Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
6 SI
Page No.
5238 - 5242
References
Belsis, P., S. Kokolakis and E. Kiountouzis, 2005. Information systems security from a knowledge management perspective. Inform. Manage. Comput. Secur., 13: 189-202.
CrossRef | Direct Link | Brint Institute, 2007. Business technology management and knowledge management research network. Brint Institute, Washington, D.C., USA.
Cassidy, A., 1998. A Practical Guide to Information Systems Planning. St. Lucie Press, Boca Raton, Florida, ISBN:1-57444-133-7, Pages: 283.
Computerworld, Inc., 2007. IT world. Computerworld, Inc., Washington, DC., USA.
Davis, B.J., 2005. Prepare: Seeking systemic solutions for technological crisis management. Knowl. Process Manage., 12: 123-131.
CrossRef | Direct Link | Ernst and Young, 2002. Global information security survey. Ernst&Young, London, UK.
Garg, A., J. Curtis and H. Halper, 2003. Quantifying the financial impact of IT security breaches. Inf. Manage. Comput. Secur., 11: 74-83.
Direct Link | Gordon, L.A., M.P. Loeb, W. Lucyshyn and R. Richardson, 2006. CSI-FBI computer crime and security survey. Comput. Secur. J., 22: 1-1.
Direct Link | Guenther, M., 2004. Security-privacy compliance: Culture change. EDPACS., 31: 19-24.
Direct Link | Hong, K.S., Y.P. Chi, L.R. Chao and J.H. Tang, 2003. An integrated system theory of information security management. Inf. Manage. Comput. Secur., 11: 243-248.
Direct Link | Philip, P. and A. Mani, 2017. Connect among employee engagement and three key of organisational commitment level an empirical exploration AMID techs. Intl. J. Mech. Eng. Technol., 8: 296-303.
Direct Link | Poongavanam, S., 2017. The influence of internal locus of control on personal and job orinted factors. Intl. J. Econ. Res., 14: 273-279.
Direct Link |