[go: up one dir, main page]

Rockel et al., 2019 - Google Patents

IT requirements in the real estate sector

Rockel et al., 2019

View PDF
Document ID
10516413587649746697
Author
Rockel G
Barth L
Publication year
Publication venue
International Journal of Innovative Technology and Exploring Engineering

External Links

Snippet

Digitalization has reached the German real estate market. IT requirements have to be defined and followed. The state, companies and private households must implement appropriate requirements and take measures to jointly guarantee data protection and data …
Continue reading at digitalcollection.zhaw.ch (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Pandey et al. Cyber security risks in globalized supply chains: conceptual framework
Saini et al. Cyber-crimes and their impacts: A review
Grama Legal and privacy issues in information security
EP3455777B1 (en) Cyber-security presence monitoring and assessment
Jacobs Engineering information security: The application of systems engineering concepts to achieve information assurance
US20080047016A1 (en) CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations
Kaswan et al. Cybersecurity law-based insurance market
Giri Cyber crime, cyber threat, cyber security strategies and cyber law in Nepal
Rasner Cybersecurity and third-party risk: Third party threat hunting
Thakral et al. Cybersecurity and ethics for IoT system: a massive analysis
Rawal et al. Cybersecurity and identity access management
Jain et al. Cybersecurity solutions using AI techniques
Toth et al. NIST MEP cybersecurity self-assessment handbook for assessing NIST SP 800-171 security requirements in response to DFARS cybersecurity requirements
Denning Cyber security as an emergent infrastructure
Rockel et al. IT requirements in the real estate sector
Efe et al. It security trends for e-government threats
Mitchell Corporate cyberespionage: identification and prevention part 1
Azhar et al. N.: Big data security issues: a review
Jolly The secure online Business
Hopwood et al. Security in a Web‐based environment
Taneja et al. Information and data security model: Background, risks, and challenges
Bansod et al. Importance of Cybersecurity and RegTech in FinTech.
Alsmadi et al. IT Risk and Security Management
Cobanoglu A critical look at restaurant network security: attacks, prevention tools, and practices
Shi Incorporating information security in analysis of business strategy: a conceptual framework