//--> //--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"User access control"
Narrow search
Narrow search
Year of publication
From:
To:
Subject
All
User access control
109
Zutrittskontrolle
109
Data security
57
Datensicherheit
57
IT crime
22
IT-Kriminalität
22
Theorie
18
Theory
18
Zugriffskontrolle
17
Biometrics
15
Biometrie
15
Datenschutz
13
Data protection
12
Betriebliches Informationssystem
10
USA
9
United States
9
Computer network
8
Computernetz
8
E-commerce
8
Electronic Commerce
8
Deutschland
7
Electronic Banking
7
Electronic banking
7
Germany
7
Identitätsverwaltung
7
Information management
7
Informationsmanagement
7
Internet
7
Datensicherung
6
Authentifikation
5
Business intelligence system
5
Computersicherheit
5
Social costs
5
Soziale Kosten
5
Airport
4
Database
4
Datenbank
4
Digitale Dienste
4
Economics of crime
4
Flughafen
4
more ...
less ...
Online availability
All
Free
14
Undetermined
12
Type of publication
All
Article
86
Book / Working Paper
39
Type of publication (narrower categories)
All
Article in journal
44
Aufsatz in Zeitschrift
44
Aufsatz im Buch
42
Book section
42
Graue Literatur
10
Non-commercial literature
10
Arbeitspapier
8
Hochschulschrift
8
Working Paper
8
Thesis
6
Case study
3
Collection of articles of several authors
3
Fallstudie
3
Sammelwerk
3
Aufsatzsammlung
2
Dissertation u.a. Prüfungsschriften
2
Forschungsbericht
2
Conference paper
1
Conference proceedings
1
Konferenzbeitrag
1
Konferenzschrift
1
more ...
less ...
Language
All
English
97
German
26
Undetermined
2
Author
All
Bellou, Andriana
3
Roberds, William
3
Bhatt, Rachana
2
Eckert, Claudia
2
Fuchs, Ludwig
2
Li, Yan
2
Royer, Denis
2
Schreft, Stacey L.
2
Sowa, Aleksandra
2
Stepien, Bernard
2
Sun, Lili
2
Wang, Hua
2
Abdullah, Matin Saad
1
Adi, Kamel
1
Adl, Rosa Karimi
1
Agarwal, Ratish
1
Ahmed, Waseem
1
Akar, Gulsah
1
Al-Harby, Fahad
1
Ansari, Zahid A.
1
Antonakopoulou, Anna
1
Arshad, Junaid
1
Baldimtsi, F.
1
Bansal, Nitin
1
Bar-Josef, Noa
1
Barker, Ken
1
Bartmann, Dieter
1
Barz, Christiane
1
Baumgärtner, Frank
1
Bayliss, Christopher
1
Bertino, Elisa
1
Bhatt, Rachana R.
1
Birch, David G. W.
1
Bistarelli, Stefano
1
Blake, Ian F.
1
Bouzida, Yacine
1
Bowers, Dan M.
1
Božović, Vladimir
1
Broxis, John
1
Burnett, Royce D.
1
more ...
less ...
Institution
All
ICETE <4, 2007, Barcelona>
1
Verlag Dr. Kovač
1
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
10
E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings
3
HMD : Praxis der Wirtschaftsinformatik
3
Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems
3
Journal of organizational computing and electronic commerce
3
Berichte aus der Wirtschaftsinformatik
2
Decision support systems : DSS ; the international journal
2
Digital identity management : perspectives on the technological, business and social implications
2
Discussion paper series / IZA
2
Diskussionsbeiträge / Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste
2
E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers
2
Information diffusion management and knowledge sharing ; volume 1
2
International journal of business information systems : IJBIS
2
Journal of air transport management
2
Journal of internet commerce
2
Journal of payments strategy & systems
2
SpringerLink / Bücher
2
Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten
2
Wissen - Märkte - Geistiges Eigentum
2
Advances in multimedia and interactive technologies
1
American economic journal
1
Banking and information technology : BIT ; a strategic report for top management
1
Business analytics and cyber security management in organizations
1
Business intelligence : methods and applications ; essays in honor of Prof. Dr. Hans-J. Lenz
1
Communications in computer and information science
1
Contemporary economic policy : a journal of Western Economic Association International
1
De Gruyter Oldenbourg Studium
1
Diskussionsbeiträge zu Wirtschaftsinformatik und Operations Research
1
ERP-Management : Auswahl, Einführung und Betrieb von ERP-Systemen
1
Edition <kes>
1
Electronic markets : the international journal on networked business
1
Emerging methods in predictive analytics : risk management and decision-making
1
Enterprise applications and services in the finance industry : 3. international workshop, FinanceCom 2007, Montreal, Canada, December 8, 2007 ; revised papers
1
European journal of operational research : EJOR
1
FAZIT-Schriftenreihe : Forschung, Informations- und Medientechnologien in Baden-Württemberg
1
Federal Reserve Bank of Atlanta Working Paper
1
Federal Reserve Bank of Philadelphia - Payment Cards Center Discussion Paper
1
Finance India : the quarterly journal of Indian Institute of Finance
1
Finanzierung, Leasing, Factoring : FLF
1
IEEE transactions on engineering management : EM
1
more ...
less ...
