Journal: Inf. Manag. Comput. Security

Volume 4, Issue 5

3 -- 6Thornton May. Internet and Intranet: the faces of the wired economy
7 -- 14Joseph Heinen. Internet marketing practices
15 -- 17Brian McWilliams. The value brokers: how to measure client/server payback
18 -- 21Narender K. Ramarapu. Executive information systems in financial institutions: an introduction
22 -- 23Charles Cresson Wood. Removal of all unauthorized access paths in production software

Volume 4, Issue 4

3 -- 9Karen A. Forcht. Doing business on the Internet: marketing and security aspects
10 -- 19Mohamed H. Abdallah. An integrated approach for system evaluation: study results
20 -- 25Sharman Lichtenstein. Factors in the selection of a risk assessment method
26 -- 33. The Ernst & Young International Information Security Survey 1995
34 -- 35Charles Cresson Wood. Information owners, custodians and users
36 -- 38Thornton May. The Thornton May Files

Volume 4, Issue 3

3 -- 17Brian Kearvell-White. National (UK) Computer Security Survey 1996
18 -- 19Charles Cresson Wood. A policy for sending secret information over communications networks
20 -- 25Gary Gibson. An introduction to seismology
26 -- 29Colin Maslen. Testing the plan is more important than the plan itself
30 -- 35Ross Lowrey. Relating information and value disciplines
36 -- 38Thornton May. The Thornton May Files
39 -- 41John McCormick. Telecommunications deregulation: an Australian perspective

Volume 4, Issue 2

4 -- 0Charles Cresson Wood. A computer emergency response team policy
5 -- 6Kevin J. Fitzgerald. Corporate policy at Cable & Wireless enhances business efficiency and improves quality of working life
7 -- 10Charles Brookson. Mobile secure telephones
11 -- 13Goh Moh Heng. Developing a suitable business continuity planning methodology
14 -- 17Kevin J. Fitzgerald. Data security report
18 -- 26Bev Stymiest. Providing security for Unix networks
27 -- 38Alice Sturgeon. Telework: threats, risks and solutions
39 -- 41Jan Duffy. Collaborative computing, groupware and knowledge
42 -- 51Brian Kearvell-White. KPMG s UK Computer Security Review 1994
52 -- 53Randy Howe. Getting beyond the dark side of distributed computing

Volume 4, Issue 1

5 -- 9Liz Coghlan, Margaret A. Hurley. A profile of the information technology executive
10 -- 18Yong Shi, Pamela Specht, Justin Stolen. A consensus ranking for information system requirements
19 -- 31Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms. A business approach to effective information technology risk analysis and management
32 -- 37Ethan Sanderson, Karen A. Forcht. Information security in business environments
38 -- 42Gregory R. Doddrell. Extinguishing halons
43 -- 44Charles Cresson Wood. Constructing difficult-to-guess passwords
45 -- 46Douglas Brockway. Knowledge technologies and business alignment
47 -- 49Carrie Liddy. Commercial security on the Internet