Andrei Bonamigo, Camila Guimarães Frech & Ana Carolina Custódio Lopes. (2021) Value co-creation in the B2B context: a diagnosis of knowledge management based on multiple case studies. Journal of Business & Industrial Marketing 37:7, pages 1449-1462.
Crossref
Alladean Chidukwani, Sebastian Zander & Polychronis Koutsakis. (2022) A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations. IEEE Access 10, pages 85701-85719.
Crossref
Pangondian Prederikus, Stefan Gendita Bunawan, Ford Lumban Gaol, Tokuro Matsuo & Andi Nugroho. 2022. Pervasive Computing and Social Networking. Pervasive Computing and Social Networking
721
732
.
Margareta Heidt, Jin P. Gerlach & Peter Buxmann. (2019) Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments. Information Systems Frontiers 21:6, pages 1285-1305.
Crossref
Fahad Mira. (2019) A Review Paper of Malware Detection Using API Call Sequences. A Review Paper of Malware Detection Using API Call Sequences.
Saad Khan & Simon Parkinson. 2018. Guide to Vulnerability Analysis for Computer Networks and Systems. Guide to Vulnerability Analysis for Computer Networks and Systems
3
32
.
Jesse Kaukola, Jukka Ruohonen, Antti Tuomisto, Sami Hyrynsalmi & Ville Leppänen. (2017) Tightroping between APT and BCI in small enterprises. Information & Computer Security 25:3, pages 226-239.
Crossref
Sanjaya Mayadunne & Sungjune Park. (2016) An economic model to evaluate information security investment of risk-taking small and medium enterprises. International Journal of Production Economics 182, pages 519-530.
Crossref
M. Ramkumar. (2016) A modified ANP and fuzzy inference system based approach for risk assessment of in-house and third party e-procurement systems. Strategic Outsourcing: An International Journal 9:2, pages 159-188.
Crossref
Omondi John Opala, Shawon S. M. Rahman & Abdulhameed A. Alelaiwi. 2016. Web-Based Services. Web-Based Services
1283
1315
.
Sanghyun Kim, Geuna Kim & Aaron M. French. (2015) Relationships between need-pull/technology-push and information security management and the moderating role of regulatory pressure. Information Technology and Management 16:3, pages 173-192.
Crossref
Idris Gautama So, N.J. Setiadi, B. Papak & Rudy Aryanto. (2014) Action Design of Information Systems Security Governance for Bank Using COBIT 4.1 and Control Standard of ISO 27001. Advanced Materials Research 905, pages 663-668.
Crossref
Omondi John Opala, Shawon S. M. Rahman & Abdulhameed A. Alelaiwi. 2014. Handbook of Research on Architectural Trends in Service-Driven Computing. Handbook of Research on Architectural Trends in Service-Driven Computing
554
588
.
She-I Chang, Jung-Jei Su & Hsing-Jung Li. (2013) Risk Assessment Mechanism for Personal Information Operations -- Case Study by Hospital. Risk Assessment Mechanism for Personal Information Operations -- Case Study by Hospital.
Brahim Herbane. (2012)
Exploring Crisis Management in
UK
Small‐ and Medium‐Sized Enterprises
. Journal of Contingencies and Crisis Management 21:2, pages 82-95.
Crossref
Omondi John Opala & Syed M. Rahman. (2013) An exploratory analysis of the influence of information security on the adoption of cloud computing. An exploratory analysis of the influence of information security on the adoption of cloud computing.
Reyes Gonzalez, Juan Llopis & Jose Gasco. (2013) Information systems offshore outsourcing: managerial conclusions from academic research. International Entrepreneurship and Management Journal 9:2, pages 229-259.
Crossref
John McGaha. 2013. User-Driven Healthcare. User-Driven Healthcare
1236
1251
.
Peggy E. Chaudhry, Sohail S. Chaudhry, Kevin D. Clark & Darryl S. Jones. 2013. Enterprise Information Systems of the Future. Enterprise Information Systems of the Future
206
214
.
Peggy E. Chaudhry, Sohail S. Chaudhry, Ronald Reese & Darryl S. Jones. 2012. Re-conceptualizing Enterprise Information Systems. Re-conceptualizing Enterprise Information Systems
118
128
.
John McGaha. 2011. Ethical Issues and Security Monitoring Trends in Global Healthcare. Ethical Issues and Security Monitoring Trends in Global Healthcare
50
65
.
Brahim Herbane. (2010) Small business research: Time for a crisis-based view. International Small Business Journal: Researching Entrepreneurship 28:1, pages 43-64.
Crossref
Chaogai Xue & Haiwang Cao. (2008) A study on self-reconfiguration of software system based on formal representation. A study on self-reconfiguration of software system based on formal representation.
Alison Hedrick. (2007) Cyberinsurance. Cyberinsurance.
Janne Merete Hagen, Tormod Kalberg Sivertsen & Chungming Rong. (2007) Information Security Threats and Access Control Practices in Norwegian Businesses. Information Security Threats and Access Control Practices in Norwegian Businesses.
Arthur Jung‐Ting Chang & Quey‐Jen Yeh. (2006) On security preparations against possible IS threats across industries. Information Management & Computer Security 14:4, pages 343-360.
Crossref