These are the sources and citations used to research Business reputation. Security, privacy and data security concerns. This bibliography was generated on Cite This For Me on

  • Book

    Dessler, G.

    Human resource management

    2000 - Prentice Hall - Upper Saddle River, NJ

    In-text: (Dessler, 2000)

    Your Bibliography: Dessler, G., 2000. Human resource management. Upper Saddle River, NJ: Prentice Hall, pp.102-135.

  • Book

    Doorley, J. and Garcia, H. F.

    Reputation management

    2007 - Routledge - New York

    In-text: (Doorley and Garcia, 2007)

    Your Bibliography: Doorley, J. and Garcia, H., 2007. Reputation management. New York: Routledge.

  • Website

    An Attack Can Ruin a Business's Reputation - Entrust, Inc.

    2014

    In-text: (An Attack Can Ruin a Business's Reputation - Entrust, Inc., 2014)

    Your Bibliography: Entrust, Inc. 2014. An Attack Can Ruin a Business's Reputation - Entrust, Inc.. [online] Available at: <http://www.entrust.com/attack-can-ruin-businesss-reputation/> [Accessed 21 January 2015].

  • Book

    Gaines-Ross, L.

    Corporate reputation

    2008 - John Wiley & Sons - Hoboken, N.J.

    In-text: (Gaines-Ross, 2008)

    Your Bibliography: Gaines-Ross, L., 2008. Corporate reputation. Hoboken, N.J.: John Wiley & Sons.

  • Book

    Griffin, A.

    New strategies for reputation management

    2008 - Kogan Page - London

    In-text: (Griffin, 2008)

    Your Bibliography: Griffin, A., 2008. New strategies for reputation management. London: Kogan Page.

  • Book

    Herold, R.

    Managing an information security and privacy awareness and training program

    2011 - CRC Press - Boca Raton

    In-text: (Herold, 2011)

    Your Bibliography: Herold, R., 2011. Managing an information security and privacy awareness and training program. Boca Raton: CRC Press, p.13.

  • Book

    Herold, R.

    Managing an information security and privacy awareness and training program

    2011 - CRC Press - Boca Raton

    In-text: (Herold, 2011)

    Your Bibliography: Herold, R., 2011. Managing an information security and privacy awareness and training program. Boca Raton: CRC Press.

  • Website

    Samsung Electronics Co., Ltd. Names of Competitors

    2015

    In-text: (Samsung Electronics Co., Ltd. Names of Competitors, 2015)

    Your Bibliography: Hoovers.com. 2015. Samsung Electronics Co., Ltd. Names of Competitors. [online] Available at: <http://www.hoovers.com/company-information/cs/competition.Samsung_Electronics_Co_Ltd.a166cb2c88a2e408.html> [Accessed 8 January 2015].

  • Website

    Securing the Future

    2015

    In-text: (Securing the Future, 2015)

    Your Bibliography: http://www.shredit.com. 2015. Securing the Future. [online] Available at: <http://www.shredit.com/getmedia/60aab19c-d46f-4b76-a8dd-156ca114133f/Shred-it_Newsletter_Dont-throw-your-reputation.aspx?ext=.pdf> [Accessed 21 January 2015].

  • Website

    Jurevicius, O.

    Samsung SWOT analysis 2013 | Strategic Management Insight

    2015

    In-text: (Jurevicius, 2015)

    Your Bibliography: Jurevicius, O., 2015. Samsung SWOT analysis 2013 | Strategic Management Insight. [online] Strategicmanagementinsight.com. Available at: <http://www.strategicmanagementinsight.com/swot-analyses/samsung-swot-analysis.html> [Accessed 9 January 2015].

  • Website

    Техніка LG Electronics: споживчі та побутові продукти LG| LG Україна

    2015

    In-text: (Техніка LG Electronics: споживчі та побутові продукти LG| LG Україна, 2015)

    Your Bibliography: Lg.com. 2015. Техніка LG Electronics: споживчі та побутові продукти LG| LG Україна. [online] Available at: <http://www.lg.com/ua> [Accessed 9 January 2015].

  • Book

    Lussier, R. N. and Achua, C. F.

    Leadership

    2004 - Thomson/South-Western - [Mason, Ohio?]

    In-text: (Lussier and Achua, 2004)

    Your Bibliography: Lussier, R. and Achua, C., 2004. Leadership. [Mason, Ohio?]: Thomson/South-Western.

  • Book

    Lussier, R. N. and Hendon, J. R.

    Human resource management

    2013 - SAGE Publications - Thousand Oaks

    In-text: (Lussier and Hendon, 2013)

    Your Bibliography: Lussier, R. and Hendon, J., 2013. Human resource management. Thousand Oaks: SAGE Publications.

  • Book

    Lussier, R. N. and Hendon, J. R.

    Human resource management

    2013 - SAGE Publications - Thousand Oaks

    In-text: (Lussier and Hendon, 2013)

    Your Bibliography: Lussier, R. and Hendon, J., 2013. Human resource management. Thousand Oaks: SAGE Publications.

  • Book

    Lussier, R. N. and Hendon, J. R.

    Human resource management

    2013 - SAGE Publications - Thousand Oaks

    In-text: (Lussier and Hendon, 2013)

    Your Bibliography: Lussier, R. and Hendon, J., 2013. Human resource management. Thousand Oaks: SAGE Publications.

  • Website

    Nisen, M.

    Samsung Has A Totally Different Strategy From Apple, And It's Working Great

    2013

    In-text: (Nisen, 2013)

    Your Bibliography: Nisen, M., 2013. Samsung Has A Totally Different Strategy From Apple, And It's Working Great. [online] Business Insider. Available at: <http://www.businessinsider.com/samsung-corporate-strategy-2013-3> [Accessed 9 January 2015].

  • Website

    Nyakreal, E.

    SWOT and PEST analysis of Samsung - Top Best updates

    2013

    In-text: (Nyakreal, 2013)

    Your Bibliography: Nyakreal, E., 2013. SWOT and PEST analysis of Samsung - Top Best updates. [online] Top Best updates. Available at: <http://kenyayote.com/swot-and-pest-analysis-of-samsung/> [Accessed 9 January 2015].

  • Website

    Information Security and Reputation Management - ‘It's a question of survival, not compliance’

    2015

    In-text: (Information Security and Reputation Management - ‘It's a question of survival, not compliance’, 2015)

    Your Bibliography: Pitmans.com. 2015. Information Security and Reputation Management - ‘It's a question of survival, not compliance’. [online] Available at: <http://www.pitmans.com/news/article/information-security-and-reputation-management-its-a-question-of-survival-n> [Accessed 21 January 2015].

  • Book

    Vacca, J. R.

    Computer and information security handbook

    2009 - Elsevier - Amsterdam

    In-text: (Vacca, 2009)

    Your Bibliography: Vacca, J., 2009. Computer and information security handbook. Amsterdam: Elsevier.

  • Book

    Xiao, Y., Li, F. H. and Chen, H.

    Handbook of security and networks

    2011 - World Scientific - Hackensack, NJ

    In-text: (Xiao, Li and Chen, 2011)

    Your Bibliography: Xiao, Y., Li, F. and Chen, H., 2011. Handbook of security and networks. Hackensack, NJ: World Scientific.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join