-
4
-
-
0003798979
-
Leveraging electronic commerce for competitive advantage: a business value framework
-
Bled
-
Bloch, M., Pigneur, Y. and Segev, A. (1996), “Leveraging electronic commerce for competitive advantage: a business value framework”, Proceedings of Ninth International Conference on EDI-IOS, Bled.
-
(1996)
Proceedings of Ninth International Conference on EDI-IOS
-
-
Bloch, M.1
Pigneur, Y.2
Segev, A.3
-
5
-
-
84986105413
-
-
“Security policy for use of the national research and education network”, inederal Networking Council, FEDERAL INTERNET SECURITY - A Framework for Action, Draft, Appendix 4
-
Branstad, D., Oldehoff, A., Aiken, R. et al. (1995), “Security policy for use of the national research and education network”, inederal Networking Council, FEDERAL INTERNET SECURITY - A Framework for Action, Draft, Appendix 4.
-
(1995)
-
-
Branstad, D.1
Oldehoff, A.2
Aiken, R.3
-
6
-
-
0041177651
-
Business value, quality and partnerships: Australasian information systems management issues
-
Broadbent, M., Butler, C., Hansell, A. and Dampney, C.N.G. (1995), “Business value, quality and partnerships: Australasian information systems management issues”, Australian Computer Journal, Vol. 27 No. 1.
-
(1995)
Australian Computer Journal
, vol.27
, Issue.1
-
-
Broadbent, M.1
Butler, C.2
Hansell, A.3
Dampney, C.N.G.4
-
8
-
-
0041120420
-
-
MIT Press, Cambridge, MA
-
Cavazos, E.A. and Morin, G. (1994), Cyberspace and the Law: Your Rights and Duties in the On-Line World, MIT Press, Cambridge, MA.
-
(1994)
Cyberspace and the Law: Your Rights and Duties in the On-Line World
-
-
Cavazos, E.A.1
Morin, G.2
-
9
-
-
0003437009
-
-
Addison-Wesley, Reading, MA
-
Cheswick, W. and Bellovin, S. (1994), Firewalls and Internet Security, Addison-Wesley, Reading, MA.
-
(1994)
Firewalls and Internet Security
-
-
Cheswick, W.1
Bellovin, S.2
-
13
-
-
0028449801
-
The Internet and competitive intelligence: a survey of current practice
-
Cronin, B., Overfelt, K., Fouchereauz, K., Manzvanzvike, T., Cha, M. and Sona, E. (1994), “The Internet and competitive intelligence: a survey of current practice”, International Journal of Information Management, Vol. 14.
-
(1994)
International Journal of Information Management
, vol.14
-
-
Cronin, B.1
Overfelt, K.2
Fouchereauz, K.3
Manzvanzvike, T.4
Cha, M.5
Sona, E.6
-
15
-
-
10444290409
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
No. L. 281, 23 November
-
EC (1995), “Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data”, Official Journal of the European Communities, No. L. 281, 23 November.
-
(1995)
Official Journal of the European Communities
-
-
-
16
-
-
84993043242
-
The Ernst & Young International Information Security Survey 1995
-
Ernst & Young (1996), “The Ernst & Young International Information Security Survey 1995”, Information Management & Computer Security, Vol. 4 No. 4.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.4
-
-
-
17
-
-
84986085436
-
-
Federal Networking Council, Security Working Group
-
FNC (Federal Networking Council) (1995a, Federal Internet Security Plan (FISP), Federal Networking Council, Security Working Group.
-
(1995)
Federal Internet Security Plan (FISP)
-
-
-
19
-
-
0008464478
-
Comprehensive information technology security: a new approach to respond ethical and social issues surrounding information security in the 21st Century
-
Eloff, J.H.P. and Von Solms, H.S. (Eds), Chapman & Hall, London
-
Hartmann, A. (1995), “Comprehensive information technology security: a new approach to respond ethical and social issues surrounding information security in the 21st Century”, in Eloff, J.H.P. and Von Solms, H.S. (Eds), Information Security - the Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, Chapman & Hall, London.
-
(1995)
Information Security - the Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
-
-
Hartmann, A.1
-
20
-
-
84986047240
-
Internet security policies and Internet appropriate use policies
-
Perth
-
Heard, F.T. (1996), “Internet security policies and Internet appropriate use policies”, Proceedings of EDPAC 96 Conference, Perth.
