{"title":"Impacts on information technology management","authors":"CIA, CISA, CDP Charles H. Le Grand","doi":"10.1016/S0960-2593(97)84493-X","DOIUrl":"10.1016/S0960-2593(97)84493-X","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 7","pages":"Pages 10-16"},"PeriodicalIF":0.0,"publicationDate":"1997-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)84493-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90700227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fools gold and the quest for internet security","authors":"August Bequai","doi":"10.1016/S0960-2593(97)84496-5","DOIUrl":"https://doi.org/10.1016/S0960-2593(97)84496-5","url":null,"abstract":"","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 7","pages":"Pages 30-33"},"PeriodicalIF":0.0,"publicationDate":"1997-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)84496-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91959541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}