Elsevier

Computers & Security

Volume 11, Issue 7, November 1992, Pages 620-622
Computers & Security

Computer contingency plans and the auditors: A survey of businesses affected by Hurricane Hugo

https://doi.org/10.1016/0167-4048(92)90138-HGet rights and content

First page preview

First page preview
Click to open first page preview

References (1)

  • Michael J. Cerullo

    Accountants Role in Computer Contingency Planning

    The CPA Journal

    (January 1981)

Cited by (1)

  • Human resource information systems: Information security concerns for organizations

    2013, Human Resource Management Review
    Citation Excerpt :

    Previous research has resulted in various information security oriented models in different contexts. Some of those models include security of web based applications (Joshi, Aref, Ghafoor, & Spafford, 2001), role based accessed control (Sandhu, Coyne, Feinstein, & Youman, 1996), security counter measures (D'Arcy, Hovav, & Galletta, 2009), and contingency planning (Cerullo & McDuffie, 1992). Some have argued that a more holistic approach toward security is needed, which begins with the design process (Baskerville, 1993; Hitchings, 1996).

View full text