nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts & Commentaries
|
|
|
1988 |
|
12 |
p. 17-20 |
artikel |
2 |
Abstracts & Commentaries
|
|
|
1984 |
|
12 |
p. 13-20 |
artikel |
3 |
Abstracts & Commentaries
|
|
|
1977 |
|
12 |
p. 16-20 |
artikel |
4 |
Abstracts & Commentaries
|
|
|
1980 |
|
12 |
p. 13-20 |
artikel |
5 |
Abstracts & Commentaries
|
|
|
1983 |
|
12 |
p. 17-20 |
artikel |
6 |
Abstracts & Commentaries
|
|
|
1974 |
|
12 |
p. 14-20 |
artikel |
7 |
Abstracts & Commentaries
|
|
|
1976 |
|
12 |
p. 17-20 |
artikel |
8 |
Abstracts & Commentaries
|
|
|
1979 |
|
12 |
p. 15-20 |
artikel |
9 |
Abstracts & Commentaries
|
|
|
1986 |
|
12 |
p. 15-20 |
artikel |
10 |
Abstracts & Commentaries
|
|
|
1987 |
|
12 |
p. 20 |
artikel |
11 |
Abstracts & Commentaries
|
|
|
1975 |
|
12 |
p. 18-20 |
artikel |
12 |
Abstracts & Commentaries
|
|
|
1982 |
|
12 |
p. 17-20 |
artikel |
13 |
Abstracts & Commentaries
|
|
|
1978 |
|
12 |
p. 9-20 |
artikel |
14 |
Abstracts & Commentaries
|
|
|
1981 |
|
12 |
p. 14-20 |
artikel |
15 |
Abstracts & Commentary
|
|
|
1989 |
|
12 |
p. 19-20 |
artikel |
16 |
Abstracts & Commentary
|
|
|
1991 |
|
12 |
p. 16-17 |
artikel |
17 |
Abstracts & Commentary
|
|
|
1992 |
|
12 |
p. 15-17 |
artikel |
18 |
Abstracts & Commentary
|
|
|
1997 |
|
12 |
p. 17-18 |
artikel |
19 |
Abstracts & Commentary
|
|
|
1994 |
|
12 |
p. 16-17 |
artikel |
20 |
Abstracts & Commentary
|
|
|
1995 |
|
12 |
p. 17-19 |
artikel |
21 |
Abstracts & Commentary
|
|
|
1990 |
|
12 |
p. 15-17 |
artikel |
22 |
Abstracts & Commentary
|
|
|
1993 |
|
12 |
p. 18-19 |
artikel |
23 |
Abstracts & Commentary
|
|
|
1996 |
|
12 |
p. 19-20 |
artikel |
24 |
Accountability in EDI Systems to Prevent Employee Fraud
|
Smith, Alan D. |
|
2005 |
|
12 |
p. 1-13 |
artikel |
25 |
101 Acl [Audit Command Language] Applications: A Toolkit for Today's Auditor, Second Edition
|
Lanza, Richard |
|
1998 |
|
12 |
p. 14 |
artikel |
26 |
A Methodology for Auditing Project Development
|
Fitzgerald, Thomas H. |
|
1976 |
|
12 |
p. 1-15 |
artikel |
27 |
An Introduction to Sap R/3 for is Auditors
|
Ashton, Bob |
|
2000 |
|
12 |
p. 1-11 |
artikel |
28 |
A Review of the 1994 Revision of the US Government Auditing Standards
|
Borthick, A. Faye |
|
1995 |
|
12 |
p. 5-14 |
artikel |
29 |
