Formulating information systems risk management strategies through cultural theory
Autor*in: |
Tsohou, Aggeliki [verfasserIn] |
---|
Format: |
Artikel |
---|
Erschienen: |
2006 |
---|
Umfang: |
20 |
---|
Übergeordnetes Werk: |
Enthalten in: Information management & computer security - Bingley : Emerald Group Publ., 1993, 14(2006), 2-3, Seite 198-217 |
---|---|
Übergeordnetes Werk: |
volume:14 ; year:2006 ; number:2-3 ; pages:198-217 ; extent:20 |
Katalog-ID: |
OLC1720113343 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC1720113343 | ||
003 | DE-627 | ||
005 | 20230708185048.0 | ||
007 | tu | ||
008 | 060623s2006 xx ||||| 00| ||und c | ||
028 | 5 | 2 | |a sw060623 |
035 | |a (DE-627)OLC1720113343 | ||
035 | |a (DE-599)GBVOLC1720113343 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
082 | 0 | 4 | |a 330 |a 070 |a 004 |
100 | 1 | |a Tsohou, Aggeliki |e verfasserin |4 aut | |
245 | 1 | 0 | |a Formulating information systems risk management strategies through cultural theory |
264 | 1 | |c 2006 | |
300 | |a 20 | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
700 | 1 | |a Karyda, Maria |4 oth | |
700 | 1 | |a Kokolakis, Spyros |4 oth | |
700 | 1 | |a Kiountouzis, Evangelos |4 oth | |
773 | 0 | 8 | |i Enthalten in |t Information management & computer security |d Bingley : Emerald Group Publ., 1993 |g 14(2006), 2-3, Seite 198-217 |w (DE-627)165670517 |w (DE-600)1154143-X |w (DE-576)429292163 |x 0968-5227 |7 nnns |
773 | 1 | 8 | |g volume:14 |g year:2006 |g number:2-3 |g pages:198-217 |g extent:20 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OPC-BBI | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_4029 | ||
951 | |a AR | ||
952 | |d 14 |j 2006 |e 2-3 |h 198-217 |g 20 |
author_variant |
a t at |
---|---|
matchkey_str |
article:09685227:2006----::omltnifrainytmrsmngmnsrtget |
hierarchy_sort_str |
2006 |
publishDate |
2006 |
allfields |
sw060623 (DE-627)OLC1720113343 (DE-599)GBVOLC1720113343 DE-627 ger DE-627 rakwb 330 070 004 Tsohou, Aggeliki verfasserin aut Formulating information systems risk management strategies through cultural theory 2006 20 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Karyda, Maria oth Kokolakis, Spyros oth Kiountouzis, Evangelos oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 14(2006), 2-3, Seite 198-217 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:14 year:2006 number:2-3 pages:198-217 extent:20 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI GBV_ILN_40 GBV_ILN_70 GBV_ILN_4029 AR 14 2006 2-3 198-217 20 |
spelling |
sw060623 (DE-627)OLC1720113343 (DE-599)GBVOLC1720113343 DE-627 ger DE-627 rakwb 330 070 004 Tsohou, Aggeliki verfasserin aut Formulating information systems risk management strategies through cultural theory 2006 20 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Karyda, Maria oth Kokolakis, Spyros oth Kiountouzis, Evangelos oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 14(2006), 2-3, Seite 198-217 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:14 year:2006 number:2-3 pages:198-217 extent:20 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI GBV_ILN_40 GBV_ILN_70 GBV_ILN_4029 AR 14 2006 2-3 198-217 20 |
allfields_unstemmed |
sw060623 (DE-627)OLC1720113343 (DE-599)GBVOLC1720113343 DE-627 ger DE-627 rakwb 330 070 004 Tsohou, Aggeliki verfasserin aut Formulating information systems risk management strategies through cultural theory 2006 20 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Karyda, Maria oth Kokolakis, Spyros oth Kiountouzis, Evangelos oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 14(2006), 2-3, Seite 198-217 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:14 year:2006 number:2-3 pages:198-217 extent:20 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI GBV_ILN_40 GBV_ILN_70 GBV_ILN_4029 AR 14 2006 2-3 198-217 20 |
allfieldsGer |
sw060623 (DE-627)OLC1720113343 (DE-599)GBVOLC1720113343 DE-627 ger DE-627 rakwb 330 070 004 Tsohou, Aggeliki verfasserin aut Formulating information systems risk management strategies through cultural theory 2006 20 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Karyda, Maria oth Kokolakis, Spyros oth Kiountouzis, Evangelos oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 14(2006), 2-3, Seite 198-217 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:14 year:2006 number:2-3 pages:198-217 extent:20 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI GBV_ILN_40 GBV_ILN_70 GBV_ILN_4029 AR 14 2006 2-3 198-217 20 |
allfieldsSound |
sw060623 (DE-627)OLC1720113343 (DE-599)GBVOLC1720113343 DE-627 ger DE-627 rakwb 330 070 004 Tsohou, Aggeliki verfasserin aut Formulating information systems risk management strategies through cultural theory 2006 20 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Karyda, Maria oth Kokolakis, Spyros oth Kiountouzis, Evangelos oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 14(2006), 2-3, Seite 198-217 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:14 year:2006 number:2-3 pages:198-217 extent:20 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI GBV_ILN_40 GBV_ILN_70 GBV_ILN_4029 AR 14 2006 2-3 198-217 20 |
source |
Enthalten in Information management & computer security 14(2006), 2-3, Seite 198-217 volume:14 year:2006 number:2-3 pages:198-217 extent:20 |
sourceStr |
Enthalten in Information management & computer security 14(2006), 2-3, Seite 198-217 volume:14 year:2006 number:2-3 pages:198-217 extent:20 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
dewey-raw |
330 |
isfreeaccess_bool |
false |
container_title |
Information management & computer security |
authorswithroles_txt_mv |
Tsohou, Aggeliki @@aut@@ Karyda, Maria @@oth@@ Kokolakis, Spyros @@oth@@ Kiountouzis, Evangelos @@oth@@ |
publishDateDaySort_date |
2006-01-01T00:00:00Z |
hierarchy_top_id |
165670517 |
dewey-sort |
3330 |
id |
