Information Management & Computer Security
, Volume 2
Volume 2, Number 1, 1994
Christian N. Madu
,
Chu-hua Kuei
:
Optimum Information Technology for Socioeconomic Development.
4-11
Electronic Edition
(link)
BibTeX
Simon Rogerson
,
Christine Fidler
:
Strategic Information Systems Planning: Its Adoption and Use.
12-17
Electronic Edition
(link)
BibTeX
William J. Caelli
:
Security in Open and Distributed Systems.
18-24
Electronic Edition
(link)
BibTeX
David Hains
:
Authentication: A Prominent Issue for Data Communications.
25-27
Electronic Edition
(link)
BibTeX
Fredric B. Gluck
:
Protection of Electronic Mail and Electronic Messages: Challenges and Solutions.
28-40
Electronic Edition
(link)
BibTeX
Kevin J. Fitzgerald
:
The Importance of a Network Disaster Recovery Plan.
41-43
Electronic Edition
(link)
BibTeX
Volume 2, Number 2, 1994
Jon-Arild Johannessen
:
Information Technology and Innovation: Identifying Critical Innovation Factors.
4-9
Electronic Edition
(link)
BibTeX
Rachid M. Zeffane
:
Computer Usage and Job Satisfaction: An Empirical Exploration.
10-22
Electronic Edition
(link)
BibTeX
Karen A. Forcht
,
Daphyne Saunders Thomas
:
Information Compilation and Disbursement: Moral, Legal and Ethical Considerations.
23-28
Electronic Edition
(link)
BibTeX
James M. Geary
:
Executive Liability for Computer Crime and How to Prevent It.
29-31
Electronic Edition
(link)
BibTeX
G. Southern
,
Allistair U. Murray
:
Quality Information Management: The Way to a Better Company Culture.
32-35
Electronic Edition
(link)
BibTeX
Volume 2, Number 3, 1994
Keith Fletcher
,
Mark Donaghy
:
The Role of Competitor Information Systems.
4-18
Electronic Edition
(link)
BibTeX
Kenneth P. Weiss
:
To Serve and Protect: Reconciling Information Protection with LAN Environments.
19-25
Electronic Edition
(link)
BibTeX
Graham P. Bell
,
David Kavanagh
:
Minimizing Risk in Your Wide Area Network Design.
26-28
Electronic Edition
(link)
BibTeX
Stewart White
:
The Data Network Disaster Recovery Plan: Considerations and Concerns.
29-36
Electronic Edition
(link)
BibTeX
Bruce Edwards
:
Developing a Successful Network Disaster Recovery Plan.
37-42
Electronic Edition
(link)
BibTeX
Kenneth P. Weiss
:
New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade.
43-45
Electronic Edition
(link)
BibTeX
David Hains
:
EDI Security Issues Can Be Overcome.
46
Electronic Edition
(link)
BibTeX
Volume 2, Number 4, 1994
Dieter Fink
:
A Security Framework for Information Systems Outsourcing.
3-8
Electronic Edition
(link)
BibTeX
Kevin J. Fitzgerald
:
Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide IT Environment.
9-15
Electronic Edition
(link)
BibTeX
K. Hugh Macdonald
:
Organisational Transformation and Alignment: Misalignment as an Impediment to Progress in Organisational Development.
16-29
Electronic Edition
(link)
BibTeX
Geoffrey Ebbs
,
Howard Rheingold
:
Censorship on the Information Highway.
30-31
Electronic Edition
(link)
BibTeX
Philip Berner
:
Software Auditing Means Better Business.
32-34
Electronic Edition
(link)
BibTeX
Karen A. Forcht
,
Yuan-Wen Aven Tsai
:
Security and Network Management: Changes in the Way We Work.
35-41
Electronic Edition
(link)
BibTeX
Volume 2, Number 5, 1994
Karen A. Forcht
,
Morey Oare
:
The Information Highway: The Interstate Highway System for Computer Networks.
4-8
Electronic Edition
(link)
BibTeX
James R. Butler
,
Karen A. Forcht
:
The Clipper Chip and the Price of Security in America.
9-12
Electronic Edition
(link)
BibTeX
Ross J. Anderson
:
Whither Cryptography.
13-20
Electronic Edition
(link)
BibTeX
Zeinab A. Karake
:
A Study of Information Technology Structure: Firm Ownership and Managerial Characteristics.
21-30
Electronic Edition
(link)
BibTeX
Jon-Arild Johannessen
,
Lars Kolvereid
:
Information Search Behaviour during Business Gestation.
31-41
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:03:33 2009 by
Michael Ley
(
ley@uni-trier.de
)