default search action
Information Management & Computer Security, Volume 4
Volume 4, Number 1, 1996
- Liz Coghlan, Margaret A. Hurley:
A profile of the information technology executive. 5-9 - Yong Shi, Pamela Specht, Justin Stolen:
A consensus ranking for information system requirements. 10-18 - Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms:
A business approach to effective information technology risk analysis and management. 19-31 - Ethan Sanderson, Karen A. Forcht:
Information security in business environments. 32-37 - Gregory R. Doddrell:
Extinguishing halons. 38-42 - Charles Cresson Wood:
Constructing difficult-to-guess passwords. 43-44 - Douglas Brockway:
Knowledge technologies and business alignment. 45-46 - Carrie Liddy:
Commercial security on the Internet. 47-49
Volume 4, Number 2, 1996
- Charles Cresson Wood:
A computer emergency response team policy. 4 - Kevin J. Fitzgerald:
Corporate policy at Cable & Wireless enhances business efficiency and improves quality of working life. 5-6 - Charles Brookson:
Mobile secure telephones. 7-10 - Goh Moh Heng:
Developing a suitable business continuity planning methodology. 11-13 - Kevin J. Fitzgerald:
Data security report. 14-17 - Bev Stymiest:
Providing security for Unix networks. 18-26 - Alice Sturgeon:
Telework: threats, risks and solutions. 27-38 - Jan Duffy:
Collaborative computing, groupware and knowledge. 39-41 - Brian Kearvell-White:
KPMG's UK Computer Security Review 1994. 42-51 - Randy Howe:
Getting beyond the dark side of distributed computing. 52-53
Volume 4, Number 3, 1996
- Brian Kearvell-White:
National (UK) Computer Security Survey 1996. 3-17 - Charles Cresson Wood:
A policy for sending secret information over communications networks. 18-19 - Gary Gibson:
An introduction to seismology. 20-25 - Colin Maslen:
"Testing the plan is more important than the plan itself". 26-29 - Ross Lowrey:
Relating information and value disciplines. 30-35 - Thornton May:
The Thornton May Files. 36-38 - John McCormick:
Telecommunications deregulation: an Australian perspective. 39-41
Volume 4, Number 4, 1996
- Karen A. Forcht:
Doing business on the Internet: marketing and security aspects. 3-9 - Mohamed H. Abdallah:
An integrated approach for system evaluation: study results. 10-19 - Sharman Lichtenstein:
Factors in the selection of a risk assessment method. 20-25 - The Ernst & Young International Information Security Survey 1995. 26-33
- Charles Cresson Wood:
Information owners, custodians and users. 34-35 - Thornton May:
The Thornton May Files. 36-38
Volume 4, Number 5, 1996
- Thornton May:
Internet and Intranet: the faces of the wired economy. 3-6 - Joseph Heinen:
Internet marketing practices. 7-14 - Brian McWilliams:
The value brokers: how to measure client/server payback. 15-17 - Narender K. Ramarapu:
Executive information systems in financial institutions: an introduction. 18-21 - Charles Cresson Wood:
Removal of all unauthorized access paths in production software. 22-23 - Steve Frosdick:
Practical management of programme risk: the case of the National Strategy for Police Information Systems for England and Wales. 24-33
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.