Supply chain risk management practices for federal information systems and organizations Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Supply chain risk management practices for federal information systems and organizations
The fundamental theorem of arithmetic Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about The fundamental theorem of arithmetic
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
A Quantitative Model for Information-Security Risk Management Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about A Quantitative Model for Information-Security Risk Management
Trust-aware access control: How recent is your transaction history? Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Trust-aware access control: How recent is your transaction history?
Security Strategies Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Security Strategies
A Practical Information Risk Management Process Framework Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about A Practical Information Risk Management Process Framework
SD3: A trust management system with certified evaluation Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about SD3: A trust management system with certified evaluation
Information Systems Management in the Big Data Era Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Information Systems Management in the Big Data Era
Managing Risk and Information Security Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Managing Risk and Information Security