Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 3, Number 2, 1995

Information security baselines
pp. 8-12(5)
Author: Fitzgerald, Kevin J

Favourites:
ADD

Legal control of computer crime in Hong Kong
pp. 13-19(7)
Author: Lee, Matthew K O

Favourites:
ADD

Promoting security awareness and commitment
pp. 20-26(7)
Author: Spurling, Phil

Favourites:
ADD

Security issues in the EDI environment
pp. 27-33(7)
Authors: Banerjee, Snehamay; Golhar, Damodar Y.

Favourites:
ADD

Security issues in the EDI environment
pp. 27-33(7)
Authors: Banerjee, Snehamay; Golhar, Damodar Y

Favourites:
ADD

The utility of information systems views of CEOs and information system executives
pp. 34-38(5)
Authors: Yasin, Mahmoud M; Quigley, John V

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content