Journal cover image

Browse issues


Vol. 73
Vol. 72
Vol. 71
Vol. 70
Vol. 69
Vol. 68
Vol. 67
Vol. 66
Vol. 65
Vol. 64
Vol. 63
Vol. 62
Vol. 61
Vol. 60
Vol. 59
Vol. 58
Vol. 57
Vol. 56
Vol. 55
Vol. 54
Vol. 53
Vol. 52
Vol. 51
Vol. 50
Vol. 49
Vol. 48
Vol. 47
Vol. 46
Vol. 45
Vol. 44
Vol. 43
Vol. 42
Vol. 41
Vol. 40
Vol. 39
Vol. 38
Vol. 37
Vol. 36
Vol. 35
Vol. 34
Vol. 33
Vol. 32
Vol. 31
Vol. 30
Vol. 29
Vol. 28
Vol. 27
Vol. 26
Vol. 25
Vol. 24
Vol. 23
Vol. 22
Vol. 21
Vol. 20
Vol. 19
Vol. 18
Vol. 17
Vol. 16
Vol. 15
Vol. 14
Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Technology Management

2011 Vol. 54 No. 2/3

Special Issue on Management of Security Technology and Policy

Guest Editor: Prof. Sangkyun Kim

 

Editorial: Recent advances in security management
PagesTitle and authors
135-146Linking information engineering and security engineering with a problem solving perspective
Sangkyun Kim
DOI: 10.1504/IJTM.2011.039309

147-166Exploring the relationships between IT capabilities and information security management
Shuchih Ernest Chang, Shiou-Yu Chen, Chun-Yen Chen
DOI: 10.1504/IJTM.2011.039310

167-203Securing intellectual assets: integrating the knowledge and innovation dimensions
Kevin C. Desouza
DOI: 10.1504/IJTM.2011.039311

204-228Security model applied to electronic records management: experiences and results in the nuclear sector
Pedro Solana, Daniel Perez
DOI: 10.1504/IJTM.2011.039312

229-251An integrated approach to the optimal selection of security tools using analytic hierarchy process and goal programming
Hoai-Vu Nguyen, Sangmun Shin, Yongsun Choi
DOI: 10.1504/IJTM.2011.039313

252-269IS practitioners' views on core factors of effective IT governance for Taiwan SMEs
Fengyi Lin, Shuching Chou, Wei-Kang Wang
DOI: 10.1504/IJTM.2011.039314

270-287Auditing methodology on legal compliance of enterprise information systems
Sangkyun Kim
DOI: 10.1504/IJTM.2011.039315

288-303Ethical issues for internet use policy: balancing employer and employee perspectives
Sharman Lichtenstein
DOI: 10.1504/IJTM.2011.039316

304-320Investigating effects of security incident awareness on information risk perception
Antonio P. Volpentesta, Salvatore Ammirato, Roberto Palmieri
DOI: 10.1504/IJTM.2011.039317

321-343Technology-push and need-pull roles in information system security diffusion
Quey-Jen Yeh, Arthur Jung-Ting Chang
DOI: 10.1504/IJTM.2011.039318