Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Andrew Stewart
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
A utilitarian re-examination of enterprise-scale information security management
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (1): 39–57.
Published: 12 March 2018
Journal Articles
Can spending on information security be justified?: Evaluating the security spending decision from the perspective of a rational actor
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (4): 312–326.
Published: 05 October 2012
Journal Articles
Information security technologies as a commodity input
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (1): 5–15.
Published: 01 February 2005
