Journal: Computers & Security

Volume 10, Issue 4

293 -- 297Belden Menkus. Control is fundamental to successful information security
303 -- 307Jack Bologna. A framework for the ethical analysis of information technologies
309 -- 324Ronald Paans. With MVS/ESA security labels towards B1
325 -- 327Paul Evans. Computer fraud - The situation, detection and training
331 -- 344Gerald V. Post, Karen-Ann Kievit. Accessibility vs. security: A look at the demand for computer security
345 -- 357Avi Rushinek, Sara F. Rushinek. Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security
359 -- 370Christof Schramm. Computing centers undermine MVS security