-
1
-
-
34248568315
-
-
Available at
-
'About IDC' (2002) 'IDC research', Available at: http:// www.idcresearch.com/en_US/st/aboutIDC.jhtml
-
(2002)
IDC research
-
-
About IDC'1
-
2
-
-
34248505812
-
-
'Annual report to congress on foreign economic collection and industrial espionage 2001: key findings' (2002) Office of the National Counterintelligence Executive (NCIX), Available at: http://www.ncix.gov/ docs/fecie_fy0l.pdf
-
'Annual report to congress on foreign economic collection and industrial espionage 2001: key findings' (2002) Office of the National Counterintelligence Executive (NCIX), Available at: http://www.ncix.gov/ docs/fecie_fy0l.pdf
-
-
-
-
3
-
-
34248508131
-
Managing the global risk of economic espionage
-
Best, D.O. (2002) 'Managing the global risk of economic espionage', Security Management, Vol. 46, p.214.
-
(2002)
Security Management
, vol.46
, pp. 214
-
-
Best, D.O.1
-
4
-
-
10444224236
-
Watch out for wireless rogues
-
Brewin, B. (2002) 'Watch out for wireless rogues', Computerworld, Vol. 36, p.36.
-
(2002)
Computerworld
, vol.36
, pp. 36
-
-
Brewin, B.1
-
5
-
-
28144460630
-
-
Department of Computer Science, Australian National University, Available at
-
Clarke, R. (1999) 'A primer in diffusion of innovations theory', Department of Computer Science, Australian National University, Available at: http://www.anu.edu.au/people/Roger.Clarke/SOS/InnDiff.html
-
(1999)
A primer in diffusion of innovations theory
-
-
Clarke, R.1
-
6
-
-
34248565774
-
-
'Data summaries' (2002) Ecommerce Times, Available at: www.EcomerceTimes.com.
-
'Data summaries' (2002) Ecommerce Times, Available at: www.EcomerceTimes.com.
-
-
-
-
7
-
-
34248511013
-
Securing content in an insecure world
-
Dukart, J.R. (2002) 'Securing content in an insecure world', E-Doc, Vol. 16, p.30.
-
(2002)
E-Doc
, vol.16
, pp. 30
-
-
Dukart, J.R.1
-
8
-
-
34248508130
-
Being tough, gentle with data security
-
Gartenberg, M. (2002) 'Being tough, gentle with data security', Computerworld, Vol. 36, p.23.
-
(2002)
Computerworld
, vol.36
, pp. 23
-
-
Gartenberg, M.1
-
9
-
-
30344450166
-
Solution architecture alignment for logistics portfolio management
-
Gulledge, T., Hafez, W., Ledwon, M. and Svensson, C. (2005) 'Solution architecture alignment for logistics portfolio management', Int. J. Services and Standards, Vol. 1, pp.401-413.
-
(2005)
Int. J. Services and Standards
, vol.1
, pp. 401-413
-
-
Gulledge, T.1
Hafez, W.2
Ledwon, M.3
Svensson, C.4
-
10
-
-
0034804713
-
Securing e-business applications using smart cards
-
Hamann, E-M., Henn, H., Schack, T. and Seliger, F. (2001) 'Securing e-business applications using smart cards', IBM Systems Journal, Vol. 40, pp.635-647.
-
(2001)
IBM Systems Journal
, vol.40
, pp. 635-647
-
-
Hamann, E.-M.1
Henn, H.2
Schack, T.3
Seliger, F.4
-
11
-
-
33644535312
-
A framework for analysing cost structures in Business Process Reengineering (BPR)
-
Herath, S.K. and Gupta, A. (2005) 'A framework for analysing cost structures in Business Process Reengineering (BPR)', Int. J. Services and Standards, Vol. 1, pp.494-511.
-
(2005)
Int. J. Services and Standards
, vol.1
, pp. 494-511
-
-
Herath, S.K.1
Gupta, A.2
-
12
-
-
34248557256
-
Cyber-risks create coverage gaps
-
Harris, D. (2002) 'Cyber-risks create coverage gaps', Best's Review, Vol. 103, p.72.
-
(2002)
Best's Review
, vol.103
, pp. 72
-
-
Harris, D.1
-
13
-
-
3142523715
-
Industry corner: Smart cards for an information-hungry world
-
Hester, E.D. and Joseph, W.B. (1998) 'Industry corner: smart cards for an information-hungry world', Business Economics, Vol. 33, pp.54-58.
-
(1998)
Business Economics
, vol.33
, pp. 54-58
-
-
Hester, E.D.1
Joseph, W.B.2
-
15
-
-
3142587299
-
Smart card success requires making new partnerships first: High costs are still associated with products
-
Meckbach, G. (1999) 'Smart card success requires making new partnerships first: high costs are still associated with products', Computer Dealer News, Vol. 15, p.12.
-
(1999)
Computer Dealer News
, vol.15
, pp. 12
-
-
Meckbach, G.1
-
16
-
-
34248514696
-
-
'Protect your documents', (2001) 'Proof of service - electronic Certified Document Delivery'. Available at: http://www.pos-e.com/htmls/ secure.htm
-
'Protect your documents', (2001) 'Proof of service - electronic Certified Document Delivery'. Available at: http://www.pos-e.com/htmls/ secure.htm
-
-
-
-
17
-
-
34248528851
-
WPA tightens wireless security
-
Peckham, R. (2003) 'WPA tightens wireless security', Communications News, Vol. 40, pp.6-8.
-
(2003)
Communications News
, vol.40
, pp. 6-8
-
-
Peckham, R.1
-
18
-
-
0003584083
-
-
4th ed, New York: Free Press, Simon & Simon
-
Rogers, E.M. (1995) Diffusion of Innovations (4th ed.). New York: Free Press, Simon & Simon.
-
(1995)
Diffusion of Innovations
-
-
Rogers, E.M.1
-
19
-
-
34248537428
-
-
'Safeguarding information for the security professional' (2002b) Office of the National Counterintelligence Executive (NCIX), Available at: http://www.nacic.gov/pubs/misc/safeguard.htm
-
'Safeguarding information for the security professional' (2002b) Office of the National Counterintelligence Executive (NCIX), Available at: http://www.nacic.gov/pubs/misc/safeguard.htm
-
-
-
-
20
-
-
85010559202
-
Online privacy policies & diffusion theory perspectives: Security or chaos?
-
Smith, A.D. (2004a) 'Online privacy policies & diffusion theory perspectives: security or chaos?, Services Marketing Quarterly, Vol. 25, pp.53-75.
-
(2004)
Services Marketing Quarterly
, vol.25
, pp. 53-75
-
-
Smith, A.D.1
-
21
-
-
4143093509
-
Empirical exploration for a Product Data Management (PDA) system at a major telecommunications firm
-
Smith, A.D. (2004b) 'Empirical exploration for a Product Data Management (PDA) system at a major telecommunications firm', Industrial Management & Data Systems, Vol. 104, pp.513-525.
-
(2004)
Industrial Management & Data Systems
, vol.104
, pp. 513-525
-
-
Smith, A.D.1
-
22
-
-
33644512614
-
Strategic leveraging of videoconferencing & web-enabled conferencing in an information-rich environment
-
Smith, A.D. (2004c) 'Strategic leveraging of videoconferencing & web-enabled conferencing in an information-rich environment', Int. J. Services and Standards, Vol. 1, pp.206-227.
-
(2004)
Int. J. Services and Standards
, vol.1
, pp. 206-227
-
-
Smith, A.D.1
-
23
-
-
33745027249
-
Exploring the inherent benefits of RFID & automated self-serve checkouts in a B2C environment
-
Smith, A.D. (2005a) 'Exploring the inherent benefits of RFID & automated self-serve checkouts in a B2C environment', Int. J. Business Information Systems, Vol. 1, pp.149-183.
-
(2005)
Int. J. Business Information Systems
, vol.1
, pp. 149-183
-
-
Smith, A.D.1
-
24
-
-
33745027520
-
Exploring the acceptability of biometrics & fingerprint technologies
-
Smith, A.D. (2005b) 'Exploring the acceptability of biometrics & fingerprint technologies', Int. J. Services and Standards, Vol. 1, pp.453-481.
-
(2005)
Int. J. Services and Standards
, vol.1
, pp. 453-481
-
-
Smith, A.D.1
-
25
-
-
85001850091
-
Intrinsic & extrinsic values associated with file sharing
-
Smith, A.D. (2006) 'Intrinsic & extrinsic values associated with file sharing', Int. J. Electronic Information Systems, Vol. 2. pp.59-82.
-
(2006)
Int. J. Electronic Information Systems
, vol.2
, pp. 59-82
-
-
Smith, A.D.1
-
27
-
-
21244478827
-
E-procurement in the health care industry: Enhancing supply chain management
-
Smith, A.D. and Flanegin, F.R. (2004) 'E-procurement in the health care industry: enhancing supply chain management', Int. J. Electronic Healthcare, Vol. 1, pp. 176-198.
-
(2004)
Int. J. Electronic Healthcare
, vol.1
, pp. 176-198
-
-
Smith, A.D.1
Flanegin, F.R.2
-
28
-
-
0036063961
-
Information management of automated data capture: An overview of technical developments
-
Smith, A.D. and Offodile, F. (2002) 'Information management of automated data capture: an overview of technical developments', Information Management and Computer Security, Vol. 10, pp.109-118.
-
(2002)
Information Management and Computer Security
, vol.10
, pp. 109-118
-
-
Smith, A.D.1
Offodile, F.2
-
29
-
-
26444608436
-
Combining automatic data capture systems: Smart cards & biometrics
-
Smith, A.D., Rota, D.R. and Turchek, J.C. (2003) 'Combining automatic data capture systems: smart cards & biometrics', Journal of Contemporary Business, Vol. 11, pp.26-36.
-
(2003)
Journal of Contemporary Business
, vol.11
, pp. 26-36
-
-
Smith, A.D.1
Rota, D.R.2
Turchek, J.C.3
-
30
-
-
0036063532
-
Application Service Providers (ASP): Moving downstream to enhance competitive advantage
-
Smith, A.D. and Rupp, W.T. (2002a) 'Application Service Providers (ASP): moving downstream to enhance competitive advantage', Information Management and Computer Security, Vol. 10, pp.64-72.
-
(2002)
Information Management and Computer Security
, vol.10
, pp. 64-72
-
-
Smith, A.D.1
Rupp, W.T.2
-
31
-
-
0036036094
-
Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
-
Smith, A.D. and Rupp, W.T. (2002b) 'Issues in cybersecurity: understanding the potential risks associated with hackers/crackers', Information Management and Computer Security, Vol. 10, pp.178-183.
-
(2002)
Information Management and Computer Security
, vol.10
, pp. 178-183
-
-
Smith, A.D.1
Rupp, W.T.2
-
32
-
-
0012129113
-
Safe from prying eyes
-
Stijns, W. and Gunton, M. (2000) 'Safe from prying eyes', World Trade, Vol. 13, pp.64-65.
-
(2000)
World Trade
, vol.13
, pp. 64-65
-
-
Stijns, W.1
Gunton, M.2
-
33
-
-
77958101658
-
Diffusion theory and instructional technology
-
Available at
-
Surry, D.W. (1997) 'Diffusion theory and instructional technology', Instructional Technology Research Online, Available at: http:// www.gsu.edu/~wwwitr/docs/diffusion/.
-
(1997)
Instructional Technology Research Online
-
-
Surry, D.W.1
-
34
-
-
34248568314
-
-
Available at
-
'SPYRUS PKI Overview' (2002) 'Spyrus' Available at: http:// www.spyrus.com/content/products/pki/overview/index_pg2.asp.
-
(2002)
Spyrus
-
-
SPYRUS PKI, O.1
-
35
-
-
25444474672
-
-
Upper Saddle River, NJ: Prentice-Hall
-
Turban, E., Kingn D., Lee, J., Warkentin, M. and Chung, H. (2000) Electronic Commerce 2000. Upper Saddle River, NJ: Prentice-Hall.
-
(2000)
Electronic Commerce 2000
-
-
Turban, E.1
Kingn, D.2
Lee, J.3
Warkentin, M.4
Chung, H.5
-
36
-
-
34248511012
-
-
Infowar, Available at
-
Venzke, B.N. (1996) 'Econmic/industrial espionage', Infowar, Available at: http://www.infowar.com/class_2/class2_2.html-ssi
-
(1996)
Econmic/industrial espionage
-
-
Venzke, B.N.1
-
37
-
-
4143104425
-
Successfully securing suppliers
-
Whitaker, J.D., Stephens, J.A. and Traham, C.P. (2001) 'Successfully securing suppliers', Supply Chain Excellence, Vol. 104, pp.513-525.
-
(2001)
Supply Chain Excellence
, vol.104
, pp. 513-525
-
-
Whitaker, J.D.1
Stephens, J.A.2
Traham, C.P.3
-
38
-
-
1842530755
-
A unified approach to a fair document exchange system
-
Zhang, N., Shi, Q. and Merabti, M (2004) 'A unified approach to a fair document exchange system', The Journal of Systems and Software, Vol. 172, pp.83-91.
-
(2004)
The Journal of Systems and Software
, vol.172
, pp. 83-91
-
-
Zhang, N.1
Shi, Q.2
Merabti, M.3
|