Journal: Inf. Manag. Comput. Security

Volume 3, Issue 5

3 -- 7Richard L. Nolan. Improving IT quality: the basics to boost service and cut costs
8 -- 20Maaikel Klein Klouwenberg, William J. D. Koo, J. Alphons M. van Schaik. Establishing business strategy with information technology
21 -- 22Charles Cresson Wood. Background checks for employees in computer-related positions of trust
23 -- 24Thornton May. Chief information officer ABCs
25 -- 28David Zerman. Crisis communication: managing the mass media
29 -- 35David P. Norton. Managing benefits from information technology

Volume 3, Issue 4

3 -- 14Gregory R. Doddrell. Security environment reviews
15 -- 19Gregory R. Doddrell. Information security and the Internet
20 -- 22Barry Gubbins. Protecting availability in complex computer environments
23 -- 26Charles Cresson Wood. The Charles Cresson Wood file
27 -- 33Kevin J. Fitzgerald. Security and data integrity for LANs and WANs

Volume 3, Issue 3

3 -- 6Catherine Ko, Margaret A. Hurley. Managing end-user computing
7 -- 16Barry Moule, Lina Giavara. Policies, procedures and standards: an approach for implementation
17 -- 19Russell Smith. Business continuity planning and service level agreements
20 -- 24Kevin J. Fitzgerald. Establishing an effective continuity strategy
25 -- 33Thornton May. The interpersonal computer interregnum

Volume 3, Issue 2

3 -- 7Richard G. Mathieu, Robert L. Woodard. Data integrity and the Internet: implications for management
8 -- 12Kevin J. Fitzgerald. Information security baselines
13 -- 19Matthew K. O. Lee. Legal control of computer crime in Hong Kong
20 -- 26Phil Spurling. Promoting security awareness and commitment
27 -- 33Snehamay Banerjee, Damodar Y. Golhar. Security issues in the EDI environment
34 -- 38Mahmoud M. Yasin, John V. Quigley. The utility of information systems views of CEOs and information system executives

Volume 3, Issue 1

4 -- 6Martin Whybrow. Bridging the gaps
9 -- 17T. J. Paradine. Business interruption insurance: a vital ingredient in your disaster recovery plan
18 -- 20Jay Bloombecker. Simplifying the state and federal computer crime law maze in the USA
21 -- 27Bruce Edwards, John Cooper. Testing the disaster recovery plan
28 -- 29John R. Campbell. Real security for local area networks
30 -- 37Richard Cardinali. Safeguarding databases: basic concepts revisited
38 -- 40Kevin J. Fitzgerald. What if you had a flood in your computer room
41 -- 45Graham Collier. Information privacy