


default search action
Information Management & Computer Security, Volume 4
Volume 4, Number 1, 1996
- Liz Coghlan, Margaret A. Hurley:

A profile of the information technology executive. 5-9 - Yong Shi, Pamela Specht, Justin Stolen:

A consensus ranking for information system requirements. 10-18 - Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms:

A business approach to effective information technology risk analysis and management. 19-31 - Ethan Sanderson, Karen A. Forcht:

Information security in business environments. 32-37 - Gregory R. Doddrell:

Extinguishing halons. 38-42 - Charles Cresson Wood:

Constructing difficult-to-guess passwords. 43-44 - Douglas Brockway:

Knowledge technologies and business alignment. 45-46 - Carrie Liddy:

Commercial security on the Internet. 47-49
Volume 4, Number 2, 1996
- Charles Cresson Wood:

A computer emergency response team policy. 4 - Kevin J. Fitzgerald:

Corporate policy at Cable & Wireless enhances business efficiency and improves quality of working life. 5-6 - Charles Brookson:

Mobile secure telephones. 7-10 - Goh Moh Heng:

Developing a suitable business continuity planning methodology. 11-13 - Kevin J. Fitzgerald:

Data security report. 14-17 - Bev Stymiest:

Providing security for Unix networks. 18-26 - Alice Sturgeon:

Telework: threats, risks and solutions. 27-38 - Jan Duffy:

Collaborative computing, groupware and knowledge. 39-41 - Brian Kearvell-White:

KPMG's UK Computer Security Review 1994. 42-51 - Randy Howe:

Getting beyond the dark side of distributed computing. 52-53
Volume 4, Number 3, 1996
- Brian Kearvell-White:

National (UK) Computer Security Survey 1996. 3-17 - Charles Cresson Wood:

A policy for sending secret information over communications networks. 18-19 - Gary Gibson:

An introduction to seismology. 20-25 - Colin Maslen:

"Testing the plan is more important than the plan itself". 26-29 - Ross Lowrey:

Relating information and value disciplines. 30-35 - Thornton May:

The Thornton May Files. 36-38 - John McCormick:

Telecommunications deregulation: an Australian perspective. 39-41
Volume 4, Number 4, 1996
- Karen A. Forcht:

Doing business on the Internet: marketing and security aspects. 3-9 - Mohamed H. Abdallah:

An integrated approach for system evaluation: study results. 10-19 - Sharman Lichtenstein:

Factors in the selection of a risk assessment method. 20-25 - The Ernst & Young International Information Security Survey 1995. 26-33

- Charles Cresson Wood:

Information owners, custodians and users. 34-35 - Thornton May:

The Thornton May Files. 36-38
Volume 4, Number 5, 1996
- Thornton May:

Internet and Intranet: the faces of the wired economy. 3-6 - Joseph Heinen:

Internet marketing practices. 7-14 - Brian McWilliams:

The value brokers: how to measure client/server payback. 15-17 - Narender K. Ramarapu:

Executive information systems in financial institutions: an introduction. 18-21 - Charles Cresson Wood:

Removal of all unauthorized access paths in production software. 22-23 - Steve Frosdick:

Practical management of programme risk: the case of the National Strategy for Police Information Systems for England and Wales. 24-33

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














