Published: 2003-06-01

Articles

Financial Analysis Of Information Security Breaches*

Faramarz Damanpour, M. Hossain Heydari
Abstract 173 | PDF Downloads 325 | DOI https://doi.org/10.19030/iber.v2i6.3809

Persona Concept for Privacy and Authentication

Kal Toth, Mahesh Subramanium, Ike Chen
Abstract 176 | PDF Downloads 243 | DOI https://doi.org/10.19030/iber.v2i6.3810

Workplace Abuse: Problems And Consequences

Fred Ebeid, Tej Kaul, Kathleen Neumann, Hugh Shane
Abstract 1473 | PDF Downloads 1868 | DOI https://doi.org/10.19030/iber.v2i6.3811