researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
2
, Issue
5
4
--
8
Karen A. Forcht
,
Morey Oare
.
The Information Highway: The Interstate Highway System for Computer Networks
9
--
12
James R. Butler
,
Karen A. Forcht
.
The Clipper Chip and the Price of Security in America
13
--
20
Ross J. Anderson
.
Whither Cryptography
21
--
30
Zeinab A. Karake
.
A Study of Information Technology Structure: Firm Ownership and Managerial Characteristics
31
--
41
Jon-Arild Johannessen
,
Lars Kolvereid
.
Information Search Behaviour during Business Gestation
Volume
2
, Issue
4
3
--
8
Dieter Fink
.
A Security Framework for Information Systems Outsourcing
9
--
15
Kevin J. Fitzgerald
.
Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide IT Environment
30
--
31
Geoffrey Ebbs
,
Howard Rheingold
.
Censorship on the Information Highway
32
--
34
Philip Berner
.
Software Auditing Means Better Business
35
--
41
Karen A. Forcht
,
Yuan-Wen Aven Tsai
.
Security and Network Management: Changes in the Way We Work
Volume
2
, Issue
3
4
--
18
Keith Fletcher
,
Mark Donaghy
.
The Role of Competitor Information Systems
19
--
25
Kenneth P. Weiss
.
To Serve and Protect: Reconciling Information Protection with LAN Environments
26
--
28
Graham P. Bell
,
David Kavanagh
.
Minimizing Risk in Your Wide Area Network Design
29
--
36
Stewart White
.
The Data Network Disaster Recovery Plan: Considerations and Concerns
37
--
42
Bruce Edwards
.
Developing a Successful Network Disaster Recovery Plan
43
--
45
Kenneth P. Weiss
.
New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade
46
--
0
David Hains
.
EDI Security Issues Can Be Overcome
Volume
2
, Issue
2
4
--
9
Jon-Arild Johannessen
.
Information Technology and Innovation: Identifying Critical Innovation Factors
10
--
22
Rachid M. Zeffane
.
Computer Usage and Job Satisfaction: An Empirical Exploration
23
--
28
Karen A. Forcht
,
Daphyne Saunders Thomas
.
Information Compilation and Disbursement: Moral, Legal and Ethical Considerations
29
--
31
James M. Geary
.
Executive Liability for Computer Crime and How to Prevent It
32
--
35
G. Southern
,
Allistair U. Murray
.
Quality Information Management: The Way to a Better Company Culture
Volume
2
, Issue
1
4
--
11
Christian N. Madu
,
Chu-hua Kuei
.
Optimum Information Technology for Socioeconomic Development
12
--
17
Simon Rogerson
,
Christine Fidler
.
Strategic Information Systems Planning: Its Adoption and Use
18
--
24
William J. Caelli
.
Security in Open and Distributed Systems
25
--
27
David Hains
.
Authentication: A Prominent Issue for Data Communications
28
--
40
Fredric B. Gluck
.
Protection of Electronic Mail and Electronic Messages: Challenges and Solutions
41
--
43
Kevin J. Fitzgerald
.
The Importance of a Network Disaster Recovery Plan