Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 8, Number 5, 2000

"Need-to-know" principle and fuzzy security clearances modelling
pp. 210-217(8)
Authors: Janczewski, Lech J; Portougal, Victor

Favourites:
ADD
Favourites:
ADD

Disaster recovery planning: a strategy for data security
pp. 222-230(9)
Authors: Hawkins, Steve M; Yen, David C; Chou, David C

Favourites:
ADD
Favourites:
ADD

Ethics and information technology use: a survey of US based SMEs
pp. 239-243(5)
Authors: Phukan, Sanjeev; Dhillon, Gurpreet

Favourites:
ADD

Issues with information dissemination on global networks
pp. 244-248(5)
Author: Turega, Michael

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more