Indices
This title is listed in the following:
Close
Reference Hub
This research has been cited in:
Conference
Using Nature to Best Clarify Computer Security and Threats2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing10.1109/DASC.2009.51 Article
Perceptions of Business Students' Feature Requirements in Educational Web SitesDecision Sciences Journal of Innovative Education10.1111/j.1540-4609.2007.00145.x Article
PERCEPTION TYPES OF HOME BUYERS BY Q METHODOLOGY: A COMPARATIVE STUDY OF HONG KONG, TAIWAN, AND THE USAThe Singapore Economic Review10.1142/S0217590817430093 Article
Systematic Literature Review on Usability of Firewall ConfigurationACM Computing Surveys10.1145/3130876 Article
Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the FutureInformation Systems Management10.1080/10580530.2011.562127 Chapter
Chapter
Analysis of User Involvement and Participation on the Quality of IS Planning ProjectsOrganizational and End-User Interactions10.4018/978-1-60960-577-3.ch014 Chapter
Chapter
Chapter
Close Top Results From Your Most Recent Search
Close