-
1
-
-
84928617078
-
-
U. S. Patent, Washington, DC: U. S. Patent and Trademark Office.
-
Aboba, B. D., Bensley, S. E., Eitelbach, D. L., Gidwani, N. C., Guittet, M., Palekar, A., & Paul, T. L. (2005). Method of Enforcing A Policy on A Computer Network. U. S. Patent No. 6,941,465. Washington, DC: U. S. Patent and Trademark Office.
-
(2005)
Method of Enforcing A Policy on A Computer Network
-
-
Aboba, B.D.1
Bensley, S.E.2
Eitelbach, D.L.3
Gidwani, N.C.4
Guittet, M.5
Palekar, A.6
Paul, T.L.7
-
2
-
-
9744248703
-
Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues
-
Washington, DC: U. S. Patent and Trademark Office. Alavi, M., & Leidner, D. E. (2001). Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues. MIS quarterly, 107-136.
-
(2001)
MIS Quarterly
, pp. 107-136
-
-
Alavi, M.1
Leidner, D.E.2
-
3
-
-
0040382372
-
How entrepreneurial firms can benefit from alliances with large partners
-
Alvarez, S. A., & Barney, J. B. (2001). How Entrepreneurial Firms Can Benefit From Alliances With Large Partners. The Academy of Management Executive, 15(1), 139-148.
-
(2001)
The Academy of Management Executive
, vol.15
, Issue.1
, pp. 139-148
-
-
Alvarez, S.A.1
Barney, J.B.2
-
4
-
-
0036330919
-
Determinants of innovation through a knowledge-based theory lens
-
Aranda, D. And Fernandez, L. (2002). Determinants of Innovation Through A Knowledge-Based Theory Lens, Industrial Management & Data Systems, Vol. 102 No. 5, pp. 289-96.
-
(2002)
Industrial Management & Data Systems
, vol.102
, Issue.5
, pp. 289-296
-
-
Aranda, D.1
Fernandez, L.2
-
5
-
-
84951415684
-
Licensing tacit knowledge: Intellectual property rights and the market for know-how
-
Arora, A. (1995). Licensing Tacit Knowledge: Intellectual Property Rights and the Market for Know-How. Economics of Innovation and New Technology, 4(1), 41-60.
-
(1995)
Economics of Innovation and New Technology
, vol.4
, Issue.1
, pp. 41-60
-
-
Arora, A.1
-
7
-
-
84986121026
-
What knowledge managers really do: An empirical and comparative analysis
-
Asllani, A. And Luthans, F. (2003). What Knowledge Managers Really Do: An Empirical and Comparative Analysis. Journal of Knowledge Management, Vol. 7 No. 3, pp. 53-66.
-
(2003)
Journal of Knowledge Management
, vol.7
, Issue.3
, pp. 53-66
-
-
Asllani, A.1
Luthans, F.2
-
8
-
-
77958033339
-
The evaluation of policies for knowledge transfer: Some emerging issues
-
Barbieri, E. (2010). The Evaluation of Policies for Knowledge Transfer: Some Emerging Issues. International Journal of Healthcare Technology and Management, 11(4), 263-282.
-
(2010)
International Journal of Healthcare Technology and Management
, vol.11
, Issue.4
, pp. 263-282
-
-
Barbieri, E.1
-
10
-
-
44349117526
-
Governing knowledge risks-design and results of an empirical study
-
Austria
-
Bayer, F. And Maier, R. (2007). Governing Knowledge Risks-Design and Results of an Empirical Study. Proceedings of I-KNOW '07 Graz, Austria, pp 200-208.
-
(2007)
Proceedings of I-KNOW '07 Graz
, pp. 200-208
-
-
Bayer, F.1
Maier, R.2
-
12
-
-
33846813917
-
Information lifecycle security risk assessment: A tool for closing security gaps
-
Bernard, R. (2007). Information Lifecycle Security Risk Assessment: A Tool for Closing Security Gaps. Computers & Security, 26(1), 26-30.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 26-30
-
-
Bernard, R.1
-
13
-
-
84928641946
-
-
U. S. Patent. Washington, DC: U. S. Patent and Trademark Office
-
Beliles Jr, R. P., Farino, M. W., Kolar, M. A., & Twinam, D. C. (2008). Unified Network and Physical Premises Access Control Server. U. S. Patent No. 7,437,755. Washington, DC: U. S. Patent and Trademark Office.
