Citations
The paper
has been cited by the following works.
- V. Dimopoulos
and S. Furnell.
A protection profiles approach to risk analysis for small and medium
enterprises.
IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security
Management, Integrity, and Internal Control in Information Systems,
193:267–283, 2005.
- V. Dimopoulos
and S. Furnell.
A protection profiles approach to risk analysis for small and medium
enterprises.
IFIP International Federation for Information Processing, 193,
2006.
- R. Halonen,
H. Haapala, T. Acton, K. Conboy, and W. Golden.
Information systems — unavoidable nuisances in combining local
administratives?
In 22nd Bled eConference - eEnablement: Facilitating an Open, Effective
and Representative eSociety, pages 532–545. Bled eCommerce
Conference, 2009.
- T. Tsiakis and
P. Katsaros.
Hands on dependability economics.
In Proceedings — 2009 2nd International Conference on Dependability,
DEPEND 2009, pages 117–121, 2009.
(doi:10.1109/DEPEND.2009.24)
- J.R. Ikoja-Odongo.
Information security policies, volume 1.
IGI Global, 2010.
(doi:10.4018/978-1-61520-847-0.ch025)
- N. Anwar, M.N. Masrek, and
Y.R. Rambli.
Moderating effect between information systems resources and information
security: A conceptual framework.
In ISBEIA 2011 - 2011 IEEE Symposium on Business, Engineering and
Industrial Applications, pages 247–252, 2011.
(doi:10.1109/ISBEIA.2011.6088815)
- M.S. Nikabadi.
A framework for technology-based factors for knowledge management in supply
chain of auto industry.
VINE, 44(3):375–393, 2014.
(doi:10.1108/VINE-09-2013-0057)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.