Information Management & Computer Security
, Volume 4
Volume 4, Number 1, 1996
Liz Coghlan
,
Margaret A. Hurley
:
A profile of the information technology executive.
5-9
Electronic Edition
(link)
BibTeX
Yong Shi
,
Pamela Specht
,
Justin Stolen
:
A consensus ranking for information system requirements.
10-18
Electronic Edition
(link)
BibTeX
Sharon Halliday
,
Karin P. Badenhorst
,
Rossouw von Solms
:
A business approach to effective information technology risk analysis and management.
19-31
Electronic Edition
(link)
BibTeX
Ethan Sanderson
,
Karen A. Forcht
:
Information security in business environments.
32-37
Electronic Edition
(link)
BibTeX
Gregory R. Doddrell
:
Extinguishing halons.
38-42
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
Constructing difficult-to-guess passwords.
43-44
Electronic Edition
(link)
BibTeX
Douglas Brockway
:
Knowledge technologies and business alignment.
45-46
Electronic Edition
(link)
BibTeX
Carrie Liddy
:
Commercial security on the Internet.
47-49
Electronic Edition
(link)
BibTeX
Volume 4, Number 2, 1996
Charles Cresson Wood
:
A computer emergency response team policy.
4
Electronic Edition
(link)
BibTeX
Kevin J. Fitzgerald
:
Corporate policy at Cable & Wireless enhances business efficiency and improves quality of working life.
5-6
Electronic Edition
(link)
BibTeX
Charles Brookson
:
Mobile secure telephones.
7-10
Electronic Edition
(link)
BibTeX
Goh Moh Heng
:
Developing a suitable business continuity planning methodology.
11-13
Electronic Edition
(link)
BibTeX
Kevin J. Fitzgerald
:
Data security report.
14-17
Electronic Edition
(link)
BibTeX
Bev Stymiest
:
Providing security for Unix networks.
18-26
Electronic Edition
(link)
BibTeX
Alice Sturgeon
:
Telework: threats, risks and solutions.
27-38
Electronic Edition
(link)
BibTeX
Jan Duffy
:
Collaborative computing, groupware and knowledge.
39-41
Electronic Edition
(link)
BibTeX
Brian Kearvell-White
:
KPMG's UK Computer Security Review 1994.
42-51
Electronic Edition
(link)
BibTeX
Randy Howe
:
Getting beyond the dark side of distributed computing.
52-53
Electronic Edition
(link)
BibTeX
Volume 4, Number 3, 1996
Brian Kearvell-White
:
National (UK) Computer Security Survey 1996.
3-17
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
A policy for sending secret information over communications networks.
18-19
Electronic Edition
(link)
BibTeX
Gary Gibson
:
An introduction to seismology.
20-25
Electronic Edition
(link)
BibTeX
Colin Maslen
:
"Testing the plan is more important than the plan itself".
26-29
Electronic Edition
(link)
BibTeX
Ross Lowrey
:
Relating information and value disciplines.
30-35
Electronic Edition
(link)
BibTeX
Thornton May
:
The Thornton May Files.
36-38
Electronic Edition
(link)
BibTeX
John McCormick
:
Telecommunications deregulation: an Australian perspective.
39-41
Electronic Edition
(link)
BibTeX
Volume 4, Number 4, 1996
Karen A. Forcht
:
Doing business on the Internet: marketing and security aspects.
3-9
Electronic Edition
(link)
BibTeX
Mohamed H. Abdallah
:
An integrated approach for system evaluation: study results.
10-19
Electronic Edition
(link)
BibTeX
Sharman Lichtenstein
:
Factors in the selection of a risk assessment method.
20-25
Electronic Edition
(link)
BibTeX
The Ernst & Young International Information Security Survey 1995.
26-33
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
Information owners, custodians and users.
34-35
Electronic Edition
(link)
BibTeX
Thornton May
:
The Thornton May Files.
36-38
Electronic Edition
(link)
BibTeX
Volume 4, Number 5, 1996
Thornton May
:
Internet and Intranet: the faces of the wired economy.
3-6
Electronic Edition
(link)
BibTeX
Joseph Heinen
:
Internet marketing practices.
7-14
Electronic Edition
(link)
BibTeX
Brian McWilliams
:
The value brokers: how to measure client/server payback.
15-17
Electronic Edition
(link)
BibTeX
Narender K. Ramarapu
:
Executive information systems in financial institutions: an introduction.
18-21
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
Removal of all unauthorized access paths in production software.
22-23
Electronic Edition
(link)
BibTeX
Steve Frosdick
:
Practical management of programme risk: the case of the National Strategy for Police Information Systems for England and Wales.
24-33
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:03:33 2009 by
Michael Ley
(
ley@uni-trier.de
)