JOURNAL ARTICLE

End-User Computing Security Guidelines

Ron Hale

Year: 1996 Journal:   Information Systems Security Vol: 4 (4)Pages: 49-64   Publisher: Taylor & Francis
Keywords:
Computer science Computer security Information security Information systems security Information system Management information systems Engineering

Metrics

7
Cited By
0.73
FWCI (Field Weighted Citation Impact)
0
Refs
0.74
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Spreadsheets and End-User Computing
Physical Sciences →  Computer Science →  Software
Advanced Data Storage Technologies
Physical Sciences →  Computer Science →  Computer Networks and Communications
Peer-to-Peer Network Technologies
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Developing End-User Computing Guidelines

Mark Bigler

Journal:   EDPACS Year: 1995 Vol: 22 (12)Pages: 1-5
BOOK-CHAPTER

End-User Computing Control Guidelines

Ron Hale

Auerbach Publications eBooks Year: 2020 Pages: 437-447
BOOK-CHAPTER

End-User Computing Control Guidelines

Ron Hale

Auerbach Publications eBooks Year: 1998 Pages: 437-447
BOOK-CHAPTER

End-User Computing Control Guidelines

Ron Hale

Auerbach Publications eBooks Year: 1999 Pages: 410-420
JOURNAL ARTICLE

Establishing Realistic End User Computing Security and Control

Sandra Allen

Journal:   EDPACS Year: 1996 Vol: 24 (4)Pages: 1-16
© 2026 ScienceGate Book Chapters — All rights reserved.