These are the sources and citations used to research Business reputation. Security, privacy and data security concerns. This bibliography was generated on Cite This For Me on
In-text: (Dessler, 2000)
Your Bibliography: Dessler, G., 2000. Human resource management. Upper Saddle River, NJ: Prentice Hall, pp.102-135.
In-text: (Doorley and Garcia, 2007)
Your Bibliography: Doorley, J. and Garcia, H., 2007. Reputation management. New York: Routledge.
In-text: (An Attack Can Ruin a Business's Reputation - Entrust, Inc., 2014)
Your Bibliography: Entrust, Inc. 2014. An Attack Can Ruin a Business's Reputation - Entrust, Inc.. [online] Available at: <http://www.entrust.com/attack-can-ruin-businesss-reputation/> [Accessed 21 January 2015].
In-text: (Gaines-Ross, 2008)
Your Bibliography: Gaines-Ross, L., 2008. Corporate reputation. Hoboken, N.J.: John Wiley & Sons.
In-text: (Griffin, 2008)
Your Bibliography: Griffin, A., 2008. New strategies for reputation management. London: Kogan Page.
In-text: (Herold, 2011)
Your Bibliography: Herold, R., 2011. Managing an information security and privacy awareness and training program. Boca Raton: CRC Press, p.13.
In-text: (Herold, 2011)
Your Bibliography: Herold, R., 2011. Managing an information security and privacy awareness and training program. Boca Raton: CRC Press.
In-text: (Samsung Electronics Co., Ltd. Names of Competitors, 2015)
Your Bibliography: Hoovers.com. 2015. Samsung Electronics Co., Ltd. Names of Competitors. [online] Available at: <http://www.hoovers.com/company-information/cs/competition.Samsung_Electronics_Co_Ltd.a166cb2c88a2e408.html> [Accessed 8 January 2015].
In-text: (Securing the Future, 2015)
Your Bibliography: http://www.shredit.com. 2015. Securing the Future. [online] Available at: <http://www.shredit.com/getmedia/60aab19c-d46f-4b76-a8dd-156ca114133f/Shred-it_Newsletter_Dont-throw-your-reputation.aspx?ext=.pdf> [Accessed 21 January 2015].
In-text: (Jurevicius, 2015)
Your Bibliography: Jurevicius, O., 2015. Samsung SWOT analysis 2013 | Strategic Management Insight. [online] Strategicmanagementinsight.com. Available at: <http://www.strategicmanagementinsight.com/swot-analyses/samsung-swot-analysis.html> [Accessed 9 January 2015].
In-text: (Техніка LG Electronics: споживчі та побутові продукти LG| LG Україна, 2015)
Your Bibliography: Lg.com. 2015. Техніка LG Electronics: споживчі та побутові продукти LG| LG Україна. [online] Available at: <http://www.lg.com/ua> [Accessed 9 January 2015].
In-text: (Lussier and Achua, 2004)
Your Bibliography: Lussier, R. and Achua, C., 2004. Leadership. [Mason, Ohio?]: Thomson/South-Western.
In-text: (Lussier and Hendon, 2013)
Your Bibliography: Lussier, R. and Hendon, J., 2013. Human resource management. Thousand Oaks: SAGE Publications.
In-text: (Lussier and Hendon, 2013)
Your Bibliography: Lussier, R. and Hendon, J., 2013. Human resource management. Thousand Oaks: SAGE Publications.
In-text: (Lussier and Hendon, 2013)
Your Bibliography: Lussier, R. and Hendon, J., 2013. Human resource management. Thousand Oaks: SAGE Publications.
In-text: (Nisen, 2013)
Your Bibliography: Nisen, M., 2013. Samsung Has A Totally Different Strategy From Apple, And It's Working Great. [online] Business Insider. Available at: <http://www.businessinsider.com/samsung-corporate-strategy-2013-3> [Accessed 9 January 2015].
In-text: (Nyakreal, 2013)
Your Bibliography: Nyakreal, E., 2013. SWOT and PEST analysis of Samsung - Top Best updates. [online] Top Best updates. Available at: <http://kenyayote.com/swot-and-pest-analysis-of-samsung/> [Accessed 9 January 2015].
In-text: (Information Security and Reputation Management - ‘It's a question of survival, not compliance’, 2015)
Your Bibliography: Pitmans.com. 2015. Information Security and Reputation Management - ‘It's a question of survival, not compliance’. [online] Available at: <http://www.pitmans.com/news/article/information-security-and-reputation-management-its-a-question-of-survival-n> [Accessed 21 January 2015].
In-text: (Vacca, 2009)
Your Bibliography: Vacca, J., 2009. Computer and information security handbook. Amsterdam: Elsevier.
In-text: (Xiao, Li and Chen, 2011)
Your Bibliography: Xiao, Y., Li, F. and Chen, H., 2011. Handbook of security and networks. Hackensack, NJ: World Scientific.
10,587 students joined last month!