Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs1.bht:"
@article{DBLP:journals/imcs/Bakewell93, author = {Kenneth Graham Bartlett Bakewell}, title = {Information: The Seventh Management Function?}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033379}, doi = {10.1108/09685229310033379}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Bakewell93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Berner93, author = {Philip Berner}, title = {Software Auditing: Effectively Combating the Five Deadly Sins}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/EUM0000000001703}, doi = {10.1108/EUM0000000001703}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Berner93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BirdBB93, author = {Andrew Bird and Tom Blaney and John Burton}, title = {DataComms 2000: {A} Strategic Exploration of a Transforming Industry}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {3}, pages = {18--31}, year = {1993}, url = {https://doi.org/10.1108/09685229310041901}, doi = {10.1108/09685229310041901}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BirdBB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EdwardsP93, author = {Chris Edwards and Joe Peppard}, title = {A Taxonomy of Executive Information Systems: Let the 4 Cs Penetrate the Fog}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033405}, doi = {10.1108/09685229310033405}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EdwardsP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FidlerRS93, author = {Christine Fidler and Simon Rogerson and Nicola Spiers}, title = {Current {IS} Practices within UK-based Organizations}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033351}, doi = {10.1108/09685229310033351}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FidlerRS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FinkD93, author = {Dieter Fink and Daniel C. Duffy}, title = {Security Officers' Attitudes to the Use of Shared Logons}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {19--21}, year = {1993}, url = {https://doi.org/10.1108/09685229310026485}, doi = {10.1108/09685229310026485}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FinkD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald93, author = {Kevin J. Fitzgerald}, title = {Business Continuity Planning in a Distributed Downsized Environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033388}, doi = {10.1108/09685229310033388}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald93a, author = {Kevin J. Fitzgerald}, title = {Risk Analysis: Ten Years On}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048328}, doi = {10.1108/09685229310048328}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtBSC93, author = {Karen A. Forcht and Robert G. Brookshire and Scott Paul Stevens and Rodney J. Clarke}, title = {Computer Ethics of University Students: An International Exploratory Study}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048346}, doi = {10.1108/09685229310048346}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtBSC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GabbottS93, author = {Mark Gabbott and Ewan Sutherland}, title = {Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045349}, doi = {10.1108/09685229310045349}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GabbottS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gluck93, author = {Fredric B. Gluck}, title = {The Open Security Architecture}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {3}, pages = {4--11}, year = {1993}, url = {https://doi.org/10.1108/EUM0000000001704}, doi = {10.1108/EUM0000000001704}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gluck93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HaarS93, author = {Helen van de Haar and Rossouw von Solms}, title = {A Tool for Information Security Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {4--10}, year = {1993}, url = {https://doi.org/10.1108/09685229310026467}, doi = {10.1108/09685229310026467}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HaarS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hains93, author = {David Hains}, title = {Computer Security as a Liability Control Tool}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045321}, doi = {10.1108/09685229310045321}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hains93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hamilton93, author = {Ross Hamilton}, title = {Does {IT} Matter When Companies Merge?}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033397}, doi = {10.1108/09685229310033397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hamilton93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JamesC93, author = {H. James and Roger A. Coldwell}, title = {Corporate Security: An Australian Ostrich}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045303}, doi = {10.1108/09685229310045303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JamesC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JohannessenO93, author = {Jon{-}Arild Johannessen and Johan Olaisen}, title = {Information, Communication and Innovation: Identifying Critical Innovation Factors {(CIF)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045358}, doi = {10.1108/09685229310045358}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JohannessenO93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KamayA93, author = {Vic Kamay and Tony Adams}, title = {The 1992 Profile of Computer Abuse in Australia: Part 2}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {2}, year = {1993}, url = {https://doi.org/10.1108/09685229310033360}, doi = {10.1108/09685229310033360}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KamayA93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kirby93, author = {Justice Michael Kirby}, title = {The Human Genome Project: Promise or Problems?}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048300}, doi = {10.1108/09685229310048300}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kirby93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kirby93a, author = {Justice Michael Kirby}, title = {Legal Aspects of the Human Genome Project: Reflections on the Bilbao Conference}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048319}, doi = {10.1108/09685229310048319}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kirby93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MartinA93, author = {William J. Martin and Michael Armstrong}, title = {{STAR} and Economic Regeneration: Some Feedback from Northern Ireland}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {29--38}, year = {1993}, url = {https://doi.org/10.1108/09685229310026511}, doi = {10.1108/09685229310026511}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MartinA93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Moore93, author = {Pat Williams Moore}, title = {{BMS} {CAT} in Action: Electronic/Communications Recovery at the World Trade Centre, New York}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045312}, doi = {10.1108/09685229310045312}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Moore93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Newman93, author = {Tom Newman}, title = {Information Loss Rarely Recovered}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/09685229310045330}, doi = {10.1108/09685229310045330}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Newman93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SolmsSC93, author = {Rossouw von Solms and Sebastiaan H. von Solms and William J. Caelli}, title = {A Model for Information Security Management}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {3}, pages = {12--17}, year = {1993}, url = {https://doi.org/10.1108/09685229310041893}, doi = {10.1108/09685229310041893}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SolmsSC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TaftiN93, author = {Mohammed H. A. Tafti and Ehsan Nikbakht}, title = {Neural Networks and Expert Systems: New Horizons in Business Finance Applications}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {22--28}, year = {1993}, url = {https://doi.org/10.1108/09685229310026502}, doi = {10.1108/09685229310026502}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TaftiN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Weiss93, author = {Kenneth P. Weiss}, title = {Data Integrity and Security: Who's in Charge Here Anyway?}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {4}, year = {1993}, url = {https://doi.org/10.1108/EUM0000000001705}, doi = {10.1108/EUM0000000001705}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Weiss93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wood93, author = {Charles Cresson Wood}, title = {Dreams Come True with Password Genie}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {5}, year = {1993}, url = {https://doi.org/10.1108/09685229310048337}, doi = {10.1108/09685229310048337}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wood93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/YavasY93, author = {Ugur Yavas and Mahmoud M. Yasin}, title = {Computing Environment in an Arabian Gulf Country: An Organizational Perspective}, journal = {Inf. Manag. Comput. Secur.}, volume = {1}, number = {1}, pages = {11--18}, year = {1993}, url = {https://doi.org/10.1108/09685229310026476}, doi = {10.1108/09685229310026476}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/YavasY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.