


default search action
Information Management & Computer Security, Volume 5
Volume 5, Number 1, 1997
- Jim Best, Thornton May:

Is your infrastructure ticking? 3-6 - Douglas Brockway:

There's an entranet in your future. 7-10 - Schubert Foo

, Ee-Peng Lim
:
Managing World Wide Web publications. 11-17 - Charles Cresson Wood:

Part of the foundation for secure systems: separation of duties policy. 18-19 - Rossouw von Solms:

Driving safely on the information superhighway. 20-22 - Karen A. Forcht, Daphyne Saunders Thomas, Mark L. Usry, Kelly Egan:

Control of the Internet. 23-28 - Michael Pattison:

Legal implications of doing business on the Internet. 29-34
Volume 5, Number 2, 1997
- Catherine Harrington:

Compassion in World Farming: an imaging and text retrieval case. 51-52 - Margaret A. Hurley:

Managing the desktop: research findings. 53-57 - Ernest Higgs:

Health informatics blueprint: business needs. 58-62 - Pauline Ratnasingham:

EDI security: a model of EDI risks and associated controls. 63-71 - Kon Karakasidis:

A project planning process for business continuity. 72-78 - Charles Cresson Wood:

A secure password storage policy. 79-80
Volume 5, Number 3, 1997
- Carrie Liddy:

Commercialization of cryptography. 87-89 - Thornton May:

The death of ROI: re-thinking IT value measurement. 90-92 - Zeinab A. Karake:

Managing information resources and environmental turbulence. 93-99 - Charles Cresson Wood:

Securely handling staff terminations. 100-101 - Schubert Foo

, Peng-Chor Leong, Yee Nam Sng:
Improving security in computational electronic mail systems. 102-110 - Steve Orlowski:

Government initiatives in information technology security. 111-118
Volume 5, Number 4, 1997
- Richard L. Nolan:

Top-down driven architecture design. 123-125 - Margaret A. Hurley, Folker Schaumann:

KPMG survey: the IT outsourcing decision. 126-132 - Jeff Gooch:

Managing for demonstrably effective IT projects. 133-137 - Lam-for Kwok

:
Hypertext information security model for organizations. 138-148 - Everard Tarascio:

Business critical messaging. 149-152
Volume 5, Number 5, 1997
- Pim Roest:

The golden rules for implementing the balanced business scorecard. 163-165 - Susan Oliver:

A model for the future of electronic commerce. 166-169 - Margaret A. Hurley, Rod Harris:

Facilitating corporate knowledge: building the data warehouse. 170-174 - Stephen Wilson:

Certificates and trust in electronic commerce. 175-181 - Sharman Lichtenstein, Paula M. C. Swatman:

Internet acceptable usage policy for organizations. 182-190

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














