Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 8, Number 3, 2000

The use of business process modelling in information systems security analysis and design
pp. 107-116(10)
Authors: Kokolakis, S.A.; Demopoulos, A.J.; Kiountouzis, E.A.

Favourites:
ADD

Shielding your company against information compromise
pp. 117-130(14)
Authors: Helms, Marilyn M; Ettkin, Lawrence P; Morris, Daniel J

Favourites:
ADD

Awareness and challenges of Internet security
pp. 131-143(13)
Authors: Hawkins, Steve; Yen, David C; Chou, David C

Favourites:
ADD
Favourites:
ADD

Electronic commerce: the information-security challenge
pp. 154-157(4)
Authors: Labuschagne, L; Eloff, J.H.P.

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content