-
(2008)
Unified Network and Physical Premises Access Control Server
-
-
Beliles, R.P.1
Farino, M.W.2
Kolar, M.A.3
Twinam, D.C.4
-
14
-
-
84928602119
-
Comprehensive evaluation model and application of risks of knowledge management in supply chain node enterprises
-
978-1-4244-6484-5
-
Bing Hui Liui and Xiao Qing LI (2010). Comprehensive Evaluation Model and Application of Risks of Knowledge Management in Supply Chain Node Enterprises. 978-1-4244-6484-5 IEEE 2010.
-
(2010)
IEEE 2010
-
-
Hui Liui, B.1
Xiao Qing, L.I.2
-
17
-
-
84928635282
-
Knowledge transfer and the services sector in the context of the new economy
-
Cowan, R., Soete, L., & Tchervonnaya, O. (2001). Knowledge Transfer and the Services Sector in the Context of the New Economy. MERIT, Maastricht Economic Research Institute on Innovation and Technology.
-
(2001)
MERIT, Maastricht Economic Research Institute on Innovation and Technology
-
-
Cowan, R.1
Soete, L.2
Tchervonnaya, O.3
-
19
-
-
34547659242
-
Conflicts between privacy and property: The discourse in personal and organizational knowledge
-
Dulipovici, A., & Baskerville, R. (2007). Conflicts Between Privacy and Property: The Discourse in Personal and Organizational Knowledge. The Journal of Strategic Information Systems, 16(2), 187-213.
-
(2007)
The Journal of Strategic Information Systems
, vol.16
, Issue.2
, pp. 187-213
-
-
Dulipovici, A.1
Baskerville, R.2
-
20
-
-
84979792294
-
IT security outsourcing: How safe is your IT security
-
Fenn, C., Shooter, R., & Allan, K. (2002). IT Security Outsourcing: How Safe Is Your IT Security. Computer Law & Security Review, 18(2), 109-111.
-
(2002)
Computer Law & Security Review
, vol.18
, Issue.2
, pp. 109-111
-
-
Fenn, C.1
Shooter, R.2
Allan, K.3
-
22
-
-
34547418297
-
Trust and knowledge management: The seeds of success
-
Queen's University, Kingston, ON, Canada, (accessed 26 August 2004)
-
Ford, D. (2001). Trust and Knowledge Management: The Seeds of Success. Queen's KBE Center for Knowledge-Based Enterprises, Queen's University, Kingston, ON, Canada, available at: Http://business. queensu. ca/knowledge/workingpapers/working/working-01-08. pdf (accessed 26 August 2004).
-
(2001)
Queen's KBE Center for Knowledge-Based Enterprises
-
-
Ford, D.1
-
23
-
-
0042363355
-
The application of information security policies in large ukbased organizations: An exploratory investigation
-
Fulford, H., & Doherty, N. F. (2003). The Application of Information Security Policies in Large UKBased Organizations: An Exploratory Investigation. Information Management & Computer Security, 11(3), 106-114.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
24
-
-
84928597806
-
Knowledge-intensive business services: Processing knowledge and producing innovation/proceedings of the international conference
-
22 and 23 June 2000
-
Gallouj, F. (2000). Knowledge-intensive Business Services: Processing Knowledge and Producing Innovation/Proceedings of the International Conference "The Economics and Socio-Economics of Services: International Perspectives" (Lille-Roubaix, 22 and 23 June 2000),vol. 2: 57-76.
-
(2000)
The Economics and Socio-Economics of Services: International Perspectives" (Lille-Roubaix
, vol.2
, pp. 57-76
-
-
Gallouj, F.1
-
25
-
-
84928597006
-
Knowledge retrieval process in multinational consulting firms
-
Frederiksberg, Denmark, (accessed 4 September 2004)
-
Gammelgaard, J. And Ritter, T. (2000). Knowledge Retrieval Process in Multinational Consulting Firms. Danish Social Sciences Research Council, Frederiksberg, Denmark, available at: Http://web. cbs. dk/departments/int/seminarpapers/JG-Knowledge. pdf (accessed 4 September 2004).
-
(2000)
Danish Social Sciences Research Council
-
-
Gammelgaard, J.1
Ritter, T.2
-
26
-
-
0027630926
-
Building a learning organization
-
July-August 1993
-
Garvin, D. A. (1993). Building a Learning Organization. Harvard Business Review, July-August 1993, pp. 78-91.
-
(1993)
Harvard Business Review
, pp. 78-91
-
-
Garvin, D.A.1
-
27
-
-
33745850766
-
Legal issues for the knowledge economy in the twenty-first century
-
Gayton, C. M. (2006). Legal Issues for the Knowledge Economy in the Twenty-first Century. Vine, 36(1), 17-26.
