لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Basie von Solmsa, Rossouw von Solms, From information security to ...
Azmi, I.M., 2010, "Legal and ethical issues in knowledge management, ...
Bagchi, K. and G. Udo, An Analysis of the Growth ...
Barnes, S., Knowledge Management Systems :Theory and Practice, Thomson Learning ...
Basie von Solms, Information Security - The Fourth Wave, computers ...
Basie von Solmsa, Rossouw von Solms, The 10 deadly sins ...
Bento, A. _ Bento, Empirical Test of a Hacking Model: ...
Cech, P., Bures, V., Knowledge Management and Czech Universities, Information ...
Chan, K. and Liebowitz, J., 2006, "The synergy of social ...
Chang, Ernest, Lin, Chin-Shien (2007). Exploring organizational culture for information ...
Cheng, K. (2005), "Surviving hacker attacks proves that every cloud ...
Choi, Namjoo, Kim, Dan, and Goo, Jahyun (2008). Knowing is ...
Chua, A., 2002, "The influence of social interaction on knowledge ...
Dave, B. and Koskela, L., 2009, "Collaborative knowledge manage ment=A ...
Davis, G.B., and Olson, M.H., Management Information system: Conceptual, foundations, ...
Derek L. Nazareth, Jae Choi, _ A System Dynamics Model ...
Efthymia Metalidou, Catherine Marinagi, Panagiotis Trivellas, Niclas Eberhagen, Christos Skourlas, ...
Gary Hinson, IsecT Ltd, Human factors in information security, Innovative ...
Hahn, J. and Wang, T.W., 2009, "Knowledge Management Systems and ...
Hsia, T., Lin, L., et al, A Framework for Designing ...
Hutchings, K. and Michailova, S., 2004, "Facilitating knowledge sharing in ...
Huysman, M. and de Wit, D., 2004, "Practices of managing ...
Inkpen, A.C. and Tsang, E.W.K., 2005, "Social capital, networks, and ...
Jorma Kajava and Rauno Varonen, IT and the Human Body ...
Jose J Gonzalez, Agata Sawicka, A Framework for Human Factors ...
Knapp, K.J., et al., Top Ranked Information Security Issues: The ...
Kotulic, A.G. and J.G. Clark, Why There Aren't More Information ...
Kruger, H.A. and Kearney, W.D. (2006). A prototype for assessing ...
Kruger, H.A., Drevin, L. and Steyn, T. (2010). A Vocabulary ...
Lang, J.C, 2004, "Social context and social capital as enablers ...
Lin, B., Umoh, D., E-Healthcare A Vehicle of Change, American ...
Maconachy, W. V., Schou, C. D., Ragsdale, D., Welch, D. ...
Mahabi, Victoria(2010). Information Security Awareness: System Administrator and End-User Perspectives ...
Maisa Mendonca Silva, Ana Paula Henriques de Gusmao, Thiago Poleto, ...
Malone, D., Knowledge Management: A Model for O rganisational Learning, ...
Marwick, A.. D., Knowledge Management Technology, IBM Systems Journal, 40 ...
McPhail, Ken, 2009, "Where is the ethical knowledge in the ...
Mohayidin, M., G., et al, The Application of Knowledge Management ...
Mouna Jouini, Latifa Ben Arfa Rabai, Anis Ben Aissa, _ ...
Mugellesi Dowa, R.. Pallaschkea, S., Merria, _ Montagnona, E., Schabea, ...
Newman, B., Conrad, K., W., A Framework of C haracterising ...
Nikrerk J.F. and Solms, Van (2009). Information security culture: a ...
O'Donovan, F., Heavin, C. and Butler, T. 2006, "Towards _ ...
Rao, L. and Osei-Bryson, K.M., 2007, "Towards defining dimensions of ...
Ravishankar, .M.N. and Pan Shan, L., 2008, "The influence of ...
Schoderbek P.P., Asterios G. Kefalas, and Charles C. Schoderbek, Management ...
Sean Allam, Stephen V. Flowerday, Ethan Flowerday, _ Smartphone information ...
Selsky, D., B., Eisenberg, F., P., Hersh, W., Buitendijk, H., ...
Tintamusik, Yanarong(20 10). Examining the Relationship between Organization Systems and ...
Tseng, M. L, (2011). Using a hybrid MCDM model to ...
Tseng, S.M., 2008, "Knowledge management system performance measure index", Expert ...
Veiga, A. Da., and Eloff, J.H.P. (2010). A Framework and ...
Von Solms R, Von Solms B (2004). Information security management ...
Wilson, Mark, and Hash, Joan. (2003). Building _ information technology ...
Wing S.C. and Chan, L.S., 2008, "Social network, social trust ...
Wong, K.Y. and Aspinwall, E.. 2006, "Development of a knowledge ...
Wu, W. W. (2008). Choosing knowledge management strategies by using ...
نمایش کامل مراجع