nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An examination of private intermediaries’ roles in software vulnerabilities disclosure
|
Li, Pu |
|
2007 |
9 |
5 |
p. 531-539 |
artikel |
2 |
An interorganizational knowledge-sharing security model with breach propagation detection
|
Soper, Daniel S. |
|
2007 |
9 |
5 |
p. 469-479 |
artikel |
3 |
Managing the false alarms: A framework for assurance and verification of surveillance monitoring
|
Goldschmidt, Peter |
|
2007 |
9 |
5 |
p. 541-556 |
artikel |
4 |
Overcoming organizational challenges to secure knowledge management
|
Sveen, Finn Olav |
|
2007 |
9 |
5 |
p. 481-492 |
artikel |
5 |
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
|
Zuo, Yanjun |
|
2007 |
9 |
5 |
p. 451-467 |
artikel |
6 |
Security as a contributor to knowledge management success
|
Jennex, Murray E. |
|
2007 |
9 |
5 |
p. 493-504 |
artikel |
7 |
Security as a contributor to knowledge management success
|
Jennex, Murray E. |
|
|
9 |
5 |
p. 493-504 |
artikel |
8 |
Sharing information and building trust through value congruence
|
Cazier, Joseph A. |
|
2007 |
9 |
5 |
p. 515-529 |
artikel |
9 |
Special issue on secure knowledge management
|
Memon, Nasir |
|
2007 |
9 |
5 |
p. 449-450 |
artikel |
10 |
Virtual organization security policies: An ontology-based integration approach
|
Muthaiyah, Saravanan |
|
2007 |
9 |
5 |
p. 505-514 |
artikel |