A Secure Electronic Document Audit Trail Product
|
Menkus, Belden |
|
1995 |
|
12 |
p. 15-16 |
artikel |
30 |
Audit Concerns with Local Area Networks
|
Sobol, Michael I. |
|
1987 |
|
12 |
p. 6-9 |
artikel |
31 |
Auditing Point-of-Sale Systems
|
Thiessen, James H. |
|
1988 |
|
12 |
p. 6-10 |
artikel |
32 |
Auditing the Change Control System
|
Yarberry, William A. |
|
1984 |
|
12 |
p. 1-5 |
artikel |
33 |
Auditing The Effectiveness of The Design of A Web Page
|
Menkus, Belden |
|
2000 |
|
12 |
p. 1-3 |
artikel |
34 |
Auditing the IBM AS/400: The Johnson & Johnson Automated Approach
|
Sarkar, Salil |
|
1991 |
|
12 |
p. 1-6 |
artikel |
35 |
Auditing the MVS Operating System
|
Hardenburg, Kurt L. |
|
1980 |
|
12 |
p. 1-11 |
artikel |
36 |
Audit Uses of the Microcomputer
|
Cotter, John L. |
|
1986 |
|
12 |
p. 1-4 |
artikel |
37 |
Basic Protection for Microcomputers
|
Gascoyne, Rodney J. N. |
|
1986 |
|
12 |
p. 5-6 |
artikel |
38 |
Best Practices in Internet Commerce Security: A Standard of Due Care Requirements List for Merchants
|
Cresson, Charles |
|
2000 |
|
12 |
p. 1 |
artikel |
39 |
Biometrics Technology Comes of Age
|
Robb, Drew |
|
2002 |
|
12 |
p. 12-20 |
artikel |
40 |
Book Review
|
|
|
1986 |
|
12 |
p. 14 |
artikel |
41 |
Book Review
|
|
|
1987 |
|
12 |
p. 14-19 |
artikel |
42 |
Book Review
|
|
|
1976 |
|
12 |
p. 16-17 |
artikel |
43 |
Book Reviews
|
|
|
1989 |
|
12 |
p. 20 |
artikel |
44 |
Book Reviews
|
|
|
1990 |
|
12 |
p. 18-20 |
artikel |
45 |
Book Reviews
|
|
|
1984 |
|
12 |
p. 10-12 |
artikel |
46 |
Book Reviews
|
|
|
1991 |
|
12 |
p. 14-16 |
artikel |
47 |
Briefs
|
|
|
1974 |
|
12 |
p. 12 |
artikel |
48 |
Commentary: The Need to Define Client/Server Cost and Charge Back
|
|
|
1998 |
|
12 |
p. 16 |
artikel |
49 |
Commentary: The Telecommunication Environment was not Designed for the Internet
|
|
|
2001 |
|
12 |
p. 18 |
artikel |
50 |
Companies Still Struggling to Comply with the Sarbanes-Oxley Act of 2002 and Other Legal and Regulatory Requirements
|
|
|
2005 |
|
12 |
p. 19-20 |
artikel |
51 |
Computer Disasters and Their Business Impact
|
Wong, Ken |
|
1987 |
|
12 |
p. 1-6 |
artikel |
52 |
Computer-Related Fraud in the U.K.
|
Wong, Kenneth K. |
|
1984 |
|
12 |
p. 5-9 |
artikel |
53 |
Computer Viruses Can Be Deadly!
