Research on user security in MIS system

被引:0
|
作者
Zhu, Wei
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] MEASURING USER ATTITUDES IN MIS RESEARCH - A REVIEW
    SWANSON, EB
    OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 1982, 10 (02): : 157 - 165
  • [2] USER INVOLVEMENT AND MIS SUCCESS - A REVIEW OF RESEARCH
    IVES, B
    OLSON, MH
    MANAGEMENT SCIENCE, 1984, 30 (05) : 586 - 603
  • [3] USER SYSTEM SECURITY
    LUNDGREN, TD
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 1994, 34 (03) : 51 - 54
  • [4] The model and design of security control system for MIS
    Shi, SY
    Liu, GX
    Cai, SQ
    Lu, YB
    PROCEEDINGS OF '97 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, 1997, : 135 - 139
  • [5] The Designing and Realization of Research MIS Database and Data Security
    Wang Yicong
    Wang Jinfeng
    Hu Hangbo
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 422 - 426
  • [6] A Systematic Analysis of User Evaluations in Security Research
    Hamm, Peter
    Harborth, David
    Pape, Sebastian
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [7] THE JOURNAL COMMUNICATION-SYSTEM FOR MIS RESEARCH
    HAMILTON, S
    IVES, B
    DATA BASE, 1983, 14 (02): : 3 - 14
  • [8] Analysis and research on the security of remote MIS based on ASP+SQL
    Li, Jin-Ping
    Liu, Tie-Feng
    Zhang, Chun-Qing
    Xia, Ping
    Beifang Jiaotong Daxue Xuebao/Journal of Northern Jiaotong University, 2002, 26 (06):
  • [9] An Efficient Multistage Security System for User Authentication
    Gupta, Ashutosh
    Medhi, Prerna
    Pandey, Sujata
    Kumar, Pradeep
    Kumar, Saket
    Singh, H. P.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3194 - 3197
  • [10] SYSTEM SECURITY REQUIRES TECHNICAL AND USER CONTROLS
    THODE, JP
    JOURNAL OF SYSTEMS MANAGEMENT, 1984, 35 (06): : 38 - 40