


default search action
Information Management & Computer Security, Volume 2
Volume 2, Number 1, 1994
- Christian N. Madu, Chu-hua Kuei:

Optimum Information Technology for Socioeconomic Development. 4-11 - Simon Rogerson

, Christine Fidler:
Strategic Information Systems Planning: Its Adoption and Use. 12-17 - William J. Caelli:

Security in Open and Distributed Systems. 18-24 - David Hains:

Authentication: A Prominent Issue for Data Communications. 25-27 - Fredric B. Gluck:

Protection of Electronic Mail and Electronic Messages: Challenges and Solutions. 28-40 - Kevin J. Fitzgerald:

The Importance of a Network Disaster Recovery Plan. 41-43
Volume 2, Number 2, 1994
- Jon-Arild Johannessen:

Information Technology and Innovation: Identifying Critical Innovation Factors. 4-9 - Rachid M. Zeffane:

Computer Usage and Job Satisfaction: An Empirical Exploration. 10-22 - Karen A. Forcht, Daphyne Saunders Thomas:

Information Compilation and Disbursement: Moral, Legal and Ethical Considerations. 23-28 - James M. Geary:

Executive Liability for Computer Crime and How to Prevent It. 29-31 - G. Southern, Allistair U. Murray:

Quality Information Management: The Way to a Better Company Culture. 32-35
Volume 2, Number 3, 1994
- Keith Fletcher, Mark Donaghy:

The Role of Competitor Information Systems. 4-18 - Kenneth P. Weiss:

To Serve and Protect: Reconciling Information Protection with LAN Environments. 19-25 - Graham P. Bell, David Kavanagh:

Minimizing Risk in Your Wide Area Network Design. 26-28 - Stewart White:

The Data Network Disaster Recovery Plan: Considerations and Concerns. 29-36 - Bruce Edwards:

Developing a Successful Network Disaster Recovery Plan. 37-42 - Kenneth P. Weiss:

New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade. 43-45 - David Hains:

EDI Security Issues Can Be Overcome. 46
Volume 2, Number 4, 1994
- Dieter Fink:

A Security Framework for Information Systems Outsourcing. 3-8 - Kevin J. Fitzgerald:

Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide IT Environment. 9-15 - K. Hugh Macdonald:

Organisational Transformation and Alignment: Misalignment as an Impediment to Progress in Organisational Development. 16-29 - Geoffrey Ebbs, Howard Rheingold:

Censorship on the Information Highway. 30-31 - Philip Berner:

Software Auditing Means Better Business. 32-34 - Karen A. Forcht, Yuan-Wen Aven Tsai:

Security and Network Management: Changes in the Way We Work. 35-41
Volume 2, Number 5, 1994
- Karen A. Forcht, Morey Oare:

The Information Highway: The Interstate Highway System for Computer Networks. 4-8 - James R. Butler, Karen A. Forcht:

The Clipper Chip and the Price of Security in America. 9-12 - Ross J. Anderson:

Whither Cryptography. 13-20 - Zeinab A. Karake:

A Study of Information Technology Structure: Firm Ownership and Managerial Characteristics. 21-30 - Jon-Arild Johannessen, Lars Kolvereid

:
Information Search Behaviour during Business Gestation. 31-41

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