-
(2006)
Vine
, vol.36
, Issue.1
, pp. 17-26
-
-
Gayton, C.M.1
-
28
-
-
0031256391
-
Benchmarking the learning capability of organizations
-
Goh, S., & Richards, G. (1997). Benchmarking the Learning Capability of Organizations. European Management Journal, 15(5), 575-583.
-
(1997)
European Management Journal
, vol.15
, Issue.5
, pp. 575-583
-
-
Goh, S.1
Richards, G.2
-
29
-
-
0034906005
-
Knowledge management: An organizational capabilities perspective
-
Gold, A. H., Malhotra, A. And Segars, A. H. (2001). Knowledge Management: An Organizational Capabilities Perspective. Journal of Management Information Systems, Vol. 18 No. 1, pp. 185-214.
-
(2001)
Journal of Management Information Systems
, vol.18
, Issue.1
, pp. 185-214
-
-
Gold, A.H.1
Malhotra, A.2
Segars, A.H.3
-
31
-
-
0038270679
-
Strategic research partnerships: A managerial perspective
-
Hemphill, T., & Vonortas, N. (2003). Strategic Research Partnerships: A Managerial Perspective. Technology Analysis & Strategic Management, 15(2), 255-271.
-
(2003)
Technology Analysis & Strategic Management
, vol.15
, Issue.2
, pp. 255-271
-
-
Hemphill, T.1
Vonortas, N.2
-
32
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
Herath, T., & Rao, H. R. (2009). Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness. Decision Support Systems, 47(2), 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
33
-
-
0026104387
-
Imminent policy considerations in the design and management of national and international computer networks
-
Hoffman, L., & Clark, P. C. (1991). Imminent Policy Considerations in the Design and Management of National and International Computer Networks. Communications Magazine, IEEE, 29(2), 68-74.
-
(1991)
Communications Magazine, IEEE
, vol.29
, Issue.2
, pp. 68-74
-
-
Hoffman, L.1
Clark, P.C.2
-
34
-
-
1342303833
-
Organizational factors that influence university-based researchers' engagement in knowledge transfer activities
-
Jacobson, N., Butterill, D., & Goering, P. (2004). Organizational Factors That Influence University-Based Researchers' Engagement In Knowledge Transfer Activities. Science Communication, 25(3), 246-259.
-
(2004)
Science Communication
, vol.25
, Issue.3
, pp. 246-259
-
-
Jacobson, N.1
Butterill, D.2
Goering, P.3
-
35
-
-
35548990551
-
Security as a contributor to knowledge management success
-
Jennex, M. E., & Zyngier, S. (2007). Security as a Contributor to Knowledge Management Success. Information Systems Frontiers, 9(5), 493-504.
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 493-504
-
-
Jennex, M.E.1
Zyngier, S.2
-
36
-
-
21144472613
-
An empirical analysis of canadian merger policy
-
Khemani R. S. And Shapiro D. M. (1993), "An Empirical Analysis of Canadian Merger Policy", Journal of Industrial Economics, 41(2), 161-177.
-
(1993)
Journal of Industrial Economics
, vol.41
, Issue.2
, pp. 161-177
-
-
Khemani, R.S.1
Shapiro, D.M.2
-
37
-
-
37949036945
-
Using intellectual assets as a success strategy
-
Klaila, D., & Hall, L. (2000). Using Intellectual Assets as a Success Strategy. Journal of Intellectual Capital, 1(1), 47-53.
-
(2000)
Journal of Intellectual Capital
, vol.1
, Issue.1
, pp. 47-53
-
-
Klaila, D.1
Hall, L.2
-
39
-
-
0033449090
-
The role of classification in knowledge representation and discovery
-
Kwasnik, B. H. (2000). The Role of Classification in Knowledge Representation and Discovery. Library Trends, 48(1), 22-47.
-
(2000)
Library Trends
, vol.48
, Issue.1
, pp. 22-47
-
-
Kwasnik, B.H.1
-
41
-
-
18144362124
-
Property, intellectual property, and free riding
-
Lemley, M. A. (2004). Property, Intellectual Property, and Free Riding. Tex L. Rev., 83, 1031.
-
(2004)
Tex L. Rev.
, vol.83
, pp. 1031
-
-
Lemley, M.A.1
-
42
-
-
84870969267
-
Can social exchange theory explain individual knowledge-sharing behaviour? A meta-analysis"
-
Liang, Ting-Peng, Liu, Chin-Chung and Wu, Chia-Itsien. "Can Social Exchange Theory Explain Individual Knowledge-Sharing Behaviour? A Meta-Analysis" (2008), ICIS 2008 Proceedings.
