EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"cloud malware attacks"
Narrow search

Narrow search

Year of publication
Subject
All
Cloud computing 3 Business ethics 2 Cloud Computing 2 Cloud business protection 2 Cloud ethics 2 Cloud malware attacks 2 Comparative method 2 Data security 2 Datensicherheit 2 Network security 2 Technology management 2 Vulnerability categories 2 Work ethic 2 Work motivation 2 Business security 1 IT service provider 1 IT-Dienstleister 1 Unternehmensethik 1 business security 1 cloud computing 1 cloud ethics 1 cloud malware attacks 1 cloud services 1 cloud vulnerabilities 1
more ... less ...
Online availability
All
Undetermined 1
Type of publication
All
Article 3
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2 research-article 1
Language
All
English 3
Author
All
Kouatli, Issam 2 Koutli, Issam 1
Published in...
All
International journal of trade and global markets 1 Journal of Management History 1 Journal of management history : JMH 1
Source
All
ECONIS (ZBW) 2 Other ZBW resources 1
Showing 1 - 3 of 3
Cover Image
Global business vulnerabilities in cloud computing services
Koutli, Issam - In: International journal of trade and global markets 9 (2016) 1, pp. 45-59
Persistent link: https://www.econbiz.de/10011547856
Saved in:
Cover Image
A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing
Kouatli, Issam - In: Journal of Management History 20 (2014) 4, pp. 409-433
Purpose – The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility...
Persistent link: https://www.econbiz.de/10014885014
Saved in:
Cover Image
A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing
Kouatli, Issam - In: Journal of management history : JMH 20 (2014) 4, pp. 409-433
Persistent link: https://www.econbiz.de/10010424708
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...