Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Information systems security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
A systematic framework to explore the determinants of information security policy development and outcomes
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (4): 490–516.
Published: 08 February 2022
... Limited Licensed re-use rights only ISP development Information security procedure Nine-Five-circle (NFC) Information systems security Information security commitment Employee behaviour Information security policy development Information security policy There are several definitions...
Journal Articles
Tightroping between APT and BCI in small enterprises
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2017) 25 (3): 226–239.
Published: 10 July 2017
... Emerald Publishing Limited Licensed re-use rights only Vulnerability Incident Information systems security Security threat This qualitative empirical paper observes the small business mindsets related to the concept of advanced persistent threats (APTs) (Baize, 2012 ; Granadillo et...
