Journal: Inf. Manag. Comput. Security

Volume 1, Issue 5

0 -- 0Justice Michael Kirby. The Human Genome Project: Promise or Problems?
0 -- 0Charles Cresson Wood. Dreams Come True with Password Genie
0 -- 0Justice Michael Kirby. Legal Aspects of the Human Genome Project: Reflections on the Bilbao Conference
0 -- 0Karen A. Forcht, Robert G. Brookshire, Scott P. Stevens, Rodney Clarke. Computer Ethics of University Students: An International Exploratory Study
0 -- 0Kevin J. Fitzgerald. Risk Analysis: Ten Years On

Volume 1, Issue 4

0 -- 0Jon-Arild Johannessen, Johan Olaisen. Information, Communication and Innovation: Identifying Critical Innovation Factors (CIF)
0 -- 0David Hains. Computer Security as a Liability Control Tool
0 -- 0Kenneth P. Weiss. Data Integrity and Security: Who s in Charge Here Anyway?
0 -- 0Tom Newman. Information Loss Rarely Recovered
0 -- 0Mark Gabbott, Ewan Sutherland. Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment
0 -- 0H. James, Roger A. Coldwell. Corporate Security: An Australian Ostrich

Volume 1, Issue 3

4 -- 11Fredric B. Gluck. The Open Security Architecture
12 -- 17Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli. A Model for Information Security Management
18 -- 31Andrew Bird, Tom Blaney, John Burton. DataComms 2000: A Strategic Exploration of a Transforming Industry

Volume 1, Issue 2

0 -- 0Ross Hamilton. Does IT Matter When Companies Merge?
0 -- 0Christine Fidler, Simon Rogerson, Nicola Spiers. Current IS Practices within UK-based Organizations
0 -- 0Vic Kamay, Tony Adams. The 1992 Profile of Computer Abuse in Australia: Part 2
0 -- 0Philip Berner. Software Auditing: Effectively Combating the Five Deadly Sins
0 -- 0Kevin J. Fitzgerald. Business Continuity Planning in a Distributed Downsized Environment
0 -- 0K. G. B. Bakewell. Information: The Seventh Management Function?
0 -- 0Chris Edwards, Joe Peppard. A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate the Fog

Volume 1, Issue 1

4 -- 10Helen van de Haar, Rossouw von Solms. A Tool for Information Security Management
11 -- 18Ugur Yavas, Mahmoud M. Yasin. Computing Environment in an Arabian Gulf Country: An Organizational Perspective
19 -- 21Dieter Fink, Daniel C. Duffy. Security Officers Attitudes to the Use of Shared Logons
22 -- 28Mohammed H. A. Tafti, Ehsan Nikbakht. Neural Networks and Expert Systems: New Horizons in Business Finance Applications
29 -- 38William J. Martin, Michael Armstrong. STAR and Economic Regeneration: Some Feedback from Northern Ireland