-
(1996)
Proceedings of EDPAC 96 Conference
-
-
Heard, F.T.1
-
22
-
-
84986085406
-
From social requirements to technical solutions – bridging the gap with user-oriented data security
-
Eloff, J.H.P. and Von Solms, H.S. (Eds), IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, Chapman & Hall, London
-
Kohl, U. (1995), “From social requirements to technical solutions – bridging the gap with user-oriented data security”, in Eloff, J.H.P. and Von Solms, H.S. (Eds), Information Security - The Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, Chapman & Hall, London.
-
(1995)
Information Security - The Next Decade
-
-
Kohl, U.1
-
24
-
-
0040973657
-
Internet acceptable usage policy
-
Elsevier Advanced Technology, Barking, December
-
Lichtenstein, S. (1996a, “Internet acceptable usage policy”, Computer Audit Update, Elsevier Advanced Technology, Barking, December.
-
(1996)
Computer Audit Update
-
-
Lichtenstein, S.1
-
25
-
-
84986085419
-
Internet security policy: a holistic and organisational approach
-
Bossomaier, T. and Chubb, L. (Eds), AUUG'96 and Asia Pacific World Wide Web, World Congress Centre, Melbourne
-
Lichtenstein, S. (1996b, “Internet security policy: a holistic and organisational approach”, in Bossomaier, T. and Chubb, L. (Eds), Proceedings of 2nd Joint Conference AUUG 96/APWWW, AUUG'96 and Asia Pacific World Wide Web, World Congress Centre, Melbourne.
-
(1996)
Proceedings of 2nd Joint Conference AUUG 96/APWWW
-
-
Lichtenstein, S.1
-
26
-
-
84986064967
-
-
working paper 10/96, Department of Information Systems, Monash University, Melbourne
-
Lichtenstein, S. (1996c, Internet Acceptable Usage Policy: Human Issues, working paper 10/96, Department of Information Systems, Monash University, Melbourne.
-
(1996)
Internet Acceptable Usage Policy: Human Issues
-
-
Lichtenstein, S.1
-
27
-
-
0031361308
-
Developing Internet security policy for organisations
-
Nunamaker, J.F. and Sprague, R.H. (Eds), Hawaii, IEEE Computer Society Press, Los Alamitos, CA
-
Lichtenstein, S. (1997), “Developing Internet security policy for organisations”, in Nunamaker, J.F. and Sprague, R.H. (Eds), Proceedings of the Thirtieth Annual Hawaii International Conference on Systems Sciences, Hawaii, IEEE Computer Society Press, Los Alamitos, CA.
-
(1997)
Proceedings of the Thirtieth Annual Hawaii International Conference on Systems Sciences
-
-
Lichtenstein, S.1
-
28
-
-
0039194764
-
Internet acceptable usage policy: arguments and perils
-
Swatman, P.M.C Swatman, P. and Cooper, J. (Eds), Brisbane
-
Lichtenstein, S. and Swatman, P.M.C. (1997), “Internet acceptable usage policy: arguments and perils”, in Swatman, P.M.C., Swatman, P. and Cooper, J. (Eds), Proceedings of PAWEC '97, Brisbane.
-
(1997)
Proceedings of PAWEC '97
-
-
Lichtenstein, S.1
Swatman, P.M.C.2
-
29
-
-
84986082064
-
Alignment: how to do business on the Internet
-
Logan, M. and Logan, R. (1996), “Alignment: how to do business on the Internet”, Proceedings INET 96.
-
(1996)
Proceedings INET 96
-
-
Logan, M.1
Logan, R.2
-
33
-
-
84986145736
-
Ethical information security in a cross-cultural environment
-
Eloff, J.H.P. and Von Solms, H.S. (Eds), Chapman & Hall, London
-
Nance, K.L. and Strohmaier, M. (1995), “Ethical information security in a cross-cultural environment”, in Eloff, J.H.P. and Von Solms, H.S. (Eds), Information Security - The Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, Chapman & Hall, London.
-
(1995)
Information Security - The Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
-
-
Nance, K.L.1
Strohmaier, M.2
-
35
-
-
84986180461
-
-
Mega Project III of the National Information Infrastructure Advisory Council, USA
-
NIIAC (1995), Commentary on the Privacy and Related Security Principles, Mega Project III of the National Information Infrastructure Advisory Council, USA.
-
(1995)
Commentary on the Privacy and Related Security Principles
-
-
-
38
-
-
79961096706
-
-
June (accessed 18 October 1996)
-
NSFNET (1992), The NSFNET Backbone Services Acceptable Use Policy, http://www.haystack. edu/ysp/ computer/nsfnet.tml, June (accessed 18 October 1996).