|
Highland, Harold Joseph |
|
1988 |
|
12 |
p. 1-6 |
artikel |
54 |
Conference Report
|
|
|
1975 |
|
12 |
p. 10-17 |
artikel |
55 |
Configuring Cisco Denial-of-Service Security Features, Part 1
|
Davis, Peter T. |
|
2002 |
|
12 |
p. 1-11 |
artikel |
56 |
Consolidating User Credentials into a Single Identity and Protecting this with Multi-Factor Authentication can Avert Online Fraud
|
|
|
2005 |
|
12 |
p. 18-19 |
artikel |
57 |
Continuity of Business in the Face of Y2K Date Problem
|
Kordahl, Eugene |
|
1999 |
|
12 |
p. 1-10 |
artikel |
58 |
Controlling Separation of Duties to Prevent Document Fraud
|
Russell, Selwyn |
|
1994 |
|
12 |
p. 6-15 |
artikel |
59 |
Corporate Governance, Recruitment, and ISO/IEC 17799
|
Ashton, Bob |
|
2003 |
|
12 |
p. 18-20 |
artikel |
60 |
Correction
|
|
|
1977 |
|
12 |
p. 14 |
artikel |
61 |
D.C. Government Unclear on Total Due for Telecommunication Services
|
Julian, Alfred |
|
1999 |
|
12 |
p. 10-14 |
artikel |
62 |
Deciphering (Electricity) Deregulation
|
Tatum, Rita |
|
2000 |
|
12 |
p. 1 |
artikel |
63 |
Developing End-User Computing Guidelines
|
Bigler, Mark |
|
1995 |
|
12 |
p. 1-5 |
artikel |
64 |
Disaster Recovery Using Real-Time Disk Data Copy
|
Mikkelsen, Claus |
|
1999 |
|
12 |
p. 14 |
artikel |
65 |
Disaster Recovery Yellow Pages
|
Lewis, Steven |
|
1999 |
|
12 |
p. 17 |
artikel |
66 |
Distributed Data Processing: Internal Control Issues and Safeguards
|
Kneer, Dan C. |
|
1983 |
|
12 |
p. 1-14 |
artikel |
67 |
Editorial
|
Weiss, Harold |
|
1974 |
|
12 |
p. 13 |
artikel |
68 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 14, Number 12
|
|
|
1987 |
|
12 |
p. 1 |
artikel |
69 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 19, Number 12
|
|
|
1992 |
|
12 |
p. 1 |
artikel |
70 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 24, Number 12
|
|
|
1997 |
|
12 |
p. 1 |
artikel |
71 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 10, Number 12
|
|
|
1983 |
|
12 |
p. 1 |
artikel |
72 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 13, Number 12
|
|
|
1986 |
|
12 |
p. 1 |
artikel |
73 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 12, Number 12
|
|
|
1985 |
|
12 |
p. 1 |
artikel |
74 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 20, Number 12
|
|
|
1993 |
|
12 |
p. 1 |
artikel |
75 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 22, Number 12
|
|
|
1995 |
|
12 |
p. 1 |
artikel |
76 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 2, Number 12
|
|
|
1975 |
|
12 |
p. 1 |
artikel |
77 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 4, Number 12
|
|
|
1977 |
|
12 |
p. 1 |
artikel |
78 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 6, Number 12
|
|
|
1979 |
|
12 |
p. 1 |
artikel |
79 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 8, Number 12
|
|
|
1981 |
|
12 |
p. 1 |
artikel |
80 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 15, Number 12
|
|
|
1988 |
|
12 |
p. 1 |
artikel |
