


default search action
Information Management & Computer Security, Volume 1
Volume 1, Number 1, 1993
- Helen van de Haar, Rossouw von Solms:
A Tool for Information Security Management. 4-10 - Ugur Yavas, Mahmoud M. Yasin:
Computing Environment in an Arabian Gulf Country: An Organizational Perspective. 11-18 - Dieter Fink, Daniel C. Duffy:
Security Officers' Attitudes to the Use of Shared Logons. 19-21 - Mohammed H. A. Tafti, Ehsan Nikbakht:
Neural Networks and Expert Systems: New Horizons in Business Finance Applications. 22-28 - William J. Martin, Michael Armstrong:
STAR and Economic Regeneration: Some Feedback from Northern Ireland. 29-38
Volume 1, Number 2, 1993
- Chris Edwards, Joe Peppard:
A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate the Fog. - Philip Berner:
Software Auditing: Effectively Combating the Five Deadly Sins. - Christine Fidler, Simon Rogerson
, Nicola Spiers:
Current IS Practices within UK-based Organizations. - Vic Kamay, Tony Adams:
The 1992 Profile of Computer Abuse in Australia: Part 2. - Kenneth Graham Bartlett Bakewell:
Information: The Seventh Management Function? - Kevin J. Fitzgerald:
Business Continuity Planning in a Distributed Downsized Environment. - Ross Hamilton:
Does IT Matter When Companies Merge?
Volume 1, Number 3, 1993
- Fredric B. Gluck:
The Open Security Architecture. 4-11 - Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli:
A Model for Information Security Management. 12-17 - Andrew Bird, Tom Blaney, John Burton:
DataComms 2000: A Strategic Exploration of a Transforming Industry. 18-31
Volume 1, Number 4, 1993
- Kenneth P. Weiss:
Data Integrity and Security: Who's in Charge Here Anyway? - H. James, Roger A. Coldwell:
Corporate Security: An Australian Ostrich. - Pat Williams Moore:
BMS CAT in Action: Electronic/Communications Recovery at the World Trade Centre, New York. - David Hains:
Computer Security as a Liability Control Tool. - Tom Newman:
Information Loss Rarely Recovered. - Mark Gabbott, Ewan Sutherland:
Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment. - Jon-Arild Johannessen, Johan Olaisen:
Information, Communication and Innovation: Identifying Critical Innovation Factors (CIF).
Volume 1, Number 5, 1993
- Justice Michael Kirby:
The Human Genome Project: Promise or Problems? - Justice Michael Kirby:
Legal Aspects of the Human Genome Project: Reflections on the Bilbao Conference. - Kevin J. Fitzgerald:
Risk Analysis: Ten Years On. - Karen A. Forcht, Robert G. Brookshire
, Scott Paul Stevens, Rodney J. Clarke
:
Computer Ethics of University Students: An International Exploratory Study. - Charles Cresson Wood:
Dreams Come True with Password Genie.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.