-
(1992)
The NSFNET Backbone Services Acceptable Use Policy
-
-
-
39
-
-
0031346151
-
Corporate policies for electronic commerce
-
Nunamaker, J.F. and Sprague, R.H. (Eds), Hawaii, IEEE Computer Society Press, Los Alamitos, CA
-
Oliver, R.W. (1997), “Corporate policies for electronic commerce”, in Nunamaker, J.F. and Sprague, R.H. (Eds), Proceedings of the Thirtieth Annual Hawaii International Conference on Systems Sciences, Hawaii, IEEE Computer Society Press, Los Alamitos, CA.
-
(1997)
Proceedings of the Thirtieth Annual Hawaii International Conference on Systems Sciences
-
-
Oliver, R.W.1
-
40
-
-
0242613535
-
Information security policy
-
Abrams, M.D. Jajodia, S. and Podell, H.J. (Eds), IEEE Computer Society Press, Los Alamitos, CA
-
Olson, I.M. and Abrams, M.D. (1995), “Information security policy”, in Abrams, M.D., Jajodia, S. and Podell, H.J. (Eds), Information Security - an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA.
-
(1995)
Information Security - an Integrated Collection of Essays
-
-
Olson, I.M.1
Abrams, M.D.2
-
42
-
-
0347241358
-
-
‘The Internet for small businesses: an enabling infrastructure for competitiveness”, roceedings of the Fifth Internet Society Conference, Hawaii, June
-
Poon, S. and Swatman, P.M.C. (1995), ‘The Internet for small businesses: an enabling infrastructure for competitiveness”, roceedings of the Fifth Internet Society Conference, Hawaii, June, pp. 221-31.
-
(1995)
, pp. 221-231
-
-
Poon, S.1
Swatman, P.M.C.2
-
43
-
-
0039712959
-
Electronic networking among small business in Australia - an exploratory study
-
Swatman, P.M.C. Gricar, J. and Novak, J. (Eds), Moderna Organizacija Kranj, Bled
-
Poon, S. and Swatman, P.M.C. (1996), “Electronic networking among small business in Australia - an exploratory study”, in Swatman, P.M.C., Gricar, J. and Novak, J. (Eds), Electronic Commerce for Trade Efficiency and Effectiveness-Proceedings of the Ninth International Conference on EDI-IOS, Bled, Slovenia, 10-12 June, Moderna Organizacija Kranj, Bled, pp. 446-60.
-
(1996)
Electronic Commerce for Trade Efficiency and Effectiveness-Proceedings of the Ninth International Conference on EDI-IOS, Bled, Slovenia, 10-12 June
, pp. 446-460
-
-
Poon, S.1
Swatman, P.M.C.2
-
45
-
-
0027929095
-
Recent development in information technology security evaluation - the need for evaluation criteria for multilateral security
-
Sizer, R. Yngstrom, L. Kaspersen, H. and Fischer-Hubner, S. (Eds), IFIP Transactions A43, Elsevier Science B.V., Amsterdam
-
Rannenberg, K. (1994), “Recent development in information technology security evaluation - the need for evaluation criteria for multilateral security”, in Sizer, R., Yngstrom, L., Kaspersen, H. and Fischer-Hubner, S. (Eds), Proceedings Security and Control of Information Technology in Society, IFIP Transactions A43, Elsevier Science B.V., Amsterdam.
-
(1994)
Proceedings Security and Control of Information Technology in Society
-
-
Rannenberg, K.1
-
47
-
-
84986133489
-
-
The Internet Outsourcing Group, April, (accessed 18 October 1996)
-
TIOcom (1996), Terms and Conditions for User Access and User Services, The Internet Outsourcing Group, http://www.tio.com/ terms.tml, 27 April, (accessed 18 October 1996).
-
(1996)
Terms and Conditions for User Access and User Services
-
-
-
49
-
-
0000613590
-
Writing InfoSec policies
-
Wood, C.C. (1995), “Writing InfoSec policies”, Computers & Security, Vol. 14.
-
(1995)
Computers & Security
, vol.14
-
-
Wood, C.C.1
-
51
-
-
84904304182
-
A holistic approach to IT security
-
Eloff, J.H.P. and Von Solms, H.S. (Eds), Chapman & Hall, London
-
Yngstrom, L. (1995), “A holistic approach to IT security”, in Eloff, J.H.P. and Von Solms, H.S. (Eds), Information Security - the Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, Chapman & Hall, London.
-
(1995)
Information Security - the Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
-
-
Yngstrom, L.1
|