Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Mohamad Noorman Masrek
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
The impact of information security management practices on organisational agility
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (5): 681–700.
Published: 12 June 2020
Journal Articles
The effect of organizational and individual characteristics on corporate intranet utilizations
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (2): 89–112.
Published: 06 June 2008
Journal Articles
An exploratory study on systems development methodologies for web‐based applications
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (2): 137–149.
Published: 06 June 2008
Journal Articles
Investigating corporate intranet effectiveness: a conceptual framework
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (3): 168–183.
Published: 12 June 2007
