Stop the war!
Остановите войну!
for scientists:
default search action
Information Management & Computer Security, Volume 5
Volume 5, Number 1, 1997
- Jim Best, Thornton May:
Is your infrastructure ticking? 3-6 - Douglas Brockway:
There's an entranet in your future. 7-10 - Schubert Foo, Ee-Peng Lim:
Managing World Wide Web publications. 11-17 - Charles Cresson Wood:
Part of the foundation for secure systems: separation of duties policy. 18-19 - Rossouw von Solms:
Driving safely on the information superhighway. 20-22 - Karen A. Forcht, Daphyne Saunders Thomas, Mark L. Usry, Kelly Egan:
Control of the Internet. 23-28 - Michael Pattison:
Legal implications of doing business on the Internet. 29-34
Volume 5, Number 2, 1997
- Catherine Harrington:
Compassion in World Farming: an imaging and text retrieval case. 51-52 - Margaret A. Hurley:
Managing the desktop: research findings. 53-57 - Ernest Higgs:
Health informatics blueprint: business needs. 58-62 - Pauline Ratnasingham:
EDI security: a model of EDI risks and associated controls. 63-71 - Kon Karakasidis:
A project planning process for business continuity. 72-78 - Charles Cresson Wood:
A secure password storage policy. 79-80
Volume 5, Number 3, 1997
- Carrie Liddy:
Commercialization of cryptography. 87-89 - Thornton May:
The death of ROI: re-thinking IT value measurement. 90-92 - Zeinab A. Karake:
Managing information resources and environmental turbulence. 93-99 - Charles Cresson Wood:
Securely handling staff terminations. 100-101 - Schubert Foo, Peng-Chor Leong, Yee Nam Sng:
Improving security in computational electronic mail systems. 102-110 - Steve Orlowski:
Government initiatives in information technology security. 111-118
Volume 5, Number 4, 1997
- Richard L. Nolan:
Top-down driven architecture design. 123-125 - Margaret A. Hurley, Folker Schaumann:
KPMG survey: the IT outsourcing decision. 126-132 - Jeff Gooch:
Managing for demonstrably effective IT projects. 133-137 - Lam-for Kwok:
Hypertext information security model for organizations. 138-148 - Everard Tarascio:
Business critical messaging. 149-152
Volume 5, Number 5, 1997
- Pim Roest:
The golden rules for implementing the balanced business scorecard. 163-165 - Susan Oliver:
A model for the future of electronic commerce. 166-169 - Margaret A. Hurley, Rod Harris:
Facilitating corporate knowledge: building the data warehouse. 170-174 - Stephen Wilson:
Certificates and trust in electronic commerce. 175-181 - Sharman Lichtenstein, Paula M. C. Swatman:
Internet acceptable usage policy for organizations. 182-190
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.