2
Views
0
CrossRef citations to date
0
Altmetric
Research Section

Computer Usage Characteristics and Security in Small Service Firms: An Exploratory Study

, &
Pages 70-76 | Published online: 01 Feb 2016

References

  • Aarons, R. and R. Raskin. “Security Strategies - Hardware Protection for PCs,” PC Magazine, 6:8, 1987, pp. 104–120.
  • Baker, R.H. The Computer Security Handbook, Tab Books, Inc., 1985.
  • Blackwell, G. “Backups Fundamental to Micro Security/Disaster Recovery,” Computing Canada, 15:23, 1989, pp. 37–46.
  • Blankley, A.I., T.S. Amer, and C.E. Bain. “Developing a System of Internal Controls for Microcomputers,” Financial and Accounting Systems, 6:4, 1989, pp. 40–45.
  • Bryant, S.F. “Better Safe Than Sorry,” Computer Decisions, 16:11, 1984, pp. 46–4.
  • Buttross, T.E. and M.D. Ackers. “A Time-saving Approach to Microcomputer Security,” Journal of Accounting and EDP, 6:1, 1990, pp. 31–35.
  • Buttross, T.E. and J.C. Malley. “What You Need to Know About Microcomputer Security,” Practical Accountant, 23:6, 1990, pp. 94–100.
  • Cohen, J.A. and C.S. McKinney. How to Microcomputerize Your Business, Prentice-Hall, Inc., 1983.
  • Cronin, D.J. Microcomputer Data Security: Issues and Strategies for Business, Prentice-Hall Press, 1986.
  • Fisher, R.P. Information Systems Security, Prentice-Hall, Inc., 1984.
  • Fisher, S. “Data Security Experts Say Errors are Greatest Threat,” Infoworld, 13:36, 1991, pp. S74–S76.
  • Forgione, D. and A.A.I. Blankley. “Microcomputer Security and Control,” Journal of Accountancy, 169:6, 1990, pp. 83–90.
  • Harris, T. and C.C. Barnes. “Microcomputer Security in CPA Firms: A Survey,” Practical Accountant, 24:10, 1991, pp. 99–103.
  • Kahai, P.H. Security of Small Business Computer Systems, Unpublished master's thesis, Auburn University, Auburn, AL, 1988.
  • Kahai, P.S. and D.A. Bradbard. “Security Products Available for the Prevention and Detection of Abuse of Personal Computers,” Proceedings of the Southeastern Chapter of the Institute of Management Sciences, 1988.
  • Kahai, P.S. and D.A. Bradbard. “Backup Options for Personal Computer Fixed Disks,” Proceedings of the South-East Region of the Decision Sciences Institute, 1989.
  • Kingston, P.C.H. and M. Goulboum. “Security for Small Business Computers” in J.B. Grimson and H.J. Kugler (Eds.), Computer Security: The Practical Issues in a Troubled World, Elsevier Science Publishers B.V., 1985, pp. 297–303.
  • Powell, N.C. and S.G. Strickland. “Security in the Microcomputer Environment,” Ohio CPA Journal, 48:3, 1989, pp. 20–23.
  • Prasad, J.N., Y. Kathawala, H. Bocker, and D. Sprague. “The Global Problem of Computer Crimes and the Need for Security,” Industrial Management, 33:4, 1991, pp. 24–28.
  • Rhodes, B. “Micro Security that Makes Sense,” Computer Decisions, 17:9, 1985, pp. 72–83.
  • Shoor, R. “Back to Basics,” Infosystems, 33:9, 1986, pp. 44–46.
  • Small Business Computer Security and Education Act of 1984, 98 U.S.C. 431.
  • Zimmerman, J.S. “PC Security: So What's New?” Datamation, 31:21, 1985, pp. 89–92.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.