![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Information Management & Computer Security, Volume 1
Volume 1, Number 1, 1993
- Helen van de Haar, Rossouw von Solms:
A Tool for Information Security Management. 4-10 - Ugur Yavas, Mahmoud M. Yasin:
Computing Environment in an Arabian Gulf Country: An Organizational Perspective. 11-18 - Dieter Fink, Daniel C. Duffy:
Security Officers' Attitudes to the Use of Shared Logons. 19-21 - Mohammed H. A. Tafti, Ehsan Nikbakht:
Neural Networks and Expert Systems: New Horizons in Business Finance Applications. 22-28 - William J. Martin, Michael Armstrong:
STAR and Economic Regeneration: Some Feedback from Northern Ireland. 29-38
Volume 1, Number 2, 1993
- Chris Edwards, Joe Peppard:
A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate the Fog. - Philip Berner:
Software Auditing: Effectively Combating the Five Deadly Sins. - Christine Fidler, Simon Rogerson
, Nicola Spiers:
Current IS Practices within UK-based Organizations. - Vic Kamay, Tony Adams:
The 1992 Profile of Computer Abuse in Australia: Part 2. - Kenneth Graham Bartlett Bakewell:
Information: The Seventh Management Function? - Kevin J. Fitzgerald:
Business Continuity Planning in a Distributed Downsized Environment. - Ross Hamilton:
Does IT Matter When Companies Merge?
Volume 1, Number 3, 1993
- Fredric B. Gluck:
The Open Security Architecture. 4-11 - Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli:
A Model for Information Security Management. 12-17 - Andrew Bird, Tom Blaney, John Burton:
DataComms 2000: A Strategic Exploration of a Transforming Industry. 18-31
Volume 1, Number 4, 1993
- Kenneth P. Weiss:
Data Integrity and Security: Who's in Charge Here Anyway? - H. James, Roger A. Coldwell:
Corporate Security: An Australian Ostrich. - Pat Williams Moore:
BMS CAT in Action: Electronic/Communications Recovery at the World Trade Centre, New York. - David Hains:
Computer Security as a Liability Control Tool. - Tom Newman:
Information Loss Rarely Recovered. - Mark Gabbott, Ewan Sutherland:
Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment. - Jon-Arild Johannessen, Johan Olaisen:
Information, Communication and Innovation: Identifying Critical Innovation Factors (CIF).
Volume 1, Number 5, 1993
- Justice Michael Kirby:
The Human Genome Project: Promise or Problems? - Justice Michael Kirby:
Legal Aspects of the Human Genome Project: Reflections on the Bilbao Conference. - Kevin J. Fitzgerald:
Risk Analysis: Ten Years On. - Karen A. Forcht, Robert G. Brookshire
, Scott Paul Stevens, Rodney J. Clarke
:
Computer Ethics of University Students: An International Exploratory Study. - Charles Cresson Wood:
Dreams Come True with Password Genie.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.