Showing 1 - 6 results of 6 for search 'SECURITIES REGULATIONS', query time: 0.57s Refine Results
  1. 1
    by Chih-Cheng Hsu, 徐志政
    Published 2010
    ... information security? How applicable are the related rules and regulations? What difficulties do futures...
    Get full text
    Others
  2. 2
    by Ku-Yao Wang, 王谷耀
    Published 2011
    ... and maintain confidentiality, integrity and availability of information security. However, how effective...
    Get full text
    Others
  3. 3
    by Chen, Yin-Hsi, 陳胤羲
    Published 2015
    ... their work efficiency, which casts doubts on enterprises ’information security. This research conducts data...
    Get full text
    Others
  4. 4
    by CHIA-TSAI TSAI, 蔡家財
    Published 2008
    ... of an organization’s ERP system, however they have also raised various information security challenges. At first, based...
    Get full text
    Others
  5. 5
    by Feng-Yu Liao, 廖峰佑
    Published 2015
    ... is the collection and literature review and refer to a capital law and regulations, the implementation of personal...
    Get full text
    Others
  6. 6
    by Hsu,Tung-Chen, 徐同臻
    Published 2016
    ... information security regulations, data collection and literature review, interview and aggregate...
    Get full text
    Others