Information Management & Computer Security
, Volume 5
Volume 5, Number 1, 1997
Jim Best
,
Thornton May
:
Is your infrastructure ticking?
3-6
Electronic Edition
(link)
BibTeX
Douglas Brockway
:
There's an entranet in your future.
7-10
Electronic Edition
(link)
BibTeX
Schubert Foo
,
Ee-Peng Lim
:
Managing World Wide Web publications.
11-17
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
Part of the foundation for secure systems: separation of duties policy.
18-19
Electronic Edition
(link)
BibTeX
Rossouw von Solms
:
Driving safely on the information superhighway.
20-22
Electronic Edition
(link)
BibTeX
Karen A. Forcht
,
Daphyne Saunders Thomas
,
Mark L. Usry
,
Kelly Egan
:
Control of the Internet.
23-28
Electronic Edition
(link)
BibTeX
Michael Pattison
:
Legal implications of doing business on the Internet.
29-34
Electronic Edition
(link)
BibTeX
Volume 5, Number 2, 1997
Catherine Harrington
:
Compassion in World Farming: an imaging and text retrieval case.
51-52
Electronic Edition
(link)
BibTeX
Margaret A. Hurley
:
Managing the desktop: research findings.
53-57
Electronic Edition
(link)
BibTeX
Ernest Higgs
:
Health informatics blueprint: business needs.
58-62
Electronic Edition
(link)
BibTeX
Pauline Ratnasingham
:
EDI security: a model of EDI risks and associated controls.
63-71
Electronic Edition
(link)
BibTeX
Kon Karakasidis
:
A project planning process for business continuity.
72-78
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
A secure password storage policy.
79-80
Electronic Edition
(link)
BibTeX
Volume 5, Number 3, 1997
Carrie Liddy
:
Commercialization of cryptography.
87-89
Electronic Edition
(link)
BibTeX
Thornton May
:
The death of ROI: re-thinking IT value measurement.
90-92
Electronic Edition
(link)
BibTeX
Zeinab A. Karake
:
Managing information resources and environmental turbulence.
93-99
Electronic Edition
(link)
BibTeX
Charles Cresson Wood
:
Securely handling staff terminations.
100-101
Electronic Edition
(link)
BibTeX
Schubert Foo
,
Peng-Chor Leong
,
Yee Nam Sng
:
Improving security in computational electronic mail systems.
102-110
Electronic Edition
(link)
BibTeX
Steve Orlowski
:
Government initiatives in information technology security.
111-118
Electronic Edition
(link)
BibTeX
Volume 5, Number 4, 1997
Richard L. Nolan
:
Top-down driven architecture design.
123-125
Electronic Edition
(link)
BibTeX
Margaret A. Hurley
,
Folker Schaumann
:
KPMG survey: the IT outsourcing decision.
126-132
Electronic Edition
(link)
BibTeX
Jeff Gooch
:
Managing for demonstrably effective IT projects.
133-137
Electronic Edition
(link)
BibTeX
Lam-for Kwok
:
Hypertext information security model for organizations.
138-148
Electronic Edition
(link)
BibTeX
Everard Tarascio
:
Business critical messaging.
149-152
Electronic Edition
(link)
BibTeX
Volume 5, Number 5, 1997
Pim Roest
:
The golden rules for implementing the balanced business scorecard.
163-165
Electronic Edition
(link)
BibTeX
Susan Oliver
:
A model for the future of electronic commerce.
166-169
Electronic Edition
(link)
BibTeX
Margaret A. Hurley
,
Rod Harris
:
Facilitating corporate knowledge: building the data warehouse.
170-174
Electronic Edition
(link)
BibTeX
Stephen Wilson
:
Certificates and trust in electronic commerce.
175-181
Electronic Edition
(link)
BibTeX
Sharman Lichtenstein
,
Paula M. C. Swatman
:
Internet acceptable usage policy for organizations.
182-190
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:03:33 2009 by
Michael Ley
(
ley@uni-trier.de
)