Karen A. Forcht

According to our database1, Karen A. Forcht authored at least 25 papers between 1988 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data.
J. Comput. Inf. Syst., 2010

2006
Laws and regulations affecting information management and frameworks for assessing compliance.
Inf. Manag. Comput. Secur., 2006

2005
Computer Forensics: The Modern Crime Fighting Tool.
J. Comput. Inf. Syst., 2005

2002
Protecting personal privacy on the Internet.
Inf. Manag. Comput. Secur., 2002

2001
Developing a Computer Security Policy for Organizational Use and Implementation.
J. Comput. Inf. Syst., 2001

Intrusion Detection Systems: Possibilities for the Future.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

2000
SAP R/3: A Reengineering Tool at Tenneco, Inc.
J. Comput. Inf. Syst., 2000

Security-related concerns with geographic information systems and geographic mapping.
Inf. Manag. Comput. Secur., 2000

1998
Legal considerations of Internet use - issues to be addressed.
Internet Res., 1998

1997
Security considerations of doing business via the Internet: cautions to be considered.
Internet Res., 1997

Get linked or get lost: marketing strategy for the Internet.
Internet Res., 1997

Control of the Internet.
Inf. Manag. Comput. Secur., 1997

A Pilot Study of Small Business's Perception of Vendor Services: are these associated with small business IT educational requirements.
Australas. J. Inf. Syst., 1997

1996
Information security in business environments.
Inf. Manag. Comput. Secur., 1996

Doing business on the Internet: marketing and security aspects.
Inf. Manag. Comput. Secur., 1996

1995
Security issues and concerns with the Internet.
Internet Res., 1995

1994
Security and Network Management: Changes in the Way We Work.
Inf. Manag. Comput. Secur., 1994

Information Compilation and Disbursement: Moral, Legal and Ethical Considerations.
Inf. Manag. Comput. Secur., 1994

The Information Highway: The Interstate Highway System for Computer Networks.
Inf. Manag. Comput. Secur., 1994

The Clipper Chip and the Price of Security in America.
Inf. Manag. Comput. Secur., 1994

1993
Computer Ethics of University Students: An International Exploratory Study.
Inf. Manag. Comput. Secur., 1993

Whistleblowing: an ethical dilemma.
Australas. J. Inf. Syst., 1993

1990
Determining documentation requirements for user-developed applications.
Inf. Manag., 1990

1988
Adequate documentation of user-developed applications: a new challenge for end-user computing management.
Proceedings of the ACM SIGCPR Conference on Management of Information Systems Personnel, 1988

Developing awareness of computer ethics.
Proceedings of the ACM SIGCPR Conference on Management of Information Systems Personnel, 1988


  Loading...