Source
All
ECONIS (ZBW)
119
USB Cologne (EcoSocSci)
6
Showing
51
-
100
of
125
Sort
Relevance
Date (newest first)
Date (oldest first)
51
Mit dem E-Perso in die Wolke
Reisner, Stefan
- In:
Wirtschaftsinformatik & Management : Zeitschrift für …
3
(
2011
)
3
,
pp. 68-70
Persistent link: https://www.econbiz.de/10009158830
Saved in:
52
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher
;
Sinnott, Richard O.
;
Jie, Wei
; …
- In:
E-technologies: transformation in a connected world : …
,
(pp. 211-226)
.
2011
Persistent link: https://www.econbiz.de/10009012913
Saved in:
53
A systematic approach to web application penetration testing using TTCN-3
Stepien, Bernard
;
Xiong, Pulei
;
Peyton, Liam
- In:
E-technologies: transformation in a connected world : …
,
(pp. 1-16)
.
2011
Persistent link: https://www.econbiz.de/10009012927
Saved in:
54
Access control method with XML databases
Sun, Lili
;
Li, Yan
;
Wang, Hua
- In:
Information systems and new applications in the service …
,
(pp. 227-239)
.
2011
Persistent link: https://www.econbiz.de/10009124082
Saved in:
55
Integrating business process modelling and ERP role engineering
Panayiotou, Nikolaos A.
;
Gayialis, Sotiris P.
; …
- In:
International journal of business information systems : …
8
(
2011
)
1
,
pp. 66-86
Persistent link: https://www.econbiz.de/10009270848
Saved in:
56
Sicherheit für Banken in einer vernetzen Welt
Martini, Ullrich
- In:
Web 2.0 und soziale Netzwerke - Risiko oder …
,
(pp. 413-432)
.
2011
Persistent link: https://www.econbiz.de/10009389939
Saved in:
57
Sicherheitsstrategien für das Online-Angebot von Banken
Kraus, Hans-Peter
- In:
Web 2.0 und soziale Netzwerke - Risiko oder …
,
(pp. 389-412)
.
2011
Persistent link: https://www.econbiz.de/10009389949
Saved in:
58
Semantic mapping for access control model
Zhao, Yi
;
Halang, Wolfgang A.
- In:
Innovations in SMEs and conducting e-business : …
,
(pp. 247-262)
.
2011
Persistent link: https://www.econbiz.de/10009405587
Saved in:
59
Adoption of biometric authentication systems : implications for research and practice in the deployment of end-user security systems
Laux, Dawn
;
Luse, Andy
;
Mennecke, Brian
;
Townsend, …
- In:
Journal of organizational computing and electronic commerce
21
(
2011
)
3
,
pp. 221-245
Persistent link: https://www.econbiz.de/10009317452
Saved in:
60
Automatic editing rights management in Wikipedia
Wöhner, Thomas
;
Köhler, Sebastian
;
Peters, Ralf
-
2011
Persistent link: https://www.econbiz.de/10009240935
Saved in:
61
A looking-out portal (LOP) approach to enhance qualitative aspects of bandwidth utilisation in academic networks
Ahmed, Waseem
;
Ansari, Zahid A.
;
Herrmann, Johannes U.
; …
- In:
International journal of networking and virtual …
9
(
2011
)
4
,
pp. 317-330
Persistent link: https://www.econbiz.de/10009409467
Saved in:
62
Zugriffskontrolle in Geschäftsprozessen : Ein modellgetriebener Ansatz
Klarl, Heiko
-
2011
Persistent link: https://www.econbiz.de/10009601370
Saved in:
63
The role of access control in risk management
Hardy, Keith
- In:
Managing business risk : a practical guide to …
,
(pp. 215-219)
.
2010
Persistent link: https://www.econbiz.de/10003947035
Saved in:
64
Trust-based usage control in collaborative environment
Yang, Li
;
Phuong, Chang
;
Novobilski, Andy
;
Ege, Raimund K.
