researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
1
, Issue
5
0
--
0
Justice Michael Kirby
.
The Human Genome Project: Promise or Problems?
0
--
0
Charles Cresson Wood
.
Dreams Come True with Password Genie
0
--
0
Justice Michael Kirby
.
Legal Aspects of the Human Genome Project: Reflections on the Bilbao Conference
0
--
0
Karen A. Forcht
,
Robert G. Brookshire
,
Scott P. Stevens
,
Rodney Clarke
.
Computer Ethics of University Students: An International Exploratory Study
0
--
0
Kevin J. Fitzgerald
.
Risk Analysis: Ten Years On
Volume
1
, Issue
4
0
--
0
Jon-Arild Johannessen
,
Johan Olaisen
.
Information, Communication and Innovation: Identifying Critical Innovation Factors (CIF)
0
--
0
David Hains
.
Computer Security as a Liability Control Tool
0
--
0
Kenneth P. Weiss
.
Data Integrity and Security: Who s in Charge Here Anyway?
0
--
0
Tom Newman
.
Information Loss Rarely Recovered
0
--
0
Mark Gabbott
,
Ewan Sutherland
.
Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment
0
--
0
H. James
,
Roger A. Coldwell
.
Corporate Security: An Australian Ostrich
Volume
1
, Issue
3
4
--
11
Fredric B. Gluck
.
The Open Security Architecture
12
--
17
Rossouw von Solms
,
Sebastiaan H. von Solms
,
William J. Caelli
.
A Model for Information Security Management
18
--
31
Andrew Bird
,
Tom Blaney
,
John Burton
.
DataComms 2000: A Strategic Exploration of a Transforming Industry
Volume
1
, Issue
2
0
--
0
Ross Hamilton
.
Does IT Matter When Companies Merge?
0
--
0
Christine Fidler
,
Simon Rogerson
,
Nicola Spiers
.
Current IS Practices within UK-based Organizations
0
--
0
Vic Kamay
,
Tony Adams
.
The 1992 Profile of Computer Abuse in Australia: Part 2
0
--
0
Philip Berner
.
Software Auditing: Effectively Combating the Five Deadly Sins
0
--
0
Kevin J. Fitzgerald
.
Business Continuity Planning in a Distributed Downsized Environment
0
--
0
K. G. B. Bakewell
.
Information: The Seventh Management Function?
0
--
0
Chris Edwards
,
Joe Peppard
.
A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate the Fog
Volume
1
, Issue
1
4
--
10
Helen van de Haar
,
Rossouw von Solms
.
A Tool for Information Security Management
11
--
18
Ugur Yavas
,
Mahmoud M. Yasin
.
Computing Environment in an Arabian Gulf Country: An Organizational Perspective
19
--
21
Dieter Fink
,
Daniel C. Duffy
.
Security Officers Attitudes to the Use of Shared Logons
22
--
28
Mohammed H. A. Tafti
,
Ehsan Nikbakht
.
Neural Networks and Expert Systems: New Horizons in Business Finance Applications
29
--
38
William J. Martin
,
Michael Armstrong
.
STAR and Economic Regeneration: Some Feedback from Northern Ireland