Journal: Inf. Manag. Comput. Security

Volume 2, Issue 5

4 -- 8Karen A. Forcht, Morey Oare. The Information Highway: The Interstate Highway System for Computer Networks
9 -- 12James R. Butler, Karen A. Forcht. The Clipper Chip and the Price of Security in America
13 -- 20Ross J. Anderson. Whither Cryptography
21 -- 30Zeinab A. Karake. A Study of Information Technology Structure: Firm Ownership and Managerial Characteristics
31 -- 41Jon-Arild Johannessen, Lars Kolvereid. Information Search Behaviour during Business Gestation

Volume 2, Issue 4

3 -- 8Dieter Fink. A Security Framework for Information Systems Outsourcing
9 -- 15Kevin J. Fitzgerald. Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide IT Environment
30 -- 31Geoffrey Ebbs, Howard Rheingold. Censorship on the Information Highway
32 -- 34Philip Berner. Software Auditing Means Better Business
35 -- 41Karen A. Forcht, Yuan-Wen Aven Tsai. Security and Network Management: Changes in the Way We Work

Volume 2, Issue 3

4 -- 18Keith Fletcher, Mark Donaghy. The Role of Competitor Information Systems
19 -- 25Kenneth P. Weiss. To Serve and Protect: Reconciling Information Protection with LAN Environments
26 -- 28Graham P. Bell, David Kavanagh. Minimizing Risk in Your Wide Area Network Design
29 -- 36Stewart White. The Data Network Disaster Recovery Plan: Considerations and Concerns
37 -- 42Bruce Edwards. Developing a Successful Network Disaster Recovery Plan
43 -- 45Kenneth P. Weiss. New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade
46 -- 0David Hains. EDI Security Issues Can Be Overcome

Volume 2, Issue 2

4 -- 9Jon-Arild Johannessen. Information Technology and Innovation: Identifying Critical Innovation Factors
10 -- 22Rachid M. Zeffane. Computer Usage and Job Satisfaction: An Empirical Exploration
23 -- 28Karen A. Forcht, Daphyne Saunders Thomas. Information Compilation and Disbursement: Moral, Legal and Ethical Considerations
29 -- 31James M. Geary. Executive Liability for Computer Crime and How to Prevent It
32 -- 35G. Southern, Allistair U. Murray. Quality Information Management: The Way to a Better Company Culture

Volume 2, Issue 1

4 -- 11Christian N. Madu, Chu-hua Kuei. Optimum Information Technology for Socioeconomic Development
12 -- 17Simon Rogerson, Christine Fidler. Strategic Information Systems Planning: Its Adoption and Use
18 -- 24William J. Caelli. Security in Open and Distributed Systems
25 -- 27David Hains. Authentication: A Prominent Issue for Data Communications
28 -- 40Fredric B. Gluck. Protection of Electronic Mail and Electronic Messages: Challenges and Solutions
41 -- 43Kevin J. Fitzgerald. The Importance of a Network Disaster Recovery Plan