|
Search the dblp DataBase
Sharman Lichtenstein:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sharman Lichtenstein, Alexia Hunter
Receiver Influences on Knowledge Sharing. [Citation Graph (0, 0)][DBLP] ECIS, 2005, pp:- [Conf]
- Sharman Lichtenstein, Paula M. C. Swatman
Sustainable knowledge management systems: integration personalisation and contextualisation. [Citation Graph (0, 0)][DBLP] ECIS, 2003, pp:- [Conf]
- Sharman Lichtenstein
Knowledge Development and Creation in Email. [Citation Graph (0, 0)][DBLP] HICSS, 2004, pp:- [Conf]
- Sharman Lichtenstein
Developing Internet Security Policy for Organizations. [Citation Graph (0, 0)][DBLP] HICSS (4), 1997, pp:350-0 [Conf]
- Sharman Lichtenstein, Paula M. C. Swatman, Kanchan Babu
Adding Value to Online Privacy for Consumers: Remedying Deficiences in Online Privacy Policies with an Holistic Approac. [Citation Graph (0, 0)][DBLP] HICSS, 2003, pp:206- [Conf]
- Sharman Lichtenstein, Paula M. C. Swatman
The Potentialities of Focus Groups in e-Business Research: Theory Validation. [Citation Graph (0, 0)][DBLP] E-Business: Multidisciplinary Research and Practice, 2002, pp:207-226 [Conf]
- Sharman Lichtenstein
Internet risks for companies. [Citation Graph (0, 0)][DBLP] Computers & Security, 1998, v:17, n:2, pp:143-150 [Journal]
- Sharman Lichtenstein
Factors in the selection of a risk assessment method. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1996, v:4, n:4, pp:20-25 [Journal]
- Sharman Lichtenstein, Paula M. C. Swatman
Internet acceptable usage policy for organizations. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1997, v:5, n:5, pp:182-190 [Journal]
Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|