Computer Security within Organizations

被引:0
|
作者
Dhillon, Gurpreet [1 ]
机构
[1] London Sch Econ, Comp Secur Res Ctr, London, England
关键词
D O I
10.1057/ejis.1994.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:241 / 242
页数:3
相关论文
共 50 条
  • [1] Computer Security, Importance and Scope in Organizations
    Garcia Choque, Lucio
    Galindos Izaguirre, Luis Jando
    Flores Canterac, Joel Arturo
    Ogosi Auqui, Jose Antonio
    Cano Chuqui, Jorge
    INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 521 - 529
  • [2] A holistic model of computer abuse within organizations
    Lee, Jintae
    Lee, Younghwa
    Information Management and Computer Security, 2002, 10 (2-3): : 57 - 63
  • [3] Social Groupings and Information Security Obedience Within Organizations
    Sommestad, Teodor
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 325 - 338
  • [4] Internet security incidents, a survey within Dutch organizations
    Caminada, M
    van de Riet, R
    van Zanten, A
    van Doorn, L
    COMPUTERS & SECURITY, 1998, 17 (05) : 417 - 433
  • [5] Institutional authority and security cooperation within regional economic organizations
    Haftel, Yoram Z.
    Hofmann, Stephanie C.
    JOURNAL OF PEACE RESEARCH, 2017, 54 (04) : 484 - 498
  • [6] Strategic planning for the computer science security of banking organizations, companies and government
    Alberto Ruiz-Vanoye, Jorge
    Diaz-Parra, Ocotlan
    Rafael Ponce-Medellin, Ismael
    Fuentes-Penna, Alejandro
    Carlos Olivares-Rojas, Juan
    PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, : 60 - +
  • [7] Investigating Information Security Risks of Mobile Device Use within Organizations
    Glisson, William Bradley
    Storer, Tim
    AMCIS 2013 PROCEEDINGS, 2013,
  • [8] Security practitioners in context: Their activities and interactions with other stakeholders within organizations
    Werlinger, Rodrigo
    Hawkey, Kirstie
    Botta, David
    Beznosov, Konstantin
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2009, 67 (07) : 584 - 606
  • [9] A Risk Analysis Model to Reduce Computer Security Risks Among Healthcare Organizations
    MJ Warren
    Risk Management, 2001, 3 (1) : 27 - 37
  • [10] Analysis of Objective Trees in Security Management of Distributed Computer Networks of Enterprises and Organizations
    Dolinina, Olga
    Kushnikov, Vadim
    Kulakova, Ekaterina
    COMPUTER NETWORKS, CN 2015, 2015, 522 : 117 - 126