81 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 23, Number 12
|
|
|
1996 |
|
12 |
p. 1 |
artikel |
82 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 16, Number 12
|
|
|
1989 |
|
12 |
p. 1 |
artikel |
83 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 17, Number 12
|
|
|
1990 |
|
12 |
p. 1 |
artikel |
84 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 18, Number 12
|
|
|
1991 |
|
12 |
p. 1 |
artikel |
85 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 3, Number 12
|
|
|
1976 |
|
12 |
p. 1 |
artikel |
86 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 7, Number 12
|
|
|
1980 |
|
12 |
p. 1 |
artikel |
87 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 9, Number 12
|
|
|
1982 |
|
12 |
p. 1 |
artikel |
88 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 11, Number 12
|
|
|
1984 |
|
12 |
p. 1 |
artikel |
89 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 1, Number 12
|
|
|
1974 |
|
12 |
p. 1 |
artikel |
90 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 21, Number 12
|
|
|
1994 |
|
12 |
p. 1 |
artikel |
91 |
Editorial board page for “EDPACS: The EDP Audit, Control, and Security Newsletter”, Volume 5, Number 12
|
|
|
1978 |
|
12 |
p. 1 |
artikel |
92 |
Effective Operational Security Metrics
|
Ravenel, J. Patrick |
|
2006 |
|
12 |
p. 10-19 |
artikel |
93 |
EFT Errors — Untraceable and Unfixable
|
|
|
1981 |
|
12 |
p. 8-9 |
artikel |
94 |
Entering a New Era in is Audit and Control
|
Donahue, Michael |
|
1994 |
|
12 |
p. 1-5 |
artikel |
95 |
Equity Funding Auditors Convicted
|
|
|
1975 |
|
12 |
p. 17 |
artikel |
96 |
Establishing an EDP Audit Function
|
Hubbert, James F. |
|
1982 |
|
12 |
p. 9-14 |
artikel |
97 |
Extending the Edge of the Enterprises: Technologies and Trends in Corporate Remote Acces
|
Kuepper, Mark |
|
1999 |
|
12 |
p. 14-15 |
artikel |
98 |
Fighting Spyware and Adware in the Enterprise
|
Gordon, Sarah |
|
2005 |
|
12 |
p. 14-18 |
artikel |
99 |
From Logs to Logic: Best Practices for Security Information Management
|
Hellman, Gretchen |
|
2006 |
|
12 |
p. 1-10 |
artikel |
100 |
Future Development in EDP Auditing
|
Weiss, Harold |
|
1977 |
|
12 |
p. 1-14 |
artikel |
101 |
Growing a Knowledge Management System
|
Mullich, Joe |
|
2001 |
|
12 |
p. 17 |
artikel |
102 |
IBM Program Products for Systems Audits & Tests
|
Adams, Donald L. |
|
1975 |
|
12 |
p. 1-9 |
artikel |
103 |
Information Security Management
|
Tipton, Harold |
|
2000 |
|
12 |
p. 1 |
artikel |
104 |
Information Systems Quality Assurance Enhances Information Systems Security
|
Menkus, Belden |
|
1990 |
|
12 |
p. 6-10 |
artikel |
105 |
Integration Issues: Back-Office Discipline Moves To The Front Lines
|
Sharp, Kevin |
|
2001 |
|
12 |
p. 17-18 |
artikel |
106 |
In the News
|
|
|
1979 |
|
12 |
p. 9-13 |
artikel |
107 |
Issues in Electronic Records Management
|
Menkus, Belden |
|
2001 |
|
12 |
p. 1-11 |
artikel |
108 |
Load Library Auditing in OS/VS1 and OS/VS2 Environments
|
Dennis, G. Claude |
|
