emotions (IJSE) 1 International journal of accounting information systems 1 International journal of electronic business : IJEB 1 Journal of Business & Industrial Marketing 1 Journal of Knowledge Management 1 Journal of information & knowledge management : JIKM 1 Journal of knowledge management 1 Law and electronic commerce 1 Management Development Review 1 Manager Journal 1 Managerial Finance 1 Managerial finance 1 Online Information Review 1 Payment Cards Center Discussion Paper 1 Serie desarrollo productivo 1 SpringerBriefs in applied sciences and technology / Safety management 1 The Antidote 1
more ... less ...
Source
All
Other ZBW resources 50 USB Cologne (EcoSocSci) 45 ECONIS (ZBW) 17 BASE 10 RePEc 7 EconStor 1
Showing 41 - 50 of 130
Cover Image
Computer Network Security and Cyber Ethics (4th ed.)
In: Online Information Review 39 (2015) 2, pp. 271-271
Persistent link: https://www.econbiz.de/10014966454
Saved in:
Cover Image
Resolving authorization conflicts by ontology views for controlled access to a digital library
Dasgupta, Subhasish; Pal, Pinakpani; Mazumdar, Chandan; … - In: Journal of knowledge management 19 (2015) 1, pp. 45-59
Persistent link: https://www.econbiz.de/10011296912
Saved in:
Cover Image
Estimating the contextual risk of data breach : an empirical approach
Sen, Ravi; Borle, Sharad - In: Journal of management information systems : JMIS 32 (2015) 2, pp. 314-341
Persistent link: https://www.econbiz.de/10011409457
Saved in:
Cover Image
Programinės įrangos ir duomenų saugumas: grėsmės ir jų valdymas, šifravimo algoritmai
Valinčius, Tomas - 2008
Darbo tikslas – išnagrinėti būdus darbo kompiuteriu keliamoms grėsmėms valdyti: (1) Aptarti, pažinti grėsmes kompiuterinių sistemų saugumui; (2) Suprasti, kas sukelia šias grėsmes, nagrinėjant programinės įrangos kūrimo procesą; (3) Nustatyti būdus, kurie gali sumažinti ar...
Persistent link: https://www.econbiz.de/10009478729
Saved in:
Cover Image
OpenLabs Security Laboratory - The Online Security Experiment Platform
Johan Zackrisson; Charlie Svahnberg - Blekinge Institute of Tecnology, Sweden; Blekinge … - 2008
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with hostile software, this is even more important as the experiment can affect the environment in adverse ways. In a...
Persistent link: https://www.econbiz.de/10009451265
Saved in:
Cover Image
Conducting an information security audit
Popescu, Gheorghe; Popescu, Adriana; Popescu, Cristina … - In: Manager Journal 7 (2008) 1, pp. 76-82
entities operations. So, computer security has become much more important as all levels of government and entities utilize … disclosure of sensitive information. Obviously, uses of computer security become essential in minimizing the risk of malicious …
Persistent link: https://www.econbiz.de/10011146211
Saved in:
Cover Image
The new school of information security
Shostack, Adam; Stewart, Andrew - 2008
Persistent link: https://www.econbiz.de/10004911102
Saved in:
Cover Image
Review of identity and access management systems
Jahankhani, Hamid; Talaimojeh, Soheil - 2007
Identity and access management is rapidly becoming the top business issue asorganizations look to increase security, reduce risk and decrease operational costs. In order toevaluate adequately the emerging maze of technologies brought forward by variousvendors it is necessary to critically...
Persistent link: https://www.econbiz.de/10009463253
Saved in:
Cover Image
Analysing Security Requirements of Information Systems using Tropos
Mouratidis, Haralambos - 2006
Security is an important issue when developing complex information systems, however very little work has been done in integrating security concerns during the analysis of information systems. Current methodologies fail to adequately integrate security and systems engineering, basically because...
Persistent link: https://www.econbiz.de/10009463261
Saved in:
Cover Image
Information security, data breaches, and protecting cardholder information: facing up to the challenges
McGrath, James C.; Kjos, Ann - Federal Reserve Bank of Philadelphia - 2006
On September 13 and 14, 2006, the Payment Cards Center of the Federal Reserve Bank of Philadelphia and the Electronic Funds Transfer Association (EFTA) hosted a conference entitled “Information Security, Data Breaches, and Protecting Cardholder Information: Facing Up to the Challenges.” The...
Persistent link: https://www.econbiz.de/10005728945
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...