標(biāo)題: Titlebook: Managing Information System Security; Gurpreet Dhillon Textbook 1997Latest edition Gurpreet Dhillon 1997 information system.security.syste [打印本頁] 作者: 調(diào)停 時(shí)間: 2025-3-21 18:14
書目名稱Managing Information System Security影響因子(影響力)
書目名稱Managing Information System Security影響因子(影響力)學(xué)科排名
書目名稱Managing Information System Security網(wǎng)絡(luò)公開度
書目名稱Managing Information System Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Managing Information System Security被引頻次
書目名稱Managing Information System Security被引頻次學(xué)科排名
書目名稱Managing Information System Security年度引用
書目名稱Managing Information System Security年度引用學(xué)科排名
書目名稱Managing Information System Security讀者反饋
書目名稱Managing Information System Security讀者反饋學(xué)科排名
作者: Irascible 時(shí)間: 2025-3-21 22:47 作者: probate 時(shí)間: 2025-3-22 03:16 作者: hurricane 時(shí)間: 2025-3-22 07:18
The case of managing IS and security in a Local Council,he time of the study there was an initiative within the Council to introduce a ‘federal’ IT infrastructure. This was happening amidst increased socio-political and economic pressures. Indeed the case study was selected because of the ongoing change programme.作者: 剛毅 時(shí)間: 2025-3-22 10:53
Principles for managing information system security,erately avoid considering problems as a consequence of a systems function. They are viewed as an emergent property of reflexive interaction between a system and its context. Four major themes are identified: the security policy itself; evaluation of security; design considerations in security; implementing information system security.作者: 波動(dòng) 時(shí)間: 2025-3-22 16:21
Conclusion, to bring together some key ideas and identify the contributions of this book. Concepts about the nature of information system security, the management of information system security and the crisis regarding the use of technology are presented.作者: 珍奇 時(shí)間: 2025-3-22 20:40
The case of managing IS and security in a Hospital Trust, and the existing ones changed. Indeed, the case study was selected primarily because of these factors. The analysis of these structures, formal and informal, provides insight into the management of information system security.作者: visceral-fat 時(shí)間: 2025-3-22 23:46 作者: Pericarditis 時(shí)間: 2025-3-23 02:14
A framework for interpreting the management of IS security,natural sciences. One indeed questions the appropriateness of these methods (Galliers 1991; 1993; Hirschheim 1985). This also raises questions as to how such methods will help a practitioner in the management of information system security.作者: 歡騰 時(shí)間: 2025-3-23 07:23
Textbook 1997Latest editionThe book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors.作者: 儲(chǔ)備 時(shí)間: 2025-3-23 09:57
https://doi.org/10.1007/978-1-349-14454-9information system; security; systems security作者: constellation 時(shí)間: 2025-3-23 14:02
Information Systems Serieshttp://image.papertrans.cn/m/image/623073.jpg作者: 代理人 時(shí)間: 2025-3-23 21:39 作者: Decibel 時(shí)間: 2025-3-23 23:53
Overview: The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors.978-0-333-69260-8作者: capillaries 時(shí)間: 2025-3-24 04:29 作者: Alveolar-Bone 時(shí)間: 2025-3-24 06:34 作者: cardiac-arrest 時(shí)間: 2025-3-24 13:59 作者: 漫步 時(shí)間: 2025-3-24 15:29 作者: sorbitol 時(shí)間: 2025-3-24 21:50 作者: STENT 時(shí)間: 2025-3-24 23:28
The case of managing IS and security in a Hospital Trust,Trust. At the time of the study most of the system modules had been developed and were being tested largely for technical aspects. The system was being introduced during a period when the organisation was experiencing significant changes. It was an environment where new structures were being created作者: 并入 時(shí)間: 2025-3-25 05:47
The case of managing IS and security in a Local Council, to develop an insight into the systems in place, the Public Services and Works department, the biggest unit within the Council, was sampled out. At the time of the study there was an initiative within the Council to introduce a ‘federal’ IT infrastructure. This was happening amidst increased socio-作者: 膽小鬼 時(shí)間: 2025-3-25 08:10
Principles for managing information system security,agement of information system security. Maintaining the interpretive mode adopted in this book, various elements of this synthesised perspective deliberately avoid considering problems as a consequence of a systems function. They are viewed as an emergent property of reflexive interaction between a 作者: 咯咯笑 時(shí)間: 2025-3-25 14:08 作者: Keshan-disease 時(shí)間: 2025-3-25 18:02
6樓作者: 灰心喪氣 時(shí)間: 2025-3-25 21:00
6樓作者: 帽子 時(shí)間: 2025-3-26 03:05
7樓作者: calumniate 時(shí)間: 2025-3-26 06:21
7樓作者: 用樹皮 時(shí)間: 2025-3-26 10:22
7樓作者: 充氣球 時(shí)間: 2025-3-26 12:38
7樓作者: 委派 時(shí)間: 2025-3-26 20:08
8樓作者: 人造 時(shí)間: 2025-3-26 22:07
8樓作者: 抓住他投降 時(shí)間: 2025-3-27 01:52
8樓作者: 澄清 時(shí)間: 2025-3-27 09:13
8樓作者: 直言不諱 時(shí)間: 2025-3-27 10:24
9樓作者: Accede 時(shí)間: 2025-3-27 14:23
9樓作者: Mere僅僅 時(shí)間: 2025-3-27 19:38
9樓作者: 極為憤怒 時(shí)間: 2025-3-28 00:47
9樓作者: Conspiracy 時(shí)間: 2025-3-28 02:40
10樓作者: 人類學(xué)家 時(shí)間: 2025-3-28 06:19
10樓作者: surmount 時(shí)間: 2025-3-28 12:14
10樓作者: 提名 時(shí)間: 2025-3-28 16:03
10樓