-
1
-
-
57349196865
-
Management accountants and information technology
-
January, pp
-
Banerjee, J. and Lloyd, A. (1995) 'Management accountants and information technology', Management Accounting, January, pp.12-15.
-
(1995)
Management Accounting
, pp. 12-15
-
-
Banerjee, J.1
Lloyd, A.2
-
2
-
-
15944378561
-
Understanding information systems implementation in the UK health sector: Methodological innovation and the use of cause mapping
-
Barnes, J.S. (2005) 'Understanding information systems implementation in the UK health sector: Methodological innovation and the use of cause mapping', International Journal Innovation and Learning, Vol. 2, No. 1, pp.65-78.
-
(2005)
International Journal Innovation and Learning
, vol.2
, Issue.1
, pp. 65-78
-
-
Barnes, J.S.1
-
3
-
-
57349159002
-
Computer fraud: Financial and ethical implication
-
Casabona, P. and Yu, S. (1998) 'Computer fraud: Financial and ethical implication', Review of Business, Vol. 20, No. 1, pp.22-25.
-
(1998)
Review of Business
, vol.20
, Issue.1
, pp. 22-25
-
-
Casabona, P.1
Yu, S.2
-
4
-
-
33746186154
-
Crafting an effecting customer retention strategy: A review of halo effect on customer satisfaction in online auctions
-
Chong, B. and Wong, M. (2005) 'Crafting an effecting customer retention strategy: A review of halo effect on customer satisfaction in online auctions', International Journal of Management and Enterprise Development, Vol. 2, No. 1, pp.12-26.
-
(2005)
International Journal of Management and Enterprise Development
, vol.2
, Issue.1
, pp. 12-26
-
-
Chong, B.1
Wong, M.2
-
5
-
-
40249120424
-
Knowledge management via ontology development in accounting
-
Chou, T.H., Vassar, J.A. and Lin, B. (2008) 'Knowledge management via ontology development in accounting', Kybernetes: The International Journal of Systems and Cybernetics, Vol. 37, No. 1, pp.36-48.
-
(2008)
Kybernetes: The International Journal of Systems and Cybernetics
, vol.37
, Issue.1
, pp. 36-48
-
-
Chou, T.H.1
Vassar, J.A.2
Lin, B.3
-
6
-
-
52149085945
-
Data security in location-aware applications: An approach based on RBAC
-
Damiani, M.L., Bertino, E. and Perlasca, P. (2007) 'Data security in location-aware applications: An approach based on RBAC,' International Journal of Information and Computer Security, Vol. 1, No. 1/2, pp.5-38.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 5-38
-
-
Damiani, M.L.1
Bertino, E.2
Perlasca, P.3
-
7
-
-
33645813646
-
Perceived security threats to today's accounting information systems: A survey of CISAs
-
Davis, C.E. (1996) 'Perceived security threats to today's accounting information systems: A survey of CISAs,' IS Audit & Control Journal Vol. 3, No. 1, pp.38-41.
-
(1996)
IS Audit & Control Journal
, vol.3
, Issue.1
, pp. 38-41
-
-
Davis, C.E.1
-
8
-
-
33645833259
-
An assessment of accounting information security
-
Available online at
-
Davis, C.E. (1997) 'An assessment of accounting information security', CPA Journal. Available online at: http://www.nysscpa.org/ cpajournal/1997/0397/features/f28.htm
-
(1997)
CPA Journal
-
-
Davis, C.E.1
-
9
-
-
57349112667
-
Mail survey and response rate
-
Available online at
-
Eunson, S.T. (1994) 'Mail survey and response rate', Journal of Marketing Research. Available online at: http://www.ebscohost.com
-
(1994)
Journal of Marketing Research
-
-
Eunson, S.T.1
-
10
-
-
21844473593
-
-
South-Western College Publishing, Cincinnati, Ohio
-
Gelinas, U.J., Sutton, S.G. and Oram, A.E. (1999) Accounting Information Systems, South-Western College Publishing, Cincinnati, Ohio.
