researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
3
, Issue
5
3
--
7
Richard L. Nolan
.
Improving IT quality: the basics to boost service and cut costs
8
--
20
Maaikel Klein Klouwenberg
,
William J. D. Koo
,
J. Alphons M. van Schaik
.
Establishing business strategy with information technology
21
--
22
Charles Cresson Wood
.
Background checks for employees in computer-related positions of trust
23
--
24
Thornton May
.
Chief information officer ABCs
25
--
28
David Zerman
.
Crisis communication: managing the mass media
29
--
35
David P. Norton
.
Managing benefits from information technology
Volume
3
, Issue
4
3
--
14
Gregory R. Doddrell
.
Security environment reviews
15
--
19
Gregory R. Doddrell
.
Information security and the Internet
20
--
22
Barry Gubbins
.
Protecting availability in complex computer environments
23
--
26
Charles Cresson Wood
.
The Charles Cresson Wood file
27
--
33
Kevin J. Fitzgerald
.
Security and data integrity for LANs and WANs
Volume
3
, Issue
3
3
--
6
Catherine Ko
,
Margaret A. Hurley
.
Managing end-user computing
7
--
16
Barry Moule
,
Lina Giavara
.
Policies, procedures and standards: an approach for implementation
17
--
19
Russell Smith
.
Business continuity planning and service level agreements
20
--
24
Kevin J. Fitzgerald
.
Establishing an effective continuity strategy
25
--
33
Thornton May
.
The interpersonal computer interregnum
Volume
3
, Issue
2
3
--
7
Richard G. Mathieu
,
Robert L. Woodard
.
Data integrity and the Internet: implications for management
8
--
12
Kevin J. Fitzgerald
.
Information security baselines
13
--
19
Matthew K. O. Lee
.
Legal control of computer crime in Hong Kong
20
--
26
Phil Spurling
.
Promoting security awareness and commitment
27
--
33
Snehamay Banerjee
,
Damodar Y. Golhar
.
Security issues in the EDI environment
34
--
38
Mahmoud M. Yasin
,
John V. Quigley
.
The utility of information systems views of CEOs and information system executives
Volume
3
, Issue
1
4
--
6
Martin Whybrow
.
Bridging the gaps
9
--
17
T. J. Paradine
.
Business interruption insurance: a vital ingredient in your disaster recovery plan
18
--
20
Jay Bloombecker
.
Simplifying the state and federal computer crime law maze in the USA
21
--
27
Bruce Edwards
,
John Cooper
.
Testing the disaster recovery plan
28
--
29
John R. Campbell
.
Real security for local area networks
30
--
37
Richard Cardinali
.
Safeguarding databases: basic concepts revisited
38
--
40
Kevin J. Fitzgerald
.
What if you had a flood in your computer room
41
--
45
Graham Collier
.
Information privacy