Skip to main content
padlock icon - secure page this page is secure

Publisher: Emerald Group Publishing Limited

Volume 22, Number 3, 2014

Favourites:
ADD

A holistic cyber security implementation framework
pp. 251-264(14)
Authors: Atoum, Issa; Otoom, Ahmed; Ali, Amer Abu

Favourites:
ADD

A cyclical evaluation model of information security maturity
pp. 265-278(14)
Authors: Rigon, Evandro Alencar; Westphall, Carla Merkle; Santos, Daniel Ricardo dos; Westphall, Carlos Becker

Favourites:
ADD

Information security: Critical review and future directions for research
pp. 279-308(30)
Authors: Silic, Mario; Back, Andrea

Favourites:
ADD

A secure portable execution environment to support teleworking
pp. 309-330(22)
Authors: James, Peter; Griffiths, Don

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more