Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Conference Proceedings

2004

Articles 1 - 6 of 6

Full-Text Articles in Business

Deriving User Profiles For Augmentative Communication, Adriane Randolph, Melody Moore, Veda Storey, Nannette Napier Jul 2004

Deriving User Profiles For Augmentative Communication, Adriane Randolph, Melody Moore, Veda Storey, Nannette Napier

Adriane B. Randolph

No abstract provided.


Breaking The Glass Firewall: Opportunities For Women Leaders In Information Security And Assurance, Proceedings, M. Myers, A. Woszczynski, Sherri Shade Dec 2003

Breaking The Glass Firewall: Opportunities For Women Leaders In Information Security And Assurance, Proceedings, M. Myers, A. Woszczynski, Sherri Shade

Sherri Shade

No abstract provided.


Designing And Conducting Information Security Laboratory Exercises, Herbert Mattord, M. Whitman Dec 2003

Designing And Conducting Information Security Laboratory Exercises, Herbert Mattord, M. Whitman

Herbert J. Mattord

No abstract provided.


A Model Curriculum For Programs Of Study In Information Security & Assurance, Herbert Mattord, M. Whitman Dec 2003

A Model Curriculum For Programs Of Study In Information Security & Assurance, Herbert Mattord, M. Whitman

Herbert J. Mattord

No abstract provided.


Teaching Information Security Policy, Herbert Mattord, M. Whitman Dec 2003

Teaching Information Security Policy, Herbert Mattord, M. Whitman

Herbert J. Mattord

No abstract provided.


Workshop On Designing And Teaching Information Security Curriculum, M. Whitman, Herbert Mattord Dec 2003

Workshop On Designing And Teaching Information Security Curriculum, M. Whitman, Herbert Mattord

Herbert J. Mattord

No abstract provided.