Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 8, Number 3, 2000

The use of business process modelling in information systems security analysis and design
pp. 107-116(10)
Authors: Kokolakis, S.A.; Demopoulos, A.J.; Kiountouzis, E.A.

Favourites:
ADD

Shielding your company against information compromise
pp. 117-130(14)
Authors: Helms, Marilyn M; Ettkin, Lawrence P; Morris, Daniel J

Favourites:
ADD

Awareness and challenges of Internet security
pp. 131-143(13)
Authors: Hawkins, Steve; Yen, David C; Chou, David C

Favourites:
ADD
Favourites:
ADD

Electronic commerce: the information-security challenge
pp. 154-157(4)
Authors: Labuschagne, L; Eloff, J.H.P.

Favourites:
ADD

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more