2001 | ||
---|---|---|
9 | EE | Margaret A. Hurley: IT outsourcing - managing the key asset. Inf. Manag. Comput. Security 9(5): 243-249 (2001) |
1999 | ||
8 | EE | Valerie Mosley, Margaret A. Hurley: IT skill retention. Inf. Manag. Comput. Security 7(3): 129-132 (1999) |
1998 | ||
7 | EE | Margaret A. Hurley: Features and functions overload. Inf. Manag. Comput. Security 6(4): 160-161 (1998) |
6 | EE | Douglas Brockway, Margaret A. Hurley: Achieving IT success. Inf. Manag. Comput. Security 6(5): 199-204 (1998) |
1997 | ||
5 | EE | Margaret A. Hurley: Managing the desktop: research findings. Inf. Manag. Comput. Security 5(2): 53-57 (1997) |
4 | EE | Margaret A. Hurley, Folker Schaumann: KPMG survey: the IT outsourcing decision. Inf. Manag. Comput. Security 5(4): 126-132 (1997) |
3 | EE | Margaret A. Hurley, Rod Harris: Facilitating corporate knowledge: building the data warehouse. Inf. Manag. Comput. Security 5(5): 170-174 (1997) |
1996 | ||
2 | EE | Liz Coghlan, Margaret A. Hurley: A profile of the information technology executive. Inf. Manag. Comput. Security 4(1): 5-9 (1996) |
1995 | ||
1 | EE | Catherine Ko, Margaret A. Hurley: Managing end-user computing. Inf. Manag. Comput. Security 3(3): 3-6 (1995) |
1 | Douglas Brockway | [6] |
2 | Liz Coghlan | [2] |
3 | Rod Harris | [3] |
4 | Catherine Ko | [1] |
5 | Valerie Mosley | [8] |
6 | Folker Schaumann | [4] |