-
(2008)
ICIS 2008 Proceedings
-
-
Liang, T.-P.1
Liu, C.-C.2
Wu, C.-I.3
-
44
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of it misuse
-
Magklaras, G. B., & Furnell, S. M. (2001). Insider Threat Prediction Tool: Evaluating the Probability of IT Misuse. Computers & Security, 21(1), 62-73.
-
(2001)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
47
-
-
34249003431
-
Do formal intellectual property rights hinder the free flow of scientific knowledge: An empirical test of the anti-commons hypothesis
-
Murray, F., & Stern, S. (2007). Do Formal Intellectual Property Rights Hinder the Free Flow of Scientific Knowledge: An Empirical Test of the Anti-commons Hypothesis. Journal of Economic Behavior & Organization, 63(4), 648-687.
-
(2007)
Journal of Economic Behavior & Organization
, vol.63
, Issue.4
, pp. 648-687
-
-
Murray, F.1
Stern, S.2
-
49
-
-
58849130197
-
Usable global network access policy for process control systems
-
Nicol, D. M., Sanders, W. H., Singh, S., & Seri, M. (2008). Usable Global Network Access Policy for Process Control Systems. In IEEE Security & Privacy.
-
(2008)
IEEE Security & Privacy
-
-
Nicol, D.M.1
Sanders, W.H.2
Singh, S.3
Seri, M.4
-
51
-
-
33750982987
-
Computer system attack classification
-
Paulauskas, N., & Garsva, E. (2006). Computer System Attack Classification. Electronics and Electrical Engineering, 2(66), 84-87.
-
(2006)
Electronics and Electrical Engineering
, vol.2
, Issue.66
, pp. 84-87
-
-
Paulauskas, N.1
Garsva, E.2
-
52
-
-
34948828036
-
A strategic risk approach to knowledge management
-
Perrott, B. E. (2007). A Strategic Risk Approach to Knowledge Management. Business Horizons, 50(6), 523-533.
-
(2007)
Business Horizons
, vol.50
, Issue.6
, pp. 523-533
-
-
Perrott, B.E.1
-
53
-
-
84992999005
-
Reducing m &a risk through improved due diligence
-
Perry, J. S., & Herd, T. J. (2004). Reducing M &A Risk Through Improved Due Diligence. Strategy & Leadership, 32(2), 12-19.
-
(2004)
Strategy & Leadership
, vol.32
, Issue.2
, pp. 12-19
-
-
Perry, J.S.1
Herd, T.J.2
-
54
-
-
84928615419
-
Technology initiatives in the new administration
-
Raysman, R., & Brown, P. (2008). Technology Initiatives in the New Administration. Media L. & Pol'y, 18, 95.
-
(2008)
Media L. & Pol'y
, vol.18
, pp. 95
-
-
Raysman, R.1
Brown, P.2
-
56
-
-
77951482187
-
The governance of university-industry knowledge transfer
-
Rossi, F. (2010). The Governance of University-industry Knowledge Transfer. European Journal of Innovation Management, 13(2), 155-171.
-
(2010)
European Journal of Innovation Management
, vol.13
, Issue.2
, pp. 155-171
-
-
Rossi, F.1
-
57
-
-
84928614562
-
Dimensions of knowledge sharing quality: An empirical investigation
-
Sarkheyli, A., Alias, RA, Ithnin, N, Esfahani, MD (2013) "Dimensions of Knowledge Sharing Quality: An Empirical Investigation", Journal of Research and Innovation in Information Systems, UTMSpace.
-
(2013)
Journal of Research and Innovation in Information Systems, UTMSpace
-
-
Sarkheyli, A.1
Alias, R.A.2
Ithnin, N.3
Esfahani, M.D.4
-
60
-
-
84928628329
-
-
U. S. Patent. Washington, DC: U. S. Patent and Trademark Office
-
Singh, A., Gopal, P. M., Bangalore, M. S., & Krishnan, R. S. (2013). Physical Security Triggered Dynamic Network Authentication and Authorization. U. S. Patent No. 8,549,584. Washington, DC: U. S. Patent and Trademark Office.
-
(2013)
Physical Security Triggered Dynamic Network Authentication and Authorization
-
-
Singh, A.1
Gopal, P.M.2
Bangalore, M.S.3
Krishnan, R.S.4
-
61
-
-
0038089969
-
Knowledge transfer from universities to business: Returns for all stakeholders
-
Stevens, J. M., & Bagby, J. W. (2001). Knowledge Transfer from Universities to Business: Returns for All Stakeholders. Organization, 8(2), 259-268.