-
(1999)
Accounting Information Systems
-
-
Gelinas, U.J.1
Sutton, S.G.2
Oram, A.E.3
-
12
-
-
38149102571
-
Identity theft in the USA: Evidence from 2002 to 2006
-
Koong, K.S., Liu, L.C., Bai, S. and Lin, B. (2008) 'Identity theft in the USA: Evidence from 2002 to 2006', International Journal of Mobile Communications, Vol. 6, No.2, pp.199-216.
-
(2008)
International Journal of Mobile Communications
, vol.6
, Issue.2
, pp. 199-216
-
-
Koong, K.S.1
Liu, L.C.2
Bai, S.3
Lin, B.4
-
13
-
-
0005661986
-
Defending the security of the accounting system
-
Luehlfing, M. (2000) 'Defending the security of the accounting system', The CPA Journal, Vol. 70, No. 10, pp.62-67.
-
(2000)
The CPA Journal
, vol.70
, Issue.10
, pp. 62-67
-
-
Luehlfing, M.1
-
15
-
-
49749097504
-
Information technology security engagements: An evolving specialty
-
Available online at
-
Nearon, B.H. (2000) 'Information technology security engagements: An evolving specialty', CPA Journal. Available online at: http://www.nysscpa.org/cpajournal/2000/0700/00-0701Features/ f72800a.htm
-
(2000)
CPA Journal
-
-
Nearon, B.H.1
-
16
-
-
40749112306
-
A dynamic manpower forecasting model for the information security industry
-
Park, S.H., Lee, S.M., Yoon, S.N. and Yeon, S.J. (2008) 'A dynamic manpower forecasting model for the information security industry', Industrial Management & Data Systems, Vol. 108, No. 3, pp.368-384.
-
(2008)
Industrial Management & Data Systems
, vol.108
, Issue.3
, pp. 368-384
-
-
Park, S.H.1
Lee, S.M.2
Yoon, S.N.3
Yeon, S.J.4
-
17
-
-
33846166363
-
Make-buy decisions in the face of technological change: Does industry clockspeed matter?
-
Perrons, R.K. and Platts, K. (2005) 'Make-buy decisions in the face of technological change: Does industry clockspeed matter?', International Journal of Management and Enterprise Development, Vol. 2, No. 1, pp.1-11.
-
(2005)
International Journal of Management and Enterprise Development
, vol.2
, Issue.1
, pp. 1-11
-
-
Perrons, R.K.1
Platts, K.2
-
18
-
-
33645901634
-
An assessment of biometric identities as a standard for e-government service
-
Scott, M., Acton, T. and Highes, M. (2005) 'An assessment of biometric identities as a standard for e-government service', International Journal of Services and Standards, Vol. 1, No. 3, pp.271-286.
-
(2005)
International Journal of Services and Standards
, vol.1
, Issue.3
, pp. 271-286
-
-
Scott, M.1
Acton, T.2
Highes, M.3
-
20
-
-
57349118214
-
Planning for disaster
-
Available online at
-
Smith, L.M. (1994) 'Planning for disaster', CPA Journal. Available online at: http://www.nysscpa.org/cpajournal/old/16097614.htm
-
(1994)
CPA Journal
-
-
Smith, L.M.1
-
22
-
-
33644525159
-
Key factors for small and medium enterprises in Taiwan to successfully implement information systems
-
Wong, T.T. and Lu, Y.T. (2005) 'Key factors for small and medium enterprises in Taiwan to successfully implement information systems', International Journal of Management and Enterprise Development, Vol. 2, No. 2, pp.106-121.
-
(2005)
International Journal of Management and Enterprise Development
, vol.2
, Issue.2
, pp. 106-121
-
-
Wong, T.T.1
Lu, Y.T.2
-
23
-
-
57349110326
-
A framework of security and safety checking for internet-based controls systems
-
Yang, L. and Yang, S.H. (2007) 'A framework of security and safety checking for internet-based controls systems', International Journal of Information and Computer Security, Vol. 1, No. 1/2, pp.185-200.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 185-200
-
-
Yang, L.1
Yang, S.H.2
|