- "Stung by Spam Attacks, Businesses Head to Court," Computerworld, August 18, 1997 (www.computerworld.com), pgs. 1 and 16.
- "Internet Providers Fight Back Against Spammers," Computerworld, August 18, 1997 (www.computerworld,com), p. 17.
- "Where Is Our Data?" Secure Computing, August, 1997, pages 18-23.
- "Security on the Web," Secure Computing, August, 1997, pages 42-44.
- "Cyber Terrorism," Secure Computing, July, 1997, pages 22-28.
- Firewalls for the Year 2000 and Beyond, Secure Computing, July, 1997, pages 46-57.
- "Don’t Get Spammed," Information Week, August 18, 1997, pages 53-64.
- "Body Language…Biometrics," Information Week, August 18, 1997, pages 36-48.
- "How to Develop a Comprehensive Business Resumption Plan at a Large Organization," Disaster Recovery Journal, (DRJ), Summer, 1997, pages 29-34.
- "Training Your Business Continuity Teams," Disaster Recovery Journal (DRJ), Summer, 1997, pages 35-37.
©1997 James Madison University