OLC1720113343 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC1720113343</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230708185048.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">060623s2006 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw060623</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1720113343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1720113343</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">330</subfield><subfield code="a">070</subfield><subfield code="a">004</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tsohou, Aggeliki</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Formulating information systems risk management strategies through cultural theory</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karyda, Maria</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kokolakis, Spyros</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kiountouzis, Evangelos</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Information management & computer security</subfield><subfield code="d">Bingley : Emerald Group Publ., 1993</subfield><subfield code="g">14(2006), 2-3, Seite 198-217</subfield><subfield code="w">(DE-627)165670517</subfield><subfield code="w">(DE-600)1154143-X</subfield><subfield code="w">(DE-576)429292163</subfield><subfield code="x">0968-5227</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:14</subfield><subfield code="g">year:2006</subfield><subfield code="g">number:2-3</subfield><subfield code="g">pages:198-217</subfield><subfield code="g">extent:20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-BBI</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4029</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">14</subfield><subfield code="j">2006</subfield><subfield code="e">2-3</subfield><subfield code="h">198-217</subfield><subfield code="g">20</subfield></datafield></record></collection>
|
author |
Tsohou, Aggeliki |
spellingShingle |
Tsohou, Aggeliki ddc 330 Formulating information systems risk management strategies through cultural theory |
authorStr |
Tsohou, Aggeliki |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)165670517 |
format |
Article |
dewey-ones |
330 - Economics 070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0968-5227 |
topic_title |
330 070 004 Formulating information systems risk management strategies through cultural theory |
topic |
ddc 330 |
topic_unstemmed |
ddc 330 |
topic_browse |
ddc 330 |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
m k mk s k sk e k ek |
hierarchy_parent_title |
Information management & computer security |
hierarchy_parent_id |
165670517 |
dewey-tens |
330 - Economics 070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Information management & computer security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 |
title |
Formulating information systems risk management strategies through cultural theory |
ctrlnum |
(DE-627)OLC1720113343 (DE-599)GBVOLC1720113343 |
title_full |
Formulating information systems risk management strategies through cultural theory |
author_sort |
Tsohou, Aggeliki |
journal |
Information management & computer security |
journalStr |
Information management & computer security |
isOA_bool |
false |
dewey-hundreds |
300 - Social sciences 000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2006 |
contenttype_str_mv |
txt |
container_start_page |
198 |
author_browse |
Tsohou, Aggeliki |
container_volume |
14 |
physical |
20 |
class |
330 070 004 |
format_se |
Aufsätze |
author-letter |
Tsohou, Aggeliki |
dewey-full |
330 070 004 |
title_sort |
formulating information systems risk management strategies through cultural theory |
title_auth |
Formulating information systems risk management strategies through cultural theory |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI GBV_ILN_40 GBV_ILN_70 GBV_ILN_4029 |
container_issue |
2-3 |
title_short |
Formulating information systems risk management strategies through cultural theory |
remote_bool |
false |
author2 |
Karyda, Maria Kokolakis, Spyros Kiountouzis, Evangelos |
author2Str |
Karyda, Maria Kokolakis, Spyros Kiountouzis, Evangelos |
ppnlink |
165670517 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
up_date |
2024-07-04T00:56:18.484Z |
_version_ |
1803607949688438784 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC1720113343</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230708185048.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">060623s2006 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw060623</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1720113343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1720113343</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">330</subfield><subfield code="a">070</subfield><subfield code="a">004</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tsohou, Aggeliki</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Formulating information systems risk management strategies through cultural theory</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karyda, Maria</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kokolakis, Spyros</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kiountouzis, Evangelos</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Information management & computer security</subfield><subfield code="d">Bingley : Emerald Group Publ., 1993</subfield><subfield code="g">14(2006), 2-3, Seite 198-217</subfield><subfield code="w">(DE-627)165670517</subfield><subfield code="w">(DE-600)1154143-X</subfield><subfield code="w">(DE-576)429292163</subfield><subfield code="x">0968-5227</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:14</subfield><subfield code="g">year:2006</subfield><subfield code="g">number:2-3</subfield><subfield code="g">pages:198-217</subfield><subfield code="g">extent:20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-BBI</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4029</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">14</subfield><subfield code="j">2006</subfield><subfield code="e">2-3</subfield><subfield code="h">198-217</subfield><subfield code="g">20</subfield></datafield></record></collection>
|
score |
7.399089 |