References
- Aarons, R. and R. Raskin. “Security Strategies - Hardware Protection for PCs,” PC Magazine, 6:8, 1987, pp. 104–120.
- Baker, R.H. The Computer Security Handbook, Tab Books, Inc., 1985.
- Blackwell, G. “Backups Fundamental to Micro Security/Disaster Recovery,” Computing Canada, 15:23, 1989, pp. 37–46.
- Blankley, A.I., T.S. Amer, and C.E. Bain. “Developing a System of Internal Controls for Microcomputers,” Financial and Accounting Systems, 6:4, 1989, pp. 40–45.
- Bryant, S.F. “Better Safe Than Sorry,” Computer Decisions, 16:11, 1984, pp. 46–4.
- Buttross, T.E. and M.D. Ackers. “A Time-saving Approach to Microcomputer Security,” Journal of Accounting and EDP, 6:1, 1990, pp. 31–35.
- Buttross, T.E. and J.C. Malley. “What You Need to Know About Microcomputer Security,” Practical Accountant, 23:6, 1990, pp. 94–100.
- Cohen, J.A. and C.S. McKinney. How to Microcomputerize Your Business, Prentice-Hall, Inc., 1983.
- Cronin, D.J. Microcomputer Data Security: Issues and Strategies for Business, Prentice-Hall Press, 1986.
- Fisher, R.P. Information Systems Security, Prentice-Hall, Inc., 1984.
- Fisher, S. “Data Security Experts Say Errors are Greatest Threat,” Infoworld, 13:36, 1991, pp. S74–S76.
- Forgione, D. and A.A.I. Blankley. “Microcomputer Security and Control,” Journal of Accountancy, 169:6, 1990, pp. 83–90.
- Harris, T. and C.C. Barnes. “Microcomputer Security in CPA Firms: A Survey,” Practical Accountant, 24:10, 1991, pp. 99–103.
- Kahai, P.H. Security of Small Business Computer Systems, Unpublished master's thesis, Auburn University, Auburn, AL, 1988.
- Kahai, P.S. and D.A. Bradbard. “Security Products Available for the Prevention and Detection of Abuse of Personal Computers,” Proceedings of the Southeastern Chapter of the Institute of Management Sciences, 1988.
- Kahai, P.S. and D.A. Bradbard. “Backup Options for Personal Computer Fixed Disks,” Proceedings of the South-East Region of the Decision Sciences Institute, 1989.
- Kingston, P.C.H. and M. Goulboum. “Security for Small Business Computers” in J.B. Grimson and H.J. Kugler (Eds.), Computer Security: The Practical Issues in a Troubled World, Elsevier Science Publishers B.V., 1985, pp. 297–303.
- Powell, N.C. and S.G. Strickland. “Security in the Microcomputer Environment,” Ohio CPA Journal, 48:3, 1989, pp. 20–23.
- Prasad, J.N., Y. Kathawala, H. Bocker, and D. Sprague. “The Global Problem of Computer Crimes and the Need for Security,” Industrial Management, 33:4, 1991, pp. 24–28.
- Rhodes, B. “Micro Security that Makes Sense,” Computer Decisions, 17:9, 1985, pp. 72–83.
- Shoor, R. “Back to Basics,” Infosystems, 33:9, 1986, pp. 44–46.
- Small Business Computer Security and Education Act of 1984, 98 U.S.C. 431.
- Zimmerman, J.S. “PC Security: So What's New?” Datamation, 31:21, 1985, pp. 89–92.