ScienceGate Book Chapters
Search
About Us
Search
About Us
JOURNAL ARTICLE
End-User Computing Security Guidelines
Ron Hale
Year:
1996
Journal:
Information Systems Security
Vol:
4 (4)
Pages:
49-64
Publisher:
Taylor & Francis
DOI:
10.1080/10658989609342520
Get Full-Text PDF
Get Analytical Report
Keywords:
Computer science
Computer security
Information security
Information systems security
Information system
Management information systems
Engineering
Metrics
7
Cited By
0.73
FWCI (Field Weighted Citation Impact)
0
Refs
0.74
Citation Normalized Percentile
Is in top 1%
Is in top 10%
Topics
Spreadsheets and End-User Computing
Physical Sciences → Computer Science → Software
Advanced Data Storage Technologies
Physical Sciences → Computer Science → Computer Networks and Communications
Peer-to-Peer Network Technologies
Physical Sciences → Computer Science → Computer Networks and Communications
Related Documents
JOURNAL ARTICLE
Developing End-User Computing Guidelines
Mark Bigler
Journal:
EDPACS
Year:
1995
Vol:
22 (12)
Pages:
1-5
BOOK-CHAPTER
End-User Computing Control Guidelines
Ron Hale
Auerbach Publications eBooks
Year:
2020
Pages:
437-447
BOOK-CHAPTER
End-User Computing Control Guidelines
Ron Hale
Auerbach Publications eBooks
Year:
1998
Pages:
437-447
BOOK-CHAPTER
End-User Computing Control Guidelines
Ron Hale
Auerbach Publications eBooks
Year:
1999
Pages:
410-420
JOURNAL ARTICLE
Establishing Realistic End User Computing Security and Control
Sandra Allen
Journal:
EDPACS
Year:
1996
Vol:
24 (4)
Pages:
1-16