1981 |
|
12 |
p. 1-7 |
artikel |
109 |
Long Term Data Preservation
|
Moore, Fred |
|
2000 |
|
12 |
p. 1 |
artikel |
110 |
Of Interest
|
|
|
1989 |
|
12 |
p. 18 |
artikel |
111 |
Of Interest
|
|
|
1990 |
|
12 |
p. 10-15 |
artikel |
112 |
Of Interest
|
|
|
1991 |
|
12 |
p. 18-20 |
artikel |
113 |
Of Interest
|
|
|
1992 |
|
12 |
p. 17-20 |
artikel |
114 |
Of Interest
|
|
|
1997 |
|
12 |
p. 19-20 |
artikel |
115 |
Of Interest
|
|
|
1986 |
|
12 |
p. 9-13 |
artikel |
116 |
Of Interest
|
|
|
1994 |
|
12 |
p. 17-20 |
artikel |
117 |
Of Interest
|
|
|
1999 |
|
12 |
p. 17-20 |
artikel |
118 |
Of Interest
|
|
|
1980 |
|
12 |
p. 11-12 |
artikel |
119 |
Of Interest
|
|
|
1981 |
|
12 |
p. 11-12 |
artikel |
120 |
Of Interest
|
|
|
1983 |
|
12 |
p. 15 |
artikel |
121 |
Of Interest
|
|
|
1993 |
|
12 |
p. 19-20 |
artikel |
122 |
Of Interest
|
|
|
1995 |
|
12 |
p. 19-20 |
artikel |
123 |
Of Interest
|
|
|
1987 |
|
12 |
p. 10-14 |
artikel |
124 |
Of Interest
|
|
|
1988 |
|
12 |
p. 15-17 |
artikel |
125 |
Of Interest
|
|
|
1998 |
|
12 |
p. 17-20 |
artikel |
126 |
Of Interest
|
|
|
2006 |
|
12 |
p. 22-24 |
artikel |
127 |
Of Interest
|
|
|
1996 |
|
12 |
p. 20 |
artikel |
128 |
Of Interest
|
|
|
2000 |
|
12 |
p. 1 |
artikel |
129 |
Of Interest
|
|
|
2001 |
|
12 |
p. 18-20 |
artikel |
130 |
Of Interest
|
|
|
1978 |
|
12 |
p. 6-8 |
artikel |
131 |
Of Interest
|
|
|
1982 |
|
12 |
p. 16-17 |
artikel |
132 |
One Letter Too Many from Mastercard
|
Minardi, Ray |
|
1999 |
|
12 |
p. 16-17 |
artikel |
133 |
Performance Measurement in EDP
|
|
|
1974 |
|
12 |
p. 1-12 |
artikel |
134 |
Practical Guide for Implementing Secure Intranets and Extranets
|
Phaltankar, Kaustubh |
|
2000 |
|
12 |
p. 1-2 |
artikel |
135 |
Preventing Failure: The Value of Performing A Single Point of Failure Analysis for Critical Applications and Systems
|
Wolf, Laurence J. |
|
2004 |
|
12 |
p. 14-18 |
artikel |
136 |
Product News
|
|
|
1981 |
|
12 |
p. 9-10 |
artikel |
137 |
QA: What it is, What it Does
|
Meredith, Denis C. |
|
1988 |
|
12 |
p. 10-15 |
artikel |
138 |
RACF-A Program to Enhance Security and Control
|
Brown, Donna |
|
1979 |
|
12 |
p. 1-9 |
artikel |
139 |
Racf Meets Unix in Open Edition MVS
|
Hahn, Mark |
|
1997 |
|
12 |
p. 1-16 |
artikel |
140 |
Reader Feedback
|
|
|
1987 |
|
12 |
p. 14 |
artikel |
141 |
Reader Feedback
|
|
|
1983 |
|
12 |
p. 16-17 |
artikel |
142 |
Reader Feedback
|
|
|
1979 |
|
12 |
p. 14 |
artikel |
143 |
Reader Feedback
|
|
|
1976 |
|
12 |
p. 16 |
artikel |
144 |
Reader Feedback
|
|
|
1982 |
|
12 |
p. 15 |
artikel |
145 |
Reader Feedback
|
|
|
1986 |
|
12 |
p. 13 |
artikel |
146 |
Reader Feedback
|
|
|
1977 |
|
12 |
p. 15 |
artikel |
147 |
Reader Feedback
|
Woodworth, Anthony J. |
|
1978 |
|
12 |
p. 9 |
artikel |
148 |
Reader Feedback
|
|
|
1981 |
|
12 |
p. 13 |
artikel |
149 |
Review
|
|
|
1993 |
|
12 |
p. 17 |
artikel |
150 |
Saving Users from Themselves
|
Fulton, Jim |
|
2006 |
|
12 |
p. 20-21 |
artikel |
151 |