-
2010
Persistent link: https://www.econbiz.de/10003977700
Saved in:
65
Governance Risk Compliance im SAP-Umfeld der Banken
Petermann, Sven
;
Sowa, Aleksandra
- In:
HMD : Praxis der Wirtschaftsinformatik
47
(
2010
)
272
,
pp. 91-99
Persistent link: https://www.econbiz.de/10003956223
Saved in:
66
Das Electronic Banking mit dem neuen Personalausweis (nPA) : Authentifikation und elektronische Signatur
Wunderlich, Torsten
- In:
Finanzierung, Leasing, Factoring : FLF
57
(
2010
)
3
,
pp. 109-112
Persistent link: https://www.econbiz.de/10003960493
Saved in:
67
Managing information access in data-rich enterprises with escalation and incentives
Zhao, Xia
;
Johnson, M. Eric
- In:
International journal of electronic commerce : IJEC
15
(
2010/11
)
1
,
pp. 79-111
Persistent link: https://www.econbiz.de/10008758846
Saved in:
68
Towards an understanding of user acceptance to use biometric authentication systems in e-commerce : using an extension of the Technology Acceptance Model
Al-Harby, Fahad
;
Qahwaji, Rami
;
Kamala, Mumtaz
- In:
International journal of e-business research : an …
6
(
2010
)
3
,
pp. 34-55
Persistent link: https://www.econbiz.de/10008649852
Saved in:
69
Rollen und Berechtigungskonzepte : Ansätze für das Identity- und Access Management im Unternehmen
Tsolkas, Alexander
;
Schmidt, Klaus
-
2010
-
1. Aufl.
Persistent link: https://www.econbiz.de/10008653470
Saved in:
70
Technische Schutzmaßnahmen und "Zugangsrechte"
Riesenhuber, Karl
- In:
Wissen - Märkte - Geistiges Eigentum
,
(pp. 141-185)
.
2010
Persistent link: https://www.econbiz.de/10003986446
Saved in:
71
Vertragliche Dispositionen über Schranken des geistigen Eigentums
Zech, Herbert
- In:
Wissen - Märkte - Geistiges Eigentum
,
(pp. 187-202)
.
2010
Persistent link: https://www.econbiz.de/10003986447
Saved in:
72
Influence of awareness and training on cyber security
McCrohan, Kevin F.
;
Engel, Kathryn
;
Harvey, James W.
- In:
Journal of internet commerce
9
(
2010
)
1
,
pp. 23-41
Persistent link: https://www.econbiz.de/10003988456
Saved in:
73
Methodology for hybrid role development
Fuchs, Ludwig
-
2010
-
1. Aufl.
Persistent link: https://www.econbiz.de/10008808521
Saved in:
74
Information security : a study on the impact and its significance on Internet filtering
Radhakrishnan, KalaiVani
;
T., Murugan
;
JayaMangalam, Vasugi
- In:
Ideas, insights and innovation on management research : …
,
(pp. 156-171)
.
2010
Persistent link: https://www.econbiz.de/10009130849
Saved in:
75
Commercial Internet filters : perils and opportunities
Chou, Chen-huei
;
Sinha, Atish P.
;
Huimin, Zhao
- In:
Decision support systems : DSS ; the international journal
48
(
2009/10
)
4
,
pp. 521-530
Persistent link: https://www.econbiz.de/10003953698
Saved in:
76
Neue Chancen im Service Management durch Sprachbiometrie
Baumgärtner, Frank
- In:
Professionelles Sales & Service Management : Vorsprung …
,
(pp. 233-258)
.
2010
Persistent link: https://www.econbiz.de/10003973413
Saved in:
77
An admission-control technique for delay reduction in proxy caching
Kaya, Cuneyd C.
;
Zhang, Guoying
;
Tan, Yong
;
Mookerjee, …
- In:
Decision support systems : DSS ; the international journal
46
(
2008/09
)
2
,
pp. 594-603
Persistent link: https://www.econbiz.de/10003813987
Saved in:
78
The bad economy : why you need more IT security now
Burnett, Royce D.
;
Freidel, Alan
;
Friedman, Mark
- In:
The journal of corporate accounting & finance
20
(
2008/09
)
5
,
pp. 41-48
Persistent link: https://www.econbiz.de/10003868998
Saved in:
79
Using usage control to access XML databases
Sun, Lili
;
Li, Yan
- In:
International journal of information systems in the …
1
(
2009
)
3
,
pp. 32-44
Persistent link: https://www.econbiz.de/10003872441
Saved in:
80
A non-technical user-oriented display notation for XACML conditions
Stepien, Bernard
;
Felty, Amy
;
Matwin, Stan
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 53-64)
.
2009
Persistent link: https://www.econbiz.de/10003844937
Saved in:
81
Typing for conflict detection in access control policies
Adi, Kamel
;
Bouzida, Yacine
;
Hattak, Ikhlass
;
Logrippo, …
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 212-226)
.
2009
Persistent link: https://www.econbiz.de/10003844971
Saved in:
82
TwoStep: an authentication method combining text and graphical passwords
Oorschot, P. C. van
;
Wan, Tao
- In:
E-technologies: innovation in an open world : 4th …
,
(pp. 233-239)
.
