Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 4, Number 1, 1996

A profile of the information technology executive
pp. 5-9(5)
Authors: Coghlan, Liz; Hurley, Margaret

Favourites:
ADD

A consensus ranking for information system requirements
pp. 10-18(9)
Authors: Shi, Yong; Specht, Pamela; Stolen, Justin

Favourites:
ADD

A business approach to effective information technology risk analysis and management
pp. 19-31(13)
Authors: Halliday, Sharon; Badenhorst, Karin; von Solms, Rossouw

Favourites:
ADD

Information security in business environments
pp. 32-37(6)
Authors: Sanderson, Ethan; Forcht, Karen A

Favourites:
ADD

Extinguishing halons
pp. 38-42(5)
Author: Doddrell, Greg

Favourites:
ADD

Constructing difficult-to-guess passwords
pp. 43-44(2)
Author: Wood, Charles Cresson

Favourites:
ADD

Knowledge technologies and business alignment
pp. 45-46(2)
Author: Brockway, Douglas W

Favourites:
ADD

Commercial security on the Internet
pp. 47-49(3)
Author: Liddy, Carrie

Favourites:
ADD

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more