• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719176)   Today's Articles (1031)
For: Singh AN, Picot A, Kranz J, Gupta MP, Ojha A. Information Security Management (ISM) Practices: Lessons from Select Cases from India and Germany. ACTA ACUST UNITED AC 2013. [DOI: 10.1007/s40171-013-0047-4] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Number Cited by Other Article(s)
1
Farah M, Helou S, Raad E, El Helou E. Data protection and information security in biomedical research: A sequential explanatory mixed study. Int J Med Inform 2024;192:105635. [PMID: 39306909 DOI: 10.1016/j.ijmedinf.2024.105635] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/07/2024] [Revised: 09/08/2024] [Accepted: 09/16/2024] [Indexed: 11/02/2024]
2
Bolek V, Romanová A, Korček F. The Information Security Management Systems in E-Business. JOURNAL OF GLOBAL INFORMATION MANAGEMENT 2023. [DOI: 10.4018/jgim.316833] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
3
Cyber security and the Leviathan. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102674] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
4
A framework for ID fraud prevention policies in E-tailing sector. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102403] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
5
Khando K, Gao S, Islam SM, Salman A. Enhancing employees information security awareness in private and public organisations: A systematic literature review. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102267] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
6
Da Silva J. Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns. METHODOLOGICAL INNOVATIONS 2021. [DOI: 10.1177/2059799120987766] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
7
Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2019.102056] [Citation(s) in RCA: 28] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
8
Bongiovanni I. The least secure places in the universe? A systematic literature review on information security management in higher education. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.07.003] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
9
Soomro ZA, Ahmed J, Shah MH, Khoumbati K. Investigating identity fraud management practices in e-tail sector: a systematic review. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2019. [DOI: 10.1108/jeim-06-2018-0110] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
10
Pramod D, Bharathi SV. Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets. JOURNAL OF CASES ON INFORMATION TECHNOLOGY 2018. [DOI: 10.4018/jcit.2018070104] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
11
Tu CZ, Yuan Y, Archer N, Connelly CE. Strategic value alignment for information security management: a critical success factor analysis. INFORMATION AND COMPUTER SECURITY 2018. [DOI: 10.1108/ics-06-2017-0042] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
12
Stewart H, Jürjens J. Information security management and the human aspect in organizations. INFORMATION AND COMPUTER SECURITY 2017. [DOI: 10.1108/ics-07-2016-0054] [Citation(s) in RCA: 31] [Impact Index Per Article: 3.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
13
Bauer S, Bernroider EW, Chudzikowski K. Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks. Comput Secur 2017. [DOI: 10.1016/j.cose.2017.04.009] [Citation(s) in RCA: 49] [Impact Index Per Article: 6.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
14
Big Data Analytics: A Review on Theoretical Contributions and Tools Used in Literature. ACTA ACUST UNITED AC 2017. [DOI: 10.1007/s40171-017-0159-3] [Citation(s) in RCA: 112] [Impact Index Per Article: 14.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
15
Information security management needs more holistic approach: A literature review. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2016. [DOI: 10.1016/j.ijinfomgt.2015.11.009] [Citation(s) in RCA: 208] [Impact Index Per Article: 23.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
16
Total Interpretive Structural Modeling (TISM) of the Enablers of a Flexible Control System for Industry. ACTA ACUST UNITED AC 2014. [DOI: 10.1007/s40171-014-0080-y] [Citation(s) in RCA: 51] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA