Journal: Inf. Manag. Comput. Security

Volume 5, Issue 5

163 -- 165Pim Roest. The golden rules for implementing the balanced business scorecard
166 -- 169Susan Oliver. A model for the future of electronic commerce
170 -- 174Margaret A. Hurley, Rod Harris. Facilitating corporate knowledge: building the data warehouse
175 -- 181Stephen Wilson. Certificates and trust in electronic commerce
182 -- 190Sharman Lichtenstein, Paula M. C. Swatman. Internet acceptable usage policy for organizations

Volume 5, Issue 4

123 -- 125Richard L. Nolan. Top-down driven architecture design
126 -- 132Margaret A. Hurley, Folker Schaumann. KPMG survey: the IT outsourcing decision
133 -- 137Jeff Gooch. Managing for demonstrably effective IT projects
138 -- 148Lam-for Kwok. Hypertext information security model for organizations
149 -- 152Everard Tarascio. Business critical messaging

Volume 5, Issue 3

87 -- 89Carrie Liddy. Commercialization of cryptography
90 -- 92Thornton May. The death of ROI: re-thinking IT value measurement
93 -- 99Zeinab A. Karake. Managing information resources and environmental turbulence
100 -- 101Charles Cresson Wood. Securely handling staff terminations
102 -- 110Schubert Foo, Peng-Chor Leong, Yee Nam Sng. Improving security in computational electronic mail systems
111 -- 118Steve Orlowski. Government initiatives in information technology security

Volume 5, Issue 2

51 -- 52Catherine Harrington. Compassion in World Farming: an imaging and text retrieval case
53 -- 57Margaret A. Hurley. Managing the desktop: research findings
58 -- 62Ernest Higgs. Health informatics blueprint: business needs
63 -- 71Pauline Ratnasingham. EDI security: a model of EDI risks and associated controls
72 -- 78Kon Karakasidis. A project planning process for business continuity
79 -- 80Charles Cresson Wood. A secure password storage policy

Volume 5, Issue 1

3 -- 6Jim Best, Thornton May. Is your infrastructure ticking?
7 -- 10Douglas Brockway. There s an entranet in your future
11 -- 17Schubert Foo, Ee-Peng Lim. Managing World Wide Web publications
18 -- 19Charles Cresson Wood. Part of the foundation for secure systems: separation of duties policy
20 -- 22Rossouw von Solms. Driving safely on the information superhighway
23 -- 28Karen A. Forcht, Daphyne Saunders Thomas, Mark L. Usry, Kelly Egan. Control of the Internet
29 -- 34Michael Pattison. Legal implications of doing business on the Internet