Securing Private Data on Insecure Public Networks
|
Brodsky, Ira |
|
1990 |
|
12 |
p. 1-6 |
artikel |
152 |
Security Controls for a Client/Server Environment
|
Bayuk, Jennifer |
|
1996 |
|
12 |
p. 1-9 |
artikel |
153 |
Security/Privacy Compliance: Culture Change
|
Guenther, Melissa |
|
2004 |
|
12 |
p. 19-24 |
artikel |
154 |
Set Phasers On Stun, Mr. Spock: Taking Aim at the Control Implications of Wireless Networks
|
Howells, Mark |
|
1993 |
|
12 |
p. 1-13 |
artikel |
155 |
Support Tool Reviews
|
|
|
1992 |
|
12 |
p. 13-15 |
artikel |
156 |
Support Tool Reviews
|
|
|
1994 |
|
12 |
p. 15-16 |
artikel |
157 |
Support Tool Reviews
|
|
|
1995 |
|
12 |
p. 17 |
artikel |
158 |
Support Tool Reviews
|
|
|
1996 |
|
12 |
p. 18-19 |
artikel |
159 |
Support Tool Reviews
|
|
|
1997 |
|
12 |
p. 16-17 |
artikel |
160 |
Systems Development Priorities
|
Nogle, Warren G. |
|
1978 |
|
12 |
p. 1-6 |
artikel |
161 |
Taking an Adaptive Approach to is Security
|
Klaus, Christopher |
|
1998 |
|
12 |
p. 1-14 |
artikel |
162 |
The Auditor's Role in Applications Software Development-Revisited
|
Vallabhaneni, S. Rao |
|
1991 |
|
12 |
p. 7-14 |
artikel |
163 |
The Auditor's Role in Securing E-Business Systems
|
Cerullo, Michael J. |
|
2004 |
|
12 |
p. 1-13 |
artikel |
164 |
The Auditor's Use of SMF
|
Cassidy, Michael |
|
1989 |
|
12 |
p. 1-18 |
artikel |
165 |
The Dummy Entity, a Valuable Audit Tool
|
Gliezner, Shmuel |
|
1985 |
|
12 |
p. 1-20 |
artikel |
166 |
The Effect of SAS No. 48 on Financial and EDP Auditors
|
Reilly, Robert F. |
|
1986 |
|
12 |
p. 6-9 |
artikel |
167 |
The Information Systems Security Policy Statement
|
Henderson, Stuart |
|
1996 |
|
12 |
p. 9-18 |
artikel |
168 |
The Legacy Continues
|
Nevins, Scott |
|
1998 |
|
12 |
p. 15-16 |
artikel |
169 |
Tornado, Wind, and Water Protection: Preparing for the Expected
|
Waller, James |
|
2001 |
|
12 |
p. 12-16 |
artikel |
170 |
Understanding Local Area Network Security
|
Seyfert, Judith |
|
1992 |
|
12 |
p. 1-13 |
artikel |
171 |
Understand Password Strength
|
Poore, Ralph Spencer |
|
1993 |
|
12 |
p. 13-17 |
artikel |
172 |
Using BTS to Test Advanced Systems
|
Campbell, Kingsley |
|
1982 |
|
12 |
p. 1-8 |
artikel |
173 |
Using Statistical Sampling
|
Conley, Harry |
|
1999 |
|
12 |
p. 17 |
artikel |
174 |
Using the Trotter Matrix to Measure and Improve Project Manager Performance
|
Carroll, Charlie |
|
2003 |
|
12 |
p. 1-17 |
artikel |
175 |
Virtual Private Networks for the Enterprise
|
Becker, Mark |
|
2000 |
|
12 |
p. 1-2 |
artikel |
176 |
Web Psychos, Stalkers and Pranksters: How to Protect Yourself in Cyberspace
|
Banks, Michael |
|
1998 |
|
12 |
p. 14 |
artikel |
177 |
While A Burden for Corporate it, Regulatory Compliance Creates Significant Opportunities for it Vendors
|
|
|
2005 |
|
12 |
p. 20 |
artikel |
178 |
Year 2000 Crapshoot?
|
Silver, Kenneth |
|
1998 |
|
12 |
p. 15 |
artikel |
179 |
Your Voiceprint Will be Your Key
|
Mammone, Richard |
|
1998 |
|
12 |
p. 16 |
artikel |