Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Computer security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Consumer privacy rights: CPR and the age of the Internet
Available to Purchase
Journal:
Management Decision
Management Decision (2001) 39 (4): 272–279.
Published: 01 May 2001
... partners. By entering the Safe Harbor agreement, US companies will in effect be promising their European customers more privacy protection than they give their domestic clients (Rombel, 2001). © MCB UP Limited 2001 Internet Computer privacy Computer security Customer care Imagine...
Journal Articles
Computer Security in Large Corporations: Attitudes and Practices of CEOs
Available to Purchase
Journal:
Management Decision
Management Decision (1993) 31 (7)
Published: 01 July 1993
...Phillip C. Wright Reports a study which investigated the attitudes, knowledge and practices of CEOs in the computer security area. It was found that a relationship exists between CEO review of policies and the presence or absence of a “well‐designed security programme”. These data suggest...