-
(2001)
Organization
, vol.8
, Issue.2
, pp. 259-268
-
-
Stevens, J.M.1
Bagby, J.W.2
-
62
-
-
84555222620
-
Knowledge management in public organizations: A study on the relationship between organizational elements and the performance of knowledge transfer
-
Syed-Ikhsan, S. And Rowland, F. (2004). Knowledge Management in Public Organizations: A Study on the Relationship Between Organizational Elements and the Performance of Knowledge Transfer. Journal of Knowledge Management, Vol. 8 No. 2, pp. 95-111.
-
(2004)
Journal of Knowledge Management
, vol.8
, Issue.2
, pp. 95-111
-
-
Syed-Ikhsan, S.1
Rowland, F.2
-
63
-
-
0031230342
-
Needed: A new system of intellectual property rights
-
Thurow, L. C. (1997). Needed: A New System of Intellectual Property Rights. Harvard Business Review, 75, 94-107.
-
(1997)
Harvard Business Review
, vol.75
, pp. 94-107
-
-
Thurow, L.C.1
-
65
-
-
68049123109
-
A study of ontology-based risk management framework of construction projects through project life cycle
-
Tserng, H. P., Yin, S. Y., Dzeng, R. J., Wou, B., Tsai, M. D., & Chen, W. Y. (2009). A Study of Ontology-Based Risk Management Framework Of Construction Projects Through Project Life Cycle. Automation in Construction, 18(7), 994-1008.
-
(2009)
Automation in Construction
, vol.18
, Issue.7
, pp. 994-1008
-
-
Tserng, H.P.1
Yin, S.Y.2
Dzeng, R.J.3
Wou, B.4
Tsai, M.D.5
Chen, W.Y.6
-
66
-
-
0036299647
-
The development of access control policies for information technology systems
-
Ward, P., & Smith, C. L. (2002). The Development of Access Control Policies for Information Technology Systems. Computers & Security, 21(4), 356-371.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 356-371
-
-
Ward, P.1
Smith, C.L.2
-
67
-
-
74949143896
-
Internet of things-new security and privacy challenges
-
Weber, R. H. (2010). Internet of Things-New Security and Privacy Challenges. Computer Law & Security Review, 26(1), 23-30.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
69
-
-
1242265154
-
In defense of the realm: Understanding the threats to information security
-
Whitman, M. E. (2004). In Defense of the Realm: Understanding the Threats to Information Security. International Journal of Information Management, 24(1), 43-57.
-
(2004)
International Journal of Information Management
, vol.24
, Issue.1
, pp. 43-57
-
-
Whitman, M.E.1
-
70
-
-
85010089902
-
Intellectual property rights systems and the assemblage of local knowledge systems
-
Vermeylen, S., Martin, G., & Clift, R. (2008). Intellectual Property Rights Systems and the Assemblage of Local Knowledge Systems. International Journal of Cultural Property, 15(02), 201-221.
-
(2008)
International Journal of Cultural Property
, vol.15
, Issue.2
, pp. 201-221
-
-
Vermeylen, S.1
Martin, G.2
Clift, R.3
-
71
-
-
11744309038
-
Information security management (2): Guidelines to the management of information technology security (gmits)
-
Von Solms, R. (1998). Information Security Management (2): Guidelines to the Management of Information Technology Security (GMITS). Information Management & Computer Security, 6(5), 221-223.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.5
, pp. 221-223
-
-
Von Solms, R.1
-
72
-
-
0001897127
-
Information security management: Why standards are important
-
Von Solms, R. (1999). Information Security Management: Why Standards Are Important. Information Management & Computer Security, 7(1), 50-58.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.1
, pp. 50-58
-
-
Von Solms, R.1
-
73
-
-
2142764324
-
Glossary of industrial organisation economics and competition law
-
Centre for Co-operation with the European Economies in Transition, & Organisation for Economic Co-operation and Development. Washington, DC: OECD Publications and Information Centre.
-
Zecchini,S. ,Centre for Co-operation with the European Economies in Transition, & Organisation for Economic Co-operation and Development. (1993). Glossary of industrial Organisation Economics and Competition Law. Organisation for Economic Co-operation and Development; Washington, DC: OECD Publications and Information Centre.
-
(1993)
Organisation for Economic Co-operation and Development
-
-
Zecchini, S.1
|