2002 |
11 | EE | S. E. Kruck,
Danny Gottovi,
Farideh Moghadami,
Ralph Broom,
Karen A. Forcht:
Protecting personal privacy on the Internet.
Inf. Manag. Comput. Security 10(2): 77-84 (2002) |
2001 |
10 | | Karen A. Forcht,
Christopher Allen,
Barbara Brodman,
David Corning,
Jacob Kouns:
Intrusion Detection Systems: Possibilities for the Future.
Conference on Information Security Management & Small Systems Security 2001: 183-198 |
2000 |
9 | EE | Karen A. Forcht:
Security-related concerns with geographic information systems and geographic mapping.
Inf. Manag. Comput. Security 8(5): 218-221 (2000) |
1997 |
8 | EE | Karen A. Forcht,
Daphyne Saunders Thomas,
Mark L. Usry,
Kelly Egan:
Control of the Internet.
Inf. Manag. Comput. Security 5(1): 23-28 (1997) |
1996 |
7 | EE | Ethan Sanderson,
Karen A. Forcht:
Information security in business environments.
Inf. Manag. Comput. Security 4(1): 32-37 (1996) |
6 | EE | Karen A. Forcht:
Doing business on the Internet: marketing and security aspects.
Inf. Manag. Comput. Security 4(4): 3-9 (1996) |
1994 |
5 | EE | Karen A. Forcht,
Daphyne Saunders Thomas:
Information Compilation and Disbursement: Moral, Legal and Ethical Considerations.
Inf. Manag. Comput. Security 2(2): 23-28 (1994) |
4 | EE | Karen A. Forcht,
Yuan-Wen Aven Tsai:
Security and Network Management: Changes in the Way We Work.
Inf. Manag. Comput. Security 2(4): 35-41 (1994) |
3 | EE | Karen A. Forcht,
Morey Oare:
The Information Highway: The Interstate Highway System for Computer Networks.
Inf. Manag. Comput. Security 2(5): 4-8 (1994) |
2 | EE | James R. Butler,
Karen A. Forcht:
The Clipper Chip and the Price of Security in America.
Inf. Manag. Comput. Security 2(5): 9-12 (1994) |
1993 |
1 | EE | Karen A. Forcht,
Robert G. Brookshire,
Scott P. Stevens,
Rodney Clarke:
Computer Ethics of University Students: An International Exploratory Study.
Inf. Manag. Comput. Security 1(5): (1993) |