Pages | Title and authors |
135-146 | Linking information engineering and security engineering with a problem solving perspective Sangkyun Kim DOI: 10.1504/IJTM.2011.039309 |
147-166 | Exploring the relationships between IT capabilities and information security management Shuchih Ernest Chang, Shiou-Yu Chen, Chun-Yen Chen DOI: 10.1504/IJTM.2011.039310 |
167-203 | Securing intellectual assets: integrating the knowledge and innovation dimensions Kevin C. Desouza DOI: 10.1504/IJTM.2011.039311 |
204-228 | Security model applied to electronic records management: experiences and results in the nuclear sector Pedro Solana, Daniel Perez DOI: 10.1504/IJTM.2011.039312 |
229-251 | An integrated approach to the optimal selection of security tools using analytic hierarchy process and goal programming Hoai-Vu Nguyen, Sangmun Shin, Yongsun Choi DOI: 10.1504/IJTM.2011.039313 |
252-269 | IS practitioners' views on core factors of effective IT governance for Taiwan SMEs Fengyi Lin, Shuching Chou, Wei-Kang Wang DOI: 10.1504/IJTM.2011.039314 |
270-287 | Auditing methodology on legal compliance of enterprise information systems Sangkyun Kim DOI: 10.1504/IJTM.2011.039315 |
288-303 | Ethical issues for internet use policy: balancing employer and employee perspectives Sharman Lichtenstein DOI: 10.1504/IJTM.2011.039316 |
304-320 | Investigating effects of security incident awareness on information risk perception Antonio P. Volpentesta, Salvatore Ammirato, Roberto Palmieri DOI: 10.1504/IJTM.2011.039317 |
321-343 | Technology-push and need-pull roles in information system security diffusion Quey-Jen Yeh, Arthur Jung-Ting Chang DOI: 10.1504/IJTM.2011.039318 |