Skip to Main Content
Bellevue University
LibGuides
Library
MSSM
Journal Articles
Search this Guide
Search
MSSM: Journal Articles
Home
MSSM 501
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 506
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 517
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 523
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 602
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 607
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 618
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 624
Toggle Dropdown
E-Books
Journal Articles
Videos
Additional Resources
Libguide Curator
Lorraine Patrick
Email Me
Schedule Appointment
Contact:
Bellevue University
Freeman/Lozier Library
1000 Galvin Rd. S.
402-557-7313
MSSM 607 Journal Articles
Bolster your data defenses.
by
Lanz, J.
Journal of Accountancy. (2016). Vol. 222(2), p22.
Building a secure enterprise model for cloud computing environment.
by
Srinivasan, M.
Academy of Information and Management Sciences Journal(2012). Vol.15(1): 127-133.
Fuzzy modeling for information security management issues in cloud computing.
by
Lin, G., Chih - Chieh L., Chou, C. J., Lee, Y.C.
International Journal of Fuzzy Systems (2014).Vol. 16(4), p529-540.
Identifying factors of "organizational information security management."
by
Narain S., Abhishek, G. & Ojha, A.
Journal of Enterprise Information Management; Bradford Vol. 27.5 (2014): 644-667.
Information system security and risk management: Issues and impact on organizations.
by
Gupta, S., Saini, A.
Global Journal of Enterprise Information System, (2013). Vol. 5 Issue 1, p. 31-35.
Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity and protection-motivated behaviors.
by
Posey, C., Roberts, T., Lowry, P., Bennett, R.Courtney, J.
MIS Quarterly (2013), Vol. 37(4), p.1189-A9.
Management information systems and the protection of private Information: An ethical framework for decision makers in organizations.
by
McCarthy, V. & Plummer, J.
Journal of Information Systems Technology & Planning. (2016). Vol. 8 (19), p128-136.
Protection in the cloud: Risk management and insurance for cloud computing.
by
Gold, J.
Journal of Internet Law (2012). Vol. 15 (12), p1-
28.
<<
Previous:
E-Books
Next:
Videos >>