X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
risk management (3) 3
studies (3) 3
business communication (2) 2
computer security (2) 2
electronic mail messages (2) 2
electronic warfare (2) 2
information security (2) 2
information systems (2) 2
information warfare (2) 2
knowledge management (2) 2
management (2) 2
security management (2) 2
164 (1) 1
abridged index medicus (1) 1
administrative communication (1) 1
adult (1) 1
age of onset (1) 1
allele (1) 1
alleles (1) 1
articles (1) 1
availability (1) 1
bias (1) 1
books (1) 1
business (1) 1
business & economics (1) 1
business & economics / industrial management (1) 1
business & economics / management (1) 1
business & economics / management science (1) 1
business & economics / organizational behavior (1) 1
business communication /fst00842419 (1) 1
business ethics (1) 1
calibration (1) 1
censorship (1) 1
chromosomes (1) 1
clinical neurology (1) 1
cognition (1) 1
cognitive style (1) 1
commonality (1) 1
communicating (1) 1
communication, administrative (1) 1
communication, business (1) 1
communication, industrial (1) 1
computer crime (1) 1
computer information security (1) 1
computer networks (1) 1
computer science, interdisciplinary applications (1) 1
computer viruses (1) 1
conferences (1) 1
confidentiality (1) 1
core competencies (1) 1
cox model (1) 1
criminal investigations (1) 1
cultural groups (1) 1
cultural history (1) 1
cultural values (1) 1
cybersecurity (1) 1
cyberspace (1) 1
data encryption (1) 1
data integrity (1) 1
data protection (1) 1
data security (1) 1
documents (1) 1
e-mail correspondence (1) 1
e-mail messages (1) 1
ecology (1) 1
education (1) 1
electronic books (1) 1
electronic mail messages /fst00907328 (1) 1
electronic mail systems (1) 1
email (1) 1
email correspondence (1) 1
email messages (1) 1
engineering, industrial (1) 1
espionage (1) 1
executives (1) 1
expert elicitation (1) 1
failure analysis (1) 1
failure time analysis (1) 1
female (1) 1
gene (1) 1
genotype (1) 1
guidelines (1) 1
homozygosity (1) 1
humans (1) 1
huntington disease - diagnosis (1) 1
huntington disease - genetics (1) 1
index medicus (1) 1
industrial communication (1) 1
industrial management (1) 1
information economics (1) 1
information infrastructure (1) 1
information management (1) 1
information operations (1) 1
information technology (1) 1
infrastructure (1) 1
infrastructure failures (1) 1
integrity (1) 1
judgment (1) 1
judgments (1) 1
kaplan meier estimator (1) 1
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2015, 1, ISBN 9780128001103, xii, 80
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by... 
Electronic mail messages | Business communication | Moral and ethical aspects | Business ethics | Electronic mail systems | Malware | Email | Computer viruses | Security measures | Spam filtering (Electronic mail)
Book
VINE Journal of Information and Knowledge Management Systems, ISSN 2059-5891, 07/2017, Volume 47, Issue 3, p. 337
Purpose This paper aims to clarify the need for Chief Knowledge Officers (CKOs) and explain how some recent views on competencies for educational guidelines, a... 
Core competencies | Executives | Library management | Documents | Knowledge management | Organization theory
Journal Article
Computers & Operations Research, ISSN 0305-0548, 04/2012, Volume 39, Issue 4, p. 774
In the information security business, 30 years of practical and theoretical research has resulted in a fairly sophisticated appreciation for how to judge the... 
Studies | Data integrity | Security management | Network security | Risk management | Judgment
Journal Article
2016 49th Hawaii International Conference on System Sciences (HICSS), ISSN 1530-1605, 01/2016, Volume 2016-, pp. 4313 - 4322
The Unified Theory of Knowledge Management (KM) answers decade long calls for a general model of KM by identifying one based on required KM competencies.... 
KM Competencies | Organizations | Cognition | Knowledge management | Knowledge Management Theory | Modeling | Guidelines | Information systems | Commonality | Conferences | Education | Systems engineering | Lists | Communicating
Conference Proceeding
Computers and Operations Research, ISSN 0305-0548, 2012, Volume 39, Issue 4, pp. 774 - 784
Journal Article
Risk Analysis, ISSN 0272-4332, 02/2005, Volume 25, Issue 1, pp. 141 - 149
Journal Article
Neurology, ISSN 0028-3878, 03/2012, Volume 78, Issue 10, pp. 690 - 695
Objective: Age at onset of diagnostic motor manifestations in Huntington disease (HD) is strongly correlated with an expanded CAG trinucleotide repeat. The... 
HOMOZYGOSITY | ALLELE | OF-ONSET | GENE | LENGTH | MUTATION | CHROMOSOMES | CLINICAL NEUROLOGY | TRINUCLEOTIDE REPEAT | Humans | Age of Onset | Alleles | Huntington Disease - genetics | Adult | Female | Genotype | Huntington Disease - diagnosis | Male | Trinucleotide Repeat Expansion | 164
Journal Article
Journal of Information Warfare, ISSN 1445-3312, 07/2016, Volume 15, Issue 3, pp. 24 - 34
Managers of critical information infrastructures need better tools for managing risk than the qualitative or compliance-based metrics commonly used today in... 
Criminal investigations | Information management | Computer crime | Information warfare | Studies | Privacy | Researchers | Security management | Data encryption | Failure analysis | Espionage | Infrastructure | Risk management | Computer security
Journal Article
Journal of Information Warfare, ISSN 1445-3312, 07/2016, Volume 15, Issue 3, pp. 1 - 6
People are important: they design, use, and defend information systems, and are the targets of 'softer' information operations. People can be understood from... 
Studies | Teaching methods | Bias | Personality traits | Strategic planning | Personality | Research | Cognitive style | Propaganda | Books | Information warfare | Information systems
Journal Article
01/2006, ISBN 0542718553
Species' distributions are ultimately the product of both contemporary ecological factors that influence the abilities of populations to persist in given... 
Zoology | Ecology
Dissertation
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.