1998 | ||
---|---|---|
9 | EE | Thornton May: Strategic ignorance: the new competitive high ground. Inf. Manag. Comput. Security 6(3): 127-128 (1998) |
8 | EE | Susan Cramm, Thornton May: Accelerating executive development: hey coach ... Inf. Manag. Comput. Security 6(5): 196-198 (1998) |
1997 | ||
7 | EE | Jim Best, Thornton May: Is your infrastructure ticking? Inf. Manag. Comput. Security 5(1): 3-6 (1997) |
6 | EE | Thornton May: The death of ROI: re-thinking IT value measurement. Inf. Manag. Comput. Security 5(3): 90-92 (1997) |
1996 | ||
5 | EE | Thornton May: The Thornton May Files. Inf. Manag. Comput. Security 4(3): 36-38 (1996) |
4 | EE | Thornton May: The Thornton May Files. Inf. Manag. Comput. Security 4(4): 36-38 (1996) |
3 | EE | Thornton May: Internet and Intranet: the faces of the wired economy. Inf. Manag. Comput. Security 4(5): 3-6 (1996) |
1995 | ||
2 | EE | Thornton May: The interpersonal computer interregnum. Inf. Manag. Comput. Security 3(3): 25-33 (1995) |
1 | EE | Thornton May: Chief information officer ABCs. Inf. Manag. Comput. Security 3(5): 23-24 (1995) |
1 | Jim Best | [7] |
2 | Susan Cramm | [8] |