no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Accountability in EDI Systems to Prevent Employee Fraud
|
Smith, Alan D. |
|
2005 |
22 |
2 |
p. 30-38 |
article |
2 |
A Model of Information Assurance Benefits
|
Ezingeard, Jean-Noël |
|
2005 |
22 |
2 |
p. 20-29 |
article |
3 |
Fighting Malware and Other Unspeakable Threats
|
Gray, Paul |
|
2005 |
22 |
2 |
p. 91-95 |
article |
4 |
From the Editors
|
Sipior, Jahice C. |
|
2005 |
22 |
2 |
p. 5-6 |
article |
5 |
Identification of Legal Issues for Computer Forensics
|
Brungs, Angela |
|
2005 |
22 |
2 |
p. 57-66 |
article |
6 |
Information Security Threats and Practices in Small Businesses
|
Keller, Shannon |
|
2005 |
22 |
2 |
p. 7-19 |
article |
7 |
It-Supported Competence Management: A Case Study at Ericsson
|
Hustad, Eli |
|
2005 |
22 |
2 |
p. 78-88 |
article |
8 |
Outsourcing Becomes More Complex
|
King, William R. |
|
2005 |
22 |
2 |
p. 89-90 |
article |
9 |
Post-Implementation Usability of Erp Training Manuals: The User's Perspective
|
Scott, Judy E. |
|
2005 |
22 |
2 |
p. 67-77 |
article |
10 |
The Ethical and Legal Concerns of Spyware
|
Sipior, Janice C. |
|
2005 |
22 |
2 |
p. 39-49 |
article |
11 |
The Importance of the Law for E-Commerce Strategies
|
Mykytyn, Kathleen |
|
2005 |
22 |
2 |
p. 50-56 |
article |