Showing 1 - 15 results of 15 for search 'INFORMATION FOR MANAGING RESOURCES', query time: 1.21s Refine Results
  1. 1
    by Kuan-Ting Lai, 賴冠廷
    Published 2010
    ..., service provider must have to create information security management system. In this research we provide...
    Get full text
    Others
  2. 2
    by Hsiang-Lin Li, 李享霖
    Published 2017
    ... internal management, to promote the popularity of human information systems, but also must face the leakage...
    Get full text
    Others
  3. 3
    by Ku-Yao Wang, 王谷耀
    Published 2011
    ... incorporated a set of effective information security risk management, and therefore, it is the interest...
    Get full text
    Others
  4. 4
    by CHIA-TSAI TSAI, 蔡家財
    Published 2008
    ... of processes, and to better information management. These improvements have increased the importance...
    Get full text
    Others
  5. 5
    by Chun-wei Chen, 陳俊維
    Published 2014
    ... the importance of building a procedure that fits the Personal Data Law to manage the internal Personal Data...
    Get full text
    Others
  6. 6
    by Liang-Ting Chen, 陳亮廷
    Published 2010
    ... of resources including People, Premise, Technology, Information, Supplies and Stakeholders. Through the Delphi...
    Get full text
    Others
  7. 7
    by Shu-Ling Tsai, 蔡淑玲
    Published 2009
    ... on the disruption, because of the resource constraints. Therefore, for the success of Business Continuity Management...
    Get full text
    Others
  8. 8
    by Hui-Yu Wang, 王惠玉
    Published 2003
    ... customer relationship management to overcome the limitation resources. However, the SME is weakness...
    Get full text
    Others
  9. 9
    by Chao-Hsin Lee, 李昭信
    Published 2008
    ... the business knowledge management, information technology equipments and organizations. According...
    Get full text
    Others
  10. 10
    ....) the wireless policy and resource management, (2.) the person security management, (3.) the integration...
    Get full text
    Others
  11. 11
    by Chi-Wei Li, 黎埼偉
    Published 2015
    ... in accordance with national standards CNS27001 mainly are provided for information security management systems...
    Get full text
    Others
  12. 12
    by Wen Pin Chang, 張文賓
    Published 2006
    ... for IT Service Management (ITSM) becomes more apparent. Efficient use of existing IT resources and the creation...
    Get full text
    Others
  13. 13
    by Fu-hsien Chen, 陳富賢
    Published 2012
    .... Internet to enhance user interaction and information sharing of resources, sharing, and consumer electronic...
    Get full text
    Others
  14. 14
    by Shih-Chuan Yang, 楊仕全
    Published 2006
    ... doing the research from the point of management. When used the IM as the communication channel, it can...
    Get full text
    Others
  15. 15
    by Jia-Yuan Li, 李佳遠
    Published 2008
    ... and management environment, and activity facility environment have been collected. Following suggestions...
    Get full text
    Others