Search dblp for Publications

export results for "toc:db/journals/imcs/imcs1.bht:"

 download as .bib file

@article{DBLP:journals/imcs/Bakewell93,
  author       = {Kenneth Graham Bartlett Bakewell},
  title        = {Information: The Seventh Management Function?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033379},
  doi          = {10.1108/09685229310033379},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Bakewell93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Berner93,
  author       = {Philip Berner},
  title        = {Software Auditing: Effectively Combating the Five Deadly Sins},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/EUM0000000001703},
  doi          = {10.1108/EUM0000000001703},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Berner93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BirdBB93,
  author       = {Andrew Bird and
                  Tom Blaney and
                  John Burton},
  title        = {DataComms 2000: {A} Strategic Exploration of a Transforming Industry},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {18--31},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310041901},
  doi          = {10.1108/09685229310041901},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BirdBB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EdwardsP93,
  author       = {Chris Edwards and
                  Joe Peppard},
  title        = {A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate
                  the Fog},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033405},
  doi          = {10.1108/09685229310033405},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EdwardsP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FidlerRS93,
  author       = {Christine Fidler and
                  Simon Rogerson and
                  Nicola Spiers},
  title        = {Current {IS} Practices within UK-based Organizations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033351},
  doi          = {10.1108/09685229310033351},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FidlerRS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FinkD93,
  author       = {Dieter Fink and
                  Daniel C. Duffy},
  title        = {Security Officers' Attitudes to the Use of Shared Logons},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {19--21},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026485},
  doi          = {10.1108/09685229310026485},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FinkD93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald93,
  author       = {Kevin J. Fitzgerald},
  title        = {Business Continuity Planning in a Distributed Downsized Environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033388},
  doi          = {10.1108/09685229310033388},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald93a,
  author       = {Kevin J. Fitzgerald},
  title        = {Risk Analysis: Ten Years On},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048328},
  doi          = {10.1108/09685229310048328},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtBSC93,
  author       = {Karen A. Forcht and
                  Robert G. Brookshire and
                  Scott Paul Stevens and
                  Rodney J. Clarke},
  title        = {Computer Ethics of University Students: An International Exploratory
                  Study},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048346},
  doi          = {10.1108/09685229310048346},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtBSC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GabbottS93,
  author       = {Mark Gabbott and
                  Ewan Sutherland},
  title        = {Studying Potential Customers: The Applications of Marketing Information
                  Systems in University Recruitment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045349},
  doi          = {10.1108/09685229310045349},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GabbottS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gluck93,
  author       = {Fredric B. Gluck},
  title        = {The Open Security Architecture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {4--11},
  year         = {1993},
  url          = {https://doi.org/10.1108/EUM0000000001704},
  doi          = {10.1108/EUM0000000001704},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gluck93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HaarS93,
  author       = {Helen van de Haar and
                  Rossouw von Solms},
  title        = {A Tool for Information Security Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {4--10},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026467},
  doi          = {10.1108/09685229310026467},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HaarS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hains93,
  author       = {David Hains},
  title        = {Computer Security as a Liability Control Tool},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045321},
  doi          = {10.1108/09685229310045321},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hains93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hamilton93,
  author       = {Ross Hamilton},
  title        = {Does {IT} Matter When Companies Merge?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033397},
  doi          = {10.1108/09685229310033397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hamilton93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JamesC93,
  author       = {H. James and
                  Roger A. Coldwell},
  title        = {Corporate Security: An Australian Ostrich},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045303},
  doi          = {10.1108/09685229310045303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JamesC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JohannessenO93,
  author       = {Jon{-}Arild Johannessen and
                  Johan Olaisen},
  title        = {Information, Communication and Innovation: Identifying Critical Innovation
                  Factors {(CIF)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045358},
  doi          = {10.1108/09685229310045358},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JohannessenO93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KamayA93,
  author       = {Vic Kamay and
                  Tony Adams},
  title        = {The 1992 Profile of Computer Abuse in Australia: Part 2},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {2},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310033360},
  doi          = {10.1108/09685229310033360},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KamayA93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kirby93,
  author       = {Justice Michael Kirby},
  title        = {The Human Genome Project: Promise or Problems?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048300},
  doi          = {10.1108/09685229310048300},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kirby93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kirby93a,
  author       = {Justice Michael Kirby},
  title        = {Legal Aspects of the Human Genome Project: Reflections on the Bilbao
                  Conference},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048319},
  doi          = {10.1108/09685229310048319},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kirby93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MartinA93,
  author       = {William J. Martin and
                  Michael Armstrong},
  title        = {{STAR} and Economic Regeneration: Some Feedback from Northern Ireland},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {29--38},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026511},
  doi          = {10.1108/09685229310026511},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MartinA93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Moore93,
  author       = {Pat Williams Moore},
  title        = {{BMS} {CAT} in Action: Electronic/Communications Recovery at the World
                  Trade Centre, New York},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045312},
  doi          = {10.1108/09685229310045312},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Moore93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Newman93,
  author       = {Tom Newman},
  title        = {Information Loss Rarely Recovered},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310045330},
  doi          = {10.1108/09685229310045330},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Newman93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SolmsSC93,
  author       = {Rossouw von Solms and
                  Sebastiaan H. von Solms and
                  William J. Caelli},
  title        = {A Model for Information Security Management},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {12--17},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310041893},
  doi          = {10.1108/09685229310041893},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SolmsSC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TaftiN93,
  author       = {Mohammed H. A. Tafti and
                  Ehsan Nikbakht},
  title        = {Neural Networks and Expert Systems: New Horizons in Business Finance
                  Applications},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {22--28},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026502},
  doi          = {10.1108/09685229310026502},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TaftiN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Weiss93,
  author       = {Kenneth P. Weiss},
  title        = {Data Integrity and Security: Who's in Charge Here Anyway?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {4},
  year         = {1993},
  url          = {https://doi.org/10.1108/EUM0000000001705},
  doi          = {10.1108/EUM0000000001705},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Weiss93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wood93,
  author       = {Charles Cresson Wood},
  title        = {Dreams Come True with Password Genie},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {5},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310048337},
  doi          = {10.1108/09685229310048337},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wood93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/YavasY93,
  author       = {Ugur Yavas and
                  Mahmoud M. Yasin},
  title        = {Computing Environment in an Arabian Gulf Country: An Organizational
                  Perspective},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {11--18},
  year         = {1993},
  url          = {https://doi.org/10.1108/09685229310026476},
  doi          = {10.1108/09685229310026476},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/YavasY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics