메뉴 건너뛰기




Volumn 50, Issue 7, 2007, Pages 103-108

A knowledge architecture for IT security

Author keywords

[No Author keywords available]

Indexed keywords

KNOWLEDGE ARCHITECTURE; SECURITY MEASURES;

EID: 34547320186     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/1272516.1272521     Document Type: Article
Times cited : (37)

References (12)
  • 1
    • 9744248703 scopus 로고    scopus 로고
    • KM and KM systems: Conceptual foundations and research issues
    • Mar
    • Alavi, M. and Leidner, D.E. KM and KM systems: Conceptual foundations and research issues. MIS Quarterly 25, 1 (Mar. 2001), 107-136.
    • (2001) MIS Quarterly , vol.25 , Issue.1 , pp. 107-136
    • Alavi, M.1    Leidner, D.E.2
  • 2
    • 84858086576 scopus 로고    scopus 로고
    • June
    • Barth, S., Defining KM; www.destinationkm.com/articles (June 2001)
    • (2001) Defining KM
    • Barth, S.1
  • 3
    • 14544292121 scopus 로고    scopus 로고
    • Conti, G. Why computer scientists should attend hacker conferences. Commun, ACM 48, 3 (Mar. 2005), 23-24.
    • Conti, G. Why computer scientists should attend hacker conferences. Commun, ACM 48, 3 (Mar. 2005), 23-24.
  • 4
    • 0141907805 scopus 로고    scopus 로고
    • An integration of thoughts on KM
    • Spring
    • Hult, G.T. An integration of thoughts on KM. Decision Sciences 34, 2 (Spring 2003), 189-195.
    • (2003) Decision Sciences , vol.34 , Issue.2 , pp. 189-195
    • Hult, G.T.1
  • 5
    • 85001759495 scopus 로고    scopus 로고
    • An investigation of KM within a university IT group
    • Koch, H. An investigation of KM within a university IT group. Info. Resources Management J. 15, 1 (2002), 13-21.
    • (2002) Info. Resources Management J , vol.15 , Issue.1 , pp. 13-21
    • Koch, H.1
  • 7
    • 0042866768 scopus 로고    scopus 로고
    • KM in pursuit of performance: Insights from Nortel networks
    • Sept
    • Masey, A., et. al. KM in pursuit of performance: Insights from Nortel networks. MIS Quarterly 26, 3 (Sept. 2002), 269-289.
    • (2002) MIS Quarterly , vol.26 , Issue.3 , pp. 269-289
    • Masey, A.1    et., al.2
  • 9
    • 0001799245 scopus 로고    scopus 로고
    • The knowledge creating company
    • Harvard Business School Press, Boston, MA
    • Nonaka, I. The knowledge creating company. Harvard Business Review on KM. Harvard Business School Press, Boston, MA, 1998, 21-45.
    • (1998) Harvard Business Review on KM , pp. 21-45
    • Nonaka, I.1
  • 10
    • 73549084288 scopus 로고
    • Actualizing organizational memory with information systems
    • Stein, E.W. and Zwass, V. Actualizing organizational memory with information systems. Information Systems Research 6, 2 (1995), 85-117.
    • (1995) Information Systems Research , vol.6 , Issue.2 , pp. 85-117
    • Stein, E.W.1    Zwass, V.2
  • 11
    • 34547312062 scopus 로고    scopus 로고
    • Swanson, M. Security Self-Assessment Guide for Information Technology System. National Institute for Standards and Technology, Special Publication 800-26. U.S. Government Printing Office, Washington, DC. (2001).
    • Swanson, M. Security Self-Assessment Guide for Information Technology System. National Institute for Standards and Technology, Special Publication 800-26. U.S. Government Printing Office, Washington, DC. (2001).
  • 12
    • 34547370599 scopus 로고    scopus 로고
    • Whitman, M.E., and Mattord, H.J. Management of Information Security. Thomson Course Technology, Boston, MA, 2004.
    • Whitman, M.E., and Mattord, H.J. Management of Information Security. Thomson Course Technology, Boston, MA, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.