

Author: Forcht Karen A Fore Richard E
Publisher: Emerald Group Publishing Ltd
ISSN: 1066-2243
Source: Internet Research: Electronic Networking Applications and Policy, Vol.5, Iss.3, 1995-03, pp. : 23-31
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Internet smartcard benefits for Internet security issues
By Urien Pascal
Campus-Wide Information Systems, Vol. 20, Iss. 3, 2003-03 ,pp. :






Information security and the Internet
Information Management & Computer Security, Vol. 3, Iss. 4, 1995-04 ,pp. :