researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
5
, Issue
5
163
--
165
Pim Roest
.
The golden rules for implementing the balanced business scorecard
166
--
169
Susan Oliver
.
A model for the future of electronic commerce
170
--
174
Margaret A. Hurley
,
Rod Harris
.
Facilitating corporate knowledge: building the data warehouse
175
--
181
Stephen Wilson
.
Certificates and trust in electronic commerce
182
--
190
Sharman Lichtenstein
,
Paula M. C. Swatman
.
Internet acceptable usage policy for organizations
Volume
5
, Issue
4
123
--
125
Richard L. Nolan
.
Top-down driven architecture design
126
--
132
Margaret A. Hurley
,
Folker Schaumann
.
KPMG survey: the IT outsourcing decision
133
--
137
Jeff Gooch
.
Managing for demonstrably effective IT projects
138
--
148
Lam-for Kwok
.
Hypertext information security model for organizations
149
--
152
Everard Tarascio
.
Business critical messaging
Volume
5
, Issue
3
87
--
89
Carrie Liddy
.
Commercialization of cryptography
90
--
92
Thornton May
.
The death of ROI: re-thinking IT value measurement
93
--
99
Zeinab A. Karake
.
Managing information resources and environmental turbulence
100
--
101
Charles Cresson Wood
.
Securely handling staff terminations
102
--
110
Schubert Foo
,
Peng-Chor Leong
,
Yee Nam Sng
.
Improving security in computational electronic mail systems
111
--
118
Steve Orlowski
.
Government initiatives in information technology security
Volume
5
, Issue
2
51
--
52
Catherine Harrington
.
Compassion in World Farming: an imaging and text retrieval case
53
--
57
Margaret A. Hurley
.
Managing the desktop: research findings
58
--
62
Ernest Higgs
.
Health informatics blueprint: business needs
63
--
71
Pauline Ratnasingham
.
EDI security: a model of EDI risks and associated controls
72
--
78
Kon Karakasidis
.
A project planning process for business continuity
79
--
80
Charles Cresson Wood
.
A secure password storage policy
Volume
5
, Issue
1
3
--
6
Jim Best
,
Thornton May
.
Is your infrastructure ticking?
7
--
10
Douglas Brockway
.
There s an entranet in your future
11
--
17
Schubert Foo
,
Ee-Peng Lim
.
Managing World Wide Web publications
18
--
19
Charles Cresson Wood
.
Part of the foundation for secure systems: separation of duties policy
20
--
22
Rossouw von Solms
.
Driving safely on the information superhighway
23
--
28
Karen A. Forcht
,
Daphyne Saunders Thomas
,
Mark L. Usry
,
Kelly Egan
.
Control of the Internet
29
--
34
Michael Pattison
.
Legal implications of doing business on the Internet