Font Size: a A A
Keyword [Cyber]
Result: 81 - 100 | Page: 5 of 6
81. Research On The Advertising Distribution Method Based On Urban Public Transport Vehicles In The Vehicle Cyber-physical System
82. Decision-making uncertainty and the use of force in cyberspace: A phenomenological study of military officers
83. Optimal investment in IS security: A game theoretical approach
84. Users' adoption of emergent technologies: Towards an acceptable model for safer cyber-assisted olfactory information exchanges in standard, micro, and nano systems
85. Minimax envelopes for total cyber risk management in process control networks
86. Mitigation and transfer of information security risk: Investment in financial instruments and technology
87. Organizational Decisions about Cyber Security in Small to Mid-Sized Businesses: A Qualitative Study
88. Project management education research excellence within cyber-infrastructure environment
89. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks
90. An interdisciplinary evaluation of transactive memory in distributed cyber teams
91. Cyber-Slovenia: State, territoriality and place marketing online
92. Cyber-vetting: Exploring the implications of online information for career capital and human capital decisions
93. Electronic commerce: A study to develop a general model for the cyber -mediaries during the electronic commerce age
94. Generational differences in the factors affecting organizational cyber security awareness: A quantitative study
95. Interactivity and the 'cyber-fan': An exploration of audience involvement within the electronic fan culture of the Internet
96. The value of cyber security in small business
97. Dynamic programming under parametric uncertainty with applications in cyber security and project management
98. Recommendations to implement a cyber incident response plan in Oneida County, New York
99. Cyber-Attack, Intellectual Property Theft, and Organizations' Continuance Intention to Use Cloud Computing: A Quantitative Correlational Stud
100. Analyzing and mitigating cybersecurity risks faced by small businesses
  <<First  <Prev  Next>  Last>>  Jump to