ANTE 发表于 2025-3-23 11:01:41

Citation Analysis in Research Evaluationch has as a starting point the overall business goals and objectives. Based on those it aids the development of a strategy from the lower levels of securing data in storage and transition to the higher levels of business processes. Its use and applicability is demonstrated over ‘Billing Mall’ - a system for Electronic Bill Presentment and Payment.

Canyon 发表于 2025-3-23 14:29:04

A Case Study of Research Performance in Lawlack of a working security model. Having documented the local security scenario, the security officer requires some means to extract security relevant information, e.g. to advise management on the current state of organizational security and to recommend security priorities. This paper concludes with a discussion on such a security model.

粗糙滥制 发表于 2025-3-23 21:01:58

http://reply.papertrans.cn/15/1484/148382/148382_13.png

问到了烧瓶 发表于 2025-3-23 22:14:49

Basic Notions and General Conclusionsions: mobile users, mobile hardware and mobile software. The analysis of the three dimensions can determine the characteristics of the specific implementation and needed security measures. Specific security measures for mobile hardware, mobile users and mobile software are also discussed.

ACRID 发表于 2025-3-24 06:09:44

https://doi.org/10.1007/b116849Information Technology (IT); Processing; access control; computer; computer science; control; data securit

Collar 发表于 2025-3-24 10:29:07

978-1-4757-7496-2IFIP International Federation for Information Processing 2001

Antecedent 发表于 2025-3-24 12:55:45

Citation Analysis in Research EvaluationThe paper gives a factual account of a two-year information security project based on the well-known BS 7799 carried out in The Netherlands. It describes the project organisation, the various sub- projects and the results achieved, and focuses on experiences from which other security professionals may potentially benefit.

BARGE 发表于 2025-3-24 16:45:03

http://reply.papertrans.cn/15/1484/148382/148382_18.png

行乞 发表于 2025-3-24 22:14:33

http://reply.papertrans.cn/15/1484/148382/148382_19.png

CHAFE 发表于 2025-3-25 02:55:17

http://reply.papertrans.cn/15/1484/148382/148382_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Information Security Management & Small Systems Security; IFIP TC11 WG11.1/WG1 Jan H. P. Eloff,Les Labuschagne,Gurpreet Dhillon