2009
Persistent link: https://www.econbiz.de/10003844975
Saved in:
83
Strong authentication for financial services : PTDs as a compromise between security and usability
Me, Gianluigi
;
Pirro, Daniele
;
Sarrecchia, Roberto
- In:
Mobile and ubiquitous commerce : advanced E-business methods
,
(pp. 101-114)
.
2009
Persistent link: https://www.econbiz.de/10003885209
Saved in:
84
Tippverhaltensbiometrie Psylock
Bartmann, Dieter
- In:
Banking and information technology : BIT ; a strategic …
10
(
2009
)
2
,
pp. 7-18
Persistent link: https://www.econbiz.de/10003886962
Saved in:
85
Am I really at risk? : determinants of online users' intentions to use strong passwords
Zhang, Lixuan
;
McDowell, William C.
- In:
Journal of internet commerce
8
(
2009
)
3/4
,
pp. 180-197
Persistent link: https://www.econbiz.de/10003941384
Saved in:
86
IT-Sicherheit der nächsten Generation : Herausforderungen und Entwicklungen
Eckert, Claudia
- In:
ITK-Kompendium ... : Expertenwissen, Trends und …
1
(
2009
),
pp. 216-223
Persistent link: https://www.econbiz.de/10003895666
Saved in:
87
Risks and benefits of signaling information system characteristics to strategic attackers
Cremonini, Marco
;
Nizovtsev, Dmitri
- In:
Journal of management information systems : JMIS
26
(
2009/10
)
3
,
pp. 241-274
Persistent link: https://www.econbiz.de/10003956641
Saved in:
88
Data breaches and identity theft
Roberds, William
;
Schreft, Stacey L.
- In:
Journal of monetary economics
56
(
2009
)
9
,
pp. 918-929
Persistent link: https://www.econbiz.de/10003924196
Saved in:
89
Data classification process for security and privacy based on a fuzzy logic classifier
Mohammadian, Masoud
;
Hatzinakos, Dimitrios
- In:
International journal of electronic finance : IJEF
3
(
2009
)
4
,
pp. 374-386
Persistent link: https://www.econbiz.de/10003908109
Saved in:
90
How ethics can enhance organizational privacy : lessons from the ChoicePoint and TJX data breaches
Culnan, Mary J.
;
Clark, Cynthia E.
- In:
Management information systems : mis quarterly
33
(
2009
)
4
,
pp. 673-687
Persistent link: https://www.econbiz.de/10003910412
Saved in:
91
Regulating access to international large-value payment systems
Holthausen, Cornelia
-
2000
Persistent link: https://www.econbiz.de/10013434302
Saved in:
92
Akzeptanz biometrischer Authentifizierungssysteme
Weber, Maik
-
2008
Persistent link: https://www.econbiz.de/10003785975
Saved in:
93
Modellgestützte Konfiguration von Identitätsmanagementsystemen
Juhrisch, Martin
;
Esswein, Werner
;
Weller, Jens
- In:
ERP-Management : Auswahl, Einführung und Betrieb von …
4
(
2008
)
4
,
pp. 20-23
Persistent link: https://www.econbiz.de/10003786358
Saved in:
94
E-business and telecommunications : 4th international conference ; revised selected papers
Filipe, Joaquim
(
ed.
)
-
2008
Persistent link: https://www.econbiz.de/10003789227
Saved in:
95
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa
;
Shimoyama, Takeshi
;
Torii, Satoru
- In:
E-business and telecommunications : 4th international …
,
(pp. 125-138)
.
2008
Persistent link: https://www.econbiz.de/10003803785
Saved in:
96
Securing biometric templates where similarity is measured with set intersection
Socek, Daniel
;
Božović, Vladimir
;
Ćulibrk, Dubravko
- In:
E-business and telecommunications : 4th international …
,
(pp. 139-151)
.
2008
Persistent link: https://www.econbiz.de/10003803793
Saved in:
97
Remote algorithmic complexity attacks against randomized hash tables
Bar-Josef, Noa
;
Wool, Avishai
- In:
E-business and telecommunications : 4th international …
,
(pp. 162-174)
.
2008
Persistent link: https://www.econbiz.de/10003803877
Saved in:
98
IPSec database query acceleration
Ferrante, Alberto
;
Chandra, Satish
;
Piuri, Vincenzo
- In:
E-business and telecommunications : 4th international …
,
(pp. 188-200)
.
2008
Persistent link: https://www.econbiz.de/10003803886
Saved in:
99
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai
;
Li, Jing
;
Sampalli, Srinivas
- In:
E-business and telecommunications : 4th international …
,
(pp. 201-213)
.
2008
Persistent link: https://www.econbiz.de/10003803905
Saved in:
100
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
First
Prev
1
2
3
Next
Last
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->