메뉴 건너뛰기




Volumn 15, Issue 5, 1996, Pages 377-386

Electronic communications risk management: A checklist for business managers

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION SYSTEMS; INFORMATION MANAGEMENT; RISK ASSESSMENT; SECURITY OF DATA;

EID: 0030386217     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/0167-4048(96)82560-0     Document Type: Article
Times cited : (8)

References (19)
  • 7
    • 85029980095 scopus 로고    scopus 로고
    • Internet scanner finds security holes
    • 23 April
    • O.R. Tabibian, "Internet Scanner Finds Security Holes", PC Magazine, 23 April 1996.
    • (1996) PC Magazine
    • Tabibian, O.R.1
  • 8
    • 0041139595 scopus 로고    scopus 로고
    • Electronic mail encryption standards rivalry
    • June
    • "Electronic mail encryption standards rivalry", Network Security, p. 3, June 96.
    • (1996) Network Security , pp. 3
  • 9
    • 85029999552 scopus 로고    scopus 로고
    • Strauss v. Microsoft, 856 F. Supp. 821 (N.Y., USA, 1994)
    • Strauss v. Microsoft, 856 F. Supp. 821 (N.Y., USA, 1994).
  • 11
    • 85029977066 scopus 로고    scopus 로고
    • O'Connor v. Ortega, 480 U.S. 709, 107 S. Ct. 1492 (1986)
    • O'Connor v. Ortega, 480 U.S. 709, 107 S. Ct. 1492 (1986).
  • 12
    • 85029976672 scopus 로고    scopus 로고
    • City surrenders to £400m gangs
    • London, 2 June 96
    • "City surrenders to £400m gangs£, The Sunday Times (London), 2 June 96 ,p. 1.
    • The Sunday Times , pp. 1
  • 14
    • 85029999052 scopus 로고    scopus 로고
    • Commercial transactions on the global information infrastructure: A european perspective
    • Winter 96
    • C. Millard & R. Carolina, "Commercial Transactions On The Global Information Infrastructure: A European Perspective", The John Marshall Journal of Computer & Information Law, Vol. XIV Number 2, Winter 96.
    • The John Marshall Journal of Computer & Information Law , vol.14 , Issue.2
    • Millard, C.1    Carolina, R.2
  • 15
    • 58149364252 scopus 로고    scopus 로고
    • Internet holes-part 8: Spam
    • 4/96
    • F. Cohen, "Internet Holes-Part 8: Spam", Network Security, 4/96, p8-10.
    • Network Security , pp. 8-10
    • Cohen, F.1
  • 19
    • 85029976071 scopus 로고    scopus 로고
    • Risk analysis: Government agencies evaluate risk tools
    • CSI, 2/96
    • "Risk Analysis: Government Agencies Evaluate Risk Tools", Computer Security Alert (CSI), 2/96, p.5.
    • Computer Security Alert , pp. 5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.