-
1
-
-
84886765444
-
How to Manage Security Halfway Around the World
-
Datz, T. (2005) How to Manage Security Halfway Around the World. CISO, 3(4) pp. 46-48.
-
(2005)
CISO
, vol.3
, Issue.4
, pp. 46-48
-
-
Datz, T.1
-
3
-
-
0009992287
-
The Chief Information Officer: A Study of Managerial Roles
-
Grover, V., Jeong, S., Kettinger, W.J., and Lee, CC. (1993) The Chief Information Officer: A Study of Managerial Roles, Journal of Management Information Systems, (10)2, pp. 107-130.
-
(1993)
Journal of Management Information Systems
, vol.2
, Issue.10
, pp. 107-130
-
-
Grover, V.1
Jeong, S.2
Kettinger, W.J.3
Lee, C.C.4
-
4
-
-
44449173424
-
Price of Security Breaches
-
Hall, Mark. (2005) Price of Security Breaches, Computer-world 39(46) pp. 8.
-
(2005)
Computer-world
, vol.39
, Issue.46
, pp. 8
-
-
Hall, M.1
-
5
-
-
44449129868
-
So You Want to Be a CISO? The Pay's Good-But It's Not Easy
-
IOMA, 1,-10
-
IOMA. (2005) So You Want to Be a CISO? The Pay's Good-But It's Not Easy. Security Director's Report. 5(7) 1,-10.
-
(2005)
Security Director's Report
, vol.5
, Issue.7
-
-
-
6
-
-
68549093911
-
What is a Chief Privacy Officer? An Analysis Based Upon Mintzberg ' s Taxonomy of Managerial Roles
-
Kayworth, T., Brocato, L., and Whitten, D. (2005) What is a Chief Privacy Officer? An Analysis Based Upon Mintzberg ' s Taxonomy of Managerial Roles. Communications of the AIS 6(6).
-
(2005)
Communications of the AIS
, vol.6
, Issue.6
-
-
Kayworth, T.1
Brocato, L.2
Whitten, D.3
-
7
-
-
84876630178
-
-
Kirk, Jeremy. (2005) Survey: Execs see security concerns over IP convergence, Computerworld http://www.computerworld.com/networkingtopics/ networking/story/0,10801,106057,00.html Nov 8, 2005 issue.
-
Kirk, Jeremy. (2005) Survey: Execs see security concerns over IP convergence, Computerworld http://www.computerworld.com/networkingtopics/ networking/story/0,10801,106057,00.html Nov 8, 2005 issue.
-
-
-
-
8
-
-
13844275774
-
Assessing and Quantifying the Loss of Network Intrusion
-
Kros, J., Foltz, C., and Metcalf, C. (2004/05) Assessing and Quantifying the Loss of Network Intrusion. Journal of Computer Information Systems 45(2), pp. 36-43).
-
(2005)
Journal of Computer Information Systems
, vol.45
, Issue.2
, pp. 36-43
-
-
Kros, J.1
Foltz, C.2
Metcalf, C.3
-
9
-
-
84876605381
-
-
Kubilus, N. (2004) IT and Security: Converging Roles. ComputerWorld. Nov 22, 2004. pp. 44.
-
Kubilus, N. (2004) IT and Security: Converging Roles. ComputerWorld. Nov 22, 2004. pp. 44.
-
-
-
-
10
-
-
24644502723
-
Analysis of Skill Requirements For Systems Analysts in Fortune 500 Organizations
-
Lee, C. (2005) Analysis of Skill Requirements For Systems Analysts in Fortune 500 Organizations. Journal of Computer Information Systems 45(4) pp. 84-92.
-
(2005)
Journal of Computer Information Systems
, vol.45
, Issue.4
, pp. 84-92
-
-
Lee, C.1
-
11
-
-
0002236796
-
Managerial Work: Analysis for Observation
-
Mintzberg, H. (1971) Managerial Work: Analysis for Observation, Management Science, (18)2, pp. 97-110.
-
(1971)
Management Science
, vol.2
, Issue.18
, pp. 97-110
-
-
Mintzberg, H.1
-
15
-
-
33747481695
-
Secure Information Sharing in Internet-Based Supply Chain Management Systems
-
Zhang, C. and Li, S. (2006) Secure Information Sharing in Internet-Based Supply Chain Management Systems, Journal of Computer Information Systems 46(4) pp. 18-24.
-
(2006)
Journal of Computer Information Systems
, vol.46
, Issue.4
, pp. 18-24
-
-
Zhang, C.1
Li, S.2
|