Published: 1998-01-01

Articles

An Application Of A Data Mining Technique For Assessing The Risk Of Management Fraud

Ashutosh Deshmukh, Lakshminarayan Talluru
Abstract 171 | PDF Downloads 221 | DOI https://doi.org/10.19030/rbis.v2i1.5446

Page 1-16

Operational Auditing And Testing In Client/Server Systems

Parag C. Pendharkar, James A. Rodger, Shishir Kumar
Abstract 157 | PDF Downloads 132 | DOI https://doi.org/10.19030/rbis.v2i1.5447

Page 17-22

Encryption Technology And First Amendment Rights

Roy Whitehead, Jr., Ken Griffin, Paul Jensen
Abstract 166 | PDF Downloads 164 | DOI https://doi.org/10.19030/rbis.v2i1.5454

Page 23-30

Using A Capstone Accounting Information Systems Course For Assessment And The Development Of Team Skills

Mohsen Sharifi, Gary B. McCombs, Susan C. Kattelus
Abstract 173 | PDF Downloads 224 | DOI https://doi.org/10.19030/rbis.v2i1.5449

Page 31-38

Dimensions of Computer System Success in Business

Robert W. Stone, David J. Good
Abstract 114 | PDF Downloads 172 | DOI https://doi.org/10.19030/rbis.v2i1.5451

Page 49-66

Internet Commerce: Security Is Still A Concern

Ken Griffin, Paula D. Ladd, Roy Whitehead, Jr.
Abstract 148 | PDF Downloads 186 | DOI https://doi.org/10.19030/rbis.v2i1.5452

Page 67-72

Information System Managers View Of System Development, Use, And Failure

James J. Jiang, Jaideep Motwani, Roger A. Pick
Abstract 152 | PDF Downloads 160 | DOI https://doi.org/10.19030/rbis.v2i1.5453

Page 73-80