-
Continuous Auditing and Reporting-The Fourth World Symposium
British Library Online Contents | 2002| -
Control and Governance Maturity Survey: Establishing a Reference Benchmark and a Self-assessment Tool
British Library Online Contents | 2002| -
CPO Position Joins Executive Ranks As increased importance is placed on privacy and the ethical issues surrounding privacy, many companies have created a new executive-level position called chief privacy officer (CPO). The author discusses the role of the CPO in todays corporate environment
British Library Online Contents | 2001| -
Creating the Privacy Complaint Organization The concept of personal information privacy, and the rights of citizens to protect themselves has caused governments to begin to consider enacting personal information privacy legislation. This article addresses the process under which a company can become privacy complaint, adhering to the specific requirements of the legislation under which it operates
British Library Online Contents | 2001| -
Cross-Border Privacy Impact Assessments: An Introduction Organizations doing business in multiple jurisdictions are subject to regulatory and cultural variances on what data are protected, how the data must be protected, and what rights are afforded to the enterprise, the regulators and the individual. The author introduces a cross-border privacy impact assessment model
British Library Online Contents | 2001| -
Cybersecurity and the Future of E-commerce: The Role of the Audit Community
British Library Online Contents | 2001| -
Defeating the Cyber Criminal: Defense Tactics for Denial of Service Attacks
British Library Online Contents | 2000| -
differing, demand-driven international standards developed and disseminated after the market has decided which is best, not before
British Library Online Contents | 2001| -
Disaster Recovery and Business Continuity Planning: Testing an Organization's Plans
British Library Online Contents | 2002| -
E-commerce and Smart Cards The author discusses the smart card with a C-SET protocol for online authentication as a solution to online security concerns. With smart cards, it is possible to accomplish a complete authentication process, through the use of a personal identification number known only by the owner
British Library Online Contents | 2001| -
e-Commerce Security-Network Perimeter Security By Deloitte & Touche
British Library Online Contents | 2003| -
E-commerce Security-Public Key Infrastructure: Good Practices for Secure Communications
British Library Online Contents | 2001| -
e-Commerce Security: Trading Partner Identification, Registration and Enrollment
British Library Online Contents | 2002|
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.