Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 4, Number 1, 1996

A profile of the information technology executive
pp. 5-9(5)
Authors: Coghlan, Liz; Hurley, Margaret

Favourites:
ADD

A consensus ranking for information system requirements
pp. 10-18(9)
Authors: Shi, Yong; Specht, Pamela; Stolen, Justin

Favourites:
ADD

A business approach to effective information technology risk analysis and management
pp. 19-31(13)
Authors: Halliday, Sharon; Badenhorst, Karin; von Solms, Rossouw

Favourites:
ADD

Information security in business environments
pp. 32-37(6)
Authors: Sanderson, Ethan; Forcht, Karen A

Favourites:
ADD

Extinguishing halons
pp. 38-42(5)
Author: Doddrell, Greg

Favourites:
ADD

Constructing difficult-to-guess passwords
pp. 43-44(2)
Author: Wood, Charles Cresson

Favourites:
ADD

Knowledge technologies and business alignment
pp. 45-46(2)
Author: Brockway, Douglas W

Favourites:
ADD

Commercial security on the Internet
pp. 47-49(3)
Author: Liddy, Carrie

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content