researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
4
, Issue
5
3
--
6
Thornton May
.
Internet and Intranet: the faces of the wired economy
7
--
14
Joseph Heinen
.
Internet marketing practices
15
--
17
Brian McWilliams
.
The value brokers: how to measure client/server payback
18
--
21
Narender K. Ramarapu
.
Executive information systems in financial institutions: an introduction
22
--
23
Charles Cresson Wood
.
Removal of all unauthorized access paths in production software
Volume
4
, Issue
4
3
--
9
Karen A. Forcht
.
Doing business on the Internet: marketing and security aspects
10
--
19
Mohamed H. Abdallah
.
An integrated approach for system evaluation: study results
20
--
25
Sharman Lichtenstein
.
Factors in the selection of a risk assessment method
26
--
33
.
The Ernst & Young International Information Security Survey 1995
34
--
35
Charles Cresson Wood
.
Information owners, custodians and users
36
--
38
Thornton May
.
The Thornton May Files
Volume
4
, Issue
3
3
--
17
Brian Kearvell-White
.
National (UK) Computer Security Survey 1996
18
--
19
Charles Cresson Wood
.
A policy for sending secret information over communications networks
20
--
25
Gary Gibson
.
An introduction to seismology
26
--
29
Colin Maslen
.
Testing the plan is more important than the plan itself
30
--
35
Ross Lowrey
.
Relating information and value disciplines
36
--
38
Thornton May
.
The Thornton May Files
39
--
41
John McCormick
.
Telecommunications deregulation: an Australian perspective
Volume
4
, Issue
2
4
--
0
Charles Cresson Wood
.
A computer emergency response team policy
5
--
6
Kevin J. Fitzgerald
.
Corporate policy at Cable & Wireless enhances business efficiency and improves quality of working life
7
--
10
Charles Brookson
.
Mobile secure telephones
11
--
13
Goh Moh Heng
.
Developing a suitable business continuity planning methodology
14
--
17
Kevin J. Fitzgerald
.
Data security report
18
--
26
Bev Stymiest
.
Providing security for Unix networks
27
--
38
Alice Sturgeon
.
Telework: threats, risks and solutions
39
--
41
Jan Duffy
.
Collaborative computing, groupware and knowledge
42
--
51
Brian Kearvell-White
.
KPMG s UK Computer Security Review 1994
52
--
53
Randy Howe
.
Getting beyond the dark side of distributed computing
Volume
4
, Issue
1
5
--
9
Liz Coghlan
,
Margaret A. Hurley
.
A profile of the information technology executive
10
--
18
Yong Shi
,
Pamela Specht
,
Justin Stolen
.
A consensus ranking for information system requirements
19
--
31
Sharon Halliday
,
Karin P. Badenhorst
,
Rossouw von Solms
.
A business approach to effective information technology risk analysis and management
32
--
37
Ethan Sanderson
,
Karen A. Forcht
.
Information security in business environments
38
--
42
Gregory R. Doddrell
.
Extinguishing halons
43
--
44
Charles Cresson Wood
.
Constructing difficult-to-guess passwords
45
--
46
Douglas Brockway
.
Knowledge technologies and business alignment
47
--
49
Carrie Liddy
.
Commercial security on the Internet