
International Journal of Technology Management
2011 Vol.54 No.2/3
Special Issue on Management of Security Technology and Policy
Guest Editor: Prof. Sangkyun Kim
Pages | Title and author(s) |
135-146 | Linking information engineering and security engineering with a problem solving perspectiveSangkyun Kim DOI: 10.1504/IJTM.2011.039309 |
147-166 | Exploring the relationships between IT capabilities and information security managementShuchih Ernest Chang, Shiou-Yu Chen, Chun-Yen Chen DOI: 10.1504/IJTM.2011.039310 |
167-203 | Securing intellectual assets: integrating the knowledge and innovation dimensionsKevin C. Desouza DOI: 10.1504/IJTM.2011.039311 |
204-228 | Security model applied to electronic records management: experiences and results in the nuclear sectorPedro Solana, Daniel Perez DOI: 10.1504/IJTM.2011.039312 |
229-251 | An integrated approach to the optimal selection of security tools using analytic hierarchy process and goal programmingHoai-Vu Nguyen, Sangmun Shin, Yongsun Choi DOI: 10.1504/IJTM.2011.039313 |
252-269 | IS practitioners' views on core factors of effective IT governance for Taiwan SMEsFengyi Lin, Shuching Chou, Wei-Kang Wang DOI: 10.1504/IJTM.2011.039314 |
270-287 | Auditing methodology on legal compliance of enterprise information systemsSangkyun Kim DOI: 10.1504/IJTM.2011.039315 |
288-303 | Ethical issues for internet use policy: balancing employer and employee perspectivesSharman Lichtenstein DOI: 10.1504/IJTM.2011.039316 |
304-320 | Investigating effects of security incident awareness on information risk perceptionAntonio P. Volpentesta, Salvatore Ammirato, Roberto Palmieri DOI: 10.1504/IJTM.2011.039317 |
321-343 | Technology-push and need-pull roles in information system security diffusionQuey-Jen Yeh, Arthur Jung-Ting Chang DOI: 10.1504/IJTM.2011.039318 |