default search action
Information Management & Computer Security, Volume 2
Volume 2, Number 1, 1994
- Christian N. Madu, Chu-hua Kuei:
Optimum Information Technology for Socioeconomic Development. 4-11 - Simon Rogerson, Christine Fidler:
Strategic Information Systems Planning: Its Adoption and Use. 12-17 - William J. Caelli:
Security in Open and Distributed Systems. 18-24 - David Hains:
Authentication: A Prominent Issue for Data Communications. 25-27 - Fredric B. Gluck:
Protection of Electronic Mail and Electronic Messages: Challenges and Solutions. 28-40 - Kevin J. Fitzgerald:
The Importance of a Network Disaster Recovery Plan. 41-43
Volume 2, Number 2, 1994
- Jon-Arild Johannessen:
Information Technology and Innovation: Identifying Critical Innovation Factors. 4-9 - Rachid M. Zeffane:
Computer Usage and Job Satisfaction: An Empirical Exploration. 10-22 - Karen A. Forcht, Daphyne Saunders Thomas:
Information Compilation and Disbursement: Moral, Legal and Ethical Considerations. 23-28 - James M. Geary:
Executive Liability for Computer Crime and How to Prevent It. 29-31 - G. Southern, Allistair U. Murray:
Quality Information Management: The Way to a Better Company Culture. 32-35
Volume 2, Number 3, 1994
- Keith Fletcher, Mark Donaghy:
The Role of Competitor Information Systems. 4-18 - Kenneth P. Weiss:
To Serve and Protect: Reconciling Information Protection with LAN Environments. 19-25 - Graham P. Bell, David Kavanagh:
Minimizing Risk in Your Wide Area Network Design. 26-28 - Stewart White:
The Data Network Disaster Recovery Plan: Considerations and Concerns. 29-36 - Bruce Edwards:
Developing a Successful Network Disaster Recovery Plan. 37-42 - Kenneth P. Weiss:
New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade. 43-45 - David Hains:
EDI Security Issues Can Be Overcome. 46
Volume 2, Number 4, 1994
- Dieter Fink:
A Security Framework for Information Systems Outsourcing. 3-8 - Kevin J. Fitzgerald:
Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide IT Environment. 9-15 - K. Hugh Macdonald:
Organisational Transformation and Alignment: Misalignment as an Impediment to Progress in Organisational Development. 16-29 - Geoffrey Ebbs, Howard Rheingold:
Censorship on the Information Highway. 30-31 - Philip Berner:
Software Auditing Means Better Business. 32-34 - Karen A. Forcht, Yuan-Wen Aven Tsai:
Security and Network Management: Changes in the Way We Work. 35-41
Volume 2, Number 5, 1994
- Karen A. Forcht, Morey Oare:
The Information Highway: The Interstate Highway System for Computer Networks. 4-8 - James R. Butler, Karen A. Forcht:
The Clipper Chip and the Price of Security in America. 9-12 - Ross J. Anderson:
Whither Cryptography. 13-20 - Zeinab A. Karake:
A Study of Information Technology Structure: Firm Ownership and Managerial Characteristics. 21-30 - Jon-Arild Johannessen, Lars Kolvereid:
Information Search Behaviour during Business Gestation. 31-41
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.