Journal: Inf. Manag. Comput. Security

Volume 4, Issue 1

5 -- 9Liz Coghlan, Margaret A. Hurley. A profile of the information technology executive
10 -- 18Yong Shi, Pamela Specht, Justin Stolen. A consensus ranking for information system requirements
19 -- 31Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms. A business approach to effective information technology risk analysis and management
32 -- 37Ethan Sanderson, Karen A. Forcht. Information security in business environments
38 -- 42Gregory R. Doddrell. Extinguishing halons
43 -- 44Charles Cresson Wood. Constructing difficult-to-guess passwords
45 -- 46Douglas Brockway. Knowledge technologies and business alignment
47 -- 49Carrie Liddy. Commercial security on the Internet