


default search action
Information Management & Computer Security, Volume 3
Volume 3, Number 1, 1995
- Martin Whybrow:

Bridging the gaps. 4-6 - Elaine Irwin:

Software Intelligence introduces a new cross-platform, dient/server security solution. 7-8 - T. J. Paradine:

Business interruption insurance: a vital ingredient in your disaster recovery plan. 9-17 - Jay BloomBecker:

Simplifying the state and federal computer crime law maze in the USA. 18-20 - Bruce Edwards, John Cooper:

Testing the disaster recovery plan. 21-27 - John R. Campbell:

Real security for local area networks. 28-29 - Richard Cardinali:

Safeguarding databases: basic concepts revisited. 30-37 - Kevin J. Fitzgerald:

What if you had a flood in your computer room. 38-40 - Graham Collier:

Information privacy. 41-45
Volume 3, Number 2, 1995
- Richard G. Mathieu, Robert L. Woodard:

Data integrity and the Internet: implications for management. 3-7 - Kevin J. Fitzgerald:

Information security baselines. 8-12 - Matthew K. O. Lee

:
Legal control of computer crime in Hong Kong. 13-19 - Phil Spurling:

Promoting security awareness and commitment. 20-26 - Snehamay Banerjee, Damodar Y. Golhar:

Security issues in the EDI environment. 27-33 - Mahmoud M. Yasin, John V. Quigley:

The utility of information systems views of CEOs and information system executives. 34-38
Volume 3, Number 3, 1995
- Catherine Ko, Margaret A. Hurley:

Managing end-user computing. 3-6 - Barry Moule, Lina Giavara:

Policies, procedures and standards: an approach for implementation. 7-16 - Russell Smith:

Business continuity planning and service level agreements. 17-19 - Kevin J. Fitzgerald:

Establishing an effective continuity strategy. 20-24 - Thornton May:

The interpersonal computer interregnum. 25-33
Volume 3, Number 4, 1995
- Gregory R. Doddrell:

Security environment reviews. 3-14 - Gregory R. Doddrell:

Information security and the Internet. 15-19 - Barry Gubbins:

Protecting availability in complex computer environments. 20-22 - Charles Cresson Wood:

The Charles Cresson Wood file. 23-26 - Kevin J. Fitzgerald:

Security and data integrity for LANs and WANs. 27-33
Volume 3, Number 5, 1995
- Richard L. Nolan:

Improving IT quality: the basics to boost service and cut costs. 3-7 - Maaikel Klein Klouwenberg, William J. D. Koo, J. Alphons M. van Schaik:

Establishing business strategy with information technology. 8-20 - Charles Cresson Wood:

Background checks for employees in computer-related positions of trust. 21-22 - Thornton May:

Chief information officer ABCs. 23-24 - David Zerman:

Crisis communication: managing the mass media. 25-28 - David P. Norton:

Managing benefits from information technology. 29-35

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














