Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Strategic management
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Shaping security behaviour through discipline and agility: Implications for information security management
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (4): 262–276.
Published: 11 October 2011
..., 2001). Within the scope of IS behaviour studies, the concept of agility implies a radical shift in understanding user behaviour. In addition to the view of agility as commonly described in software design research (Boehm and Turner, 2004), the field of strategic management has proven...
Journal Articles
Impacts of organizational capabilities in information security
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (3): 155–176.
Published: 19 July 2011
... strategy and organization performance. Design/methodology/approach Based on existing literature in strategic management and information security, a theoretical model was proposed and validated. A self‐administered survey instrument was developed to collect empirical data. Structural equation modeling...
Journal Articles
How to choose an ASP: selection guidelines
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (2): 67–73.
Published: 01 May 2003
... should consider when choosing an ASP. These success factors were developed – using experiences of successful ASPs presented in groups based on their underlying business models – from customer requirements, a major driver in the ASP market. © MCB UP Limited 2003 Strategic management...
Journal Articles
Achieving IT success
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (5): 199–204.
Published: 01 December 1998
... of corporate commitment and investment and a high‐speed development, test, implementation and roll out capability in IT. © MCB UP Limited 1998 Information resources management Information technology strategy Measurement Strategic management Success Systems management Sure, living...
Journal Articles
A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate the Fog
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1993) 1 (2)
Published: 01 February 1993
... of the classes within this taxonomy. Argues, among other things, that the objective use of EIS can be considered as a strategic management aid to top management teams. © MCB UP Limited 1993 Executive information systems Strategic management 4 INFORMATION MANAGEMENT & COMPUTER SECURITY 1,2 Despite...
