-
1“..., service provider must have to create information security management system. In this research we provide...”
Get full text
Others -
2“... internal management, to promote the popularity of human information systems, but also must face the leakage...”
Get full text
Others -
3“... incorporated a set of effective information security risk management, and therefore, it is the interest...”
Get full text
Others -
4“... of processes, and to better information management. These improvements have increased the importance...”
Get full text
Others -
5“... the importance of building a procedure that fits the Personal Data Law to manage the internal Personal Data...”
Get full text
Others -
6“... of resources including People, Premise, Technology, Information, Supplies and Stakeholders. Through the Delphi...”
Get full text
Others -
7“... on the disruption, because of the resource constraints. Therefore, for the success of Business Continuity Management...”
Get full text
Others -
8“... customer relationship management to overcome the limitation resources. However, the SME is weakness...”
Get full text
Others -
9“... the business knowledge management, information technology equipments and organizations. According...”
Get full text
Others -
10by Hung –Chang Chen, 陳鴻昌“....) the wireless policy and resource management, (2.) the person security management, (3.) the integration...”
Get full text
Others -
11“... in accordance with national standards CNS27001 mainly are provided for information security management systems...”
Get full text
Others -
12“... for IT Service Management (ITSM) becomes more apparent. Efficient use of existing IT resources and the creation...”
Get full text
Others -
13“.... Internet to enhance user interaction and information sharing of resources, sharing, and consumer electronic...”
Get full text
Others -
14“... doing the research from the point of management. When used the IM as the communication channel, it can...”
Get full text
Others -
15“... and management environment, and activity facility environment have been collected. Following suggestions...”
Get full text
Others