Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Management strategy
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Incorporating business strategy formulation with identity management strategy formulation
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (3): 152–169.
Published: 13 July 2012
... Group Publishing Limited 2012 Identity management Business strategy formulation Strategic management principles Identity management guidelines Security Management strategy Corporate strategy With the advent of information technology, users' roles in information systems have...
Journal Articles
Validation of a biases model in strategic security decision making
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (2): 52–70.
Published: 01 June 2012
... might also be called normalized rules, because they are rules of thumb that are: Michael Workman can be contacted at: workmanfit@yahoo.com © Emerald Group Publishing Limited 2012 State security Decision making Decision support systems Management strategy Security and decision...
Journal Articles
Finding middle ground management strategy for software development
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2010) 18 (3): 185–197.
Published: 20 July 2010
... a middle ground management strategy for software development to gain more effectiveness and efficiency in delivering projects on time and within budget. Design/methodology/approach The paper combines narrative with argument and analysis with a dynamic programming model. The model was applied...
Journal Articles
Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (5): 484–501.
Published: 21 November 2008
... an organization's MISA should impact MATIS and thus improve information security performance. Originality/value The study provides empirical evidence supporting the unproven link between MISA and MATIS. Data security Information systems Management strategy Information systems have penetrated every...
Journal Articles
The impact of IT on SMEs in the United States
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (4): 318–327.
Published: 01 September 2004
... to evaluate the impact of information technology on small and medium enterprises in the USA. The results provide useful insight into the use of information technology by both manufacturing and service SMEs. © Emerald Group Publishing Limited 2004 Communication technologies Management strategy...
