Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs6.bht:"
@article{DBLP:journals/imcs/BarnardS98, author = {Lynette Barnard and Rossouw von Solms}, title = {The evaluation and certification of information security against {BS} 7799}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {2}, pages = {72--77}, year = {1998}, url = {https://doi.org/10.1108/09685229810209397}, doi = {10.1108/09685229810209397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BarnardS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BrockwayH98, author = {Douglas Brockway and Margaret A. Hurley}, title = {Achieving {IT} success}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {199--204}, year = {1998}, url = {https://doi.org/10.1108/09685229810240103}, doi = {10.1108/09685229810240103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BrockwayH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/CrammM98, author = {Susan Cramm and Thornton May}, title = {Accelerating executive development: hey coach ..}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {196--198}, year = {1998}, url = {https://doi.org/10.1108/09685229810240095}, doi = {10.1108/09685229810240095}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/CrammM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GrupeHY98, author = {Fritz H. Grupe and James M. Hensley and Jeanne H. Yamamura}, title = {Watching systems in action: security at the periphery}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {155--159}, year = {1998}, url = {https://doi.org/10.1108/09685229810232418}, doi = {10.1108/09685229810232418}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GrupeHY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hurley98, author = {Margaret A. Hurley}, title = {Features and functions overload}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {160--161}, year = {1998}, url = {https://doi.org/10.1108/09685229810232427}, doi = {10.1108/09685229810232427}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hurley98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LabuschagneE98, author = {Les Labuschagne and Jan H. P. Eloff}, title = {Real-time risk analysis using Java concepts}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {212--217}, year = {1998}, url = {https://doi.org/10.1108/09685229810240121}, doi = {10.1108/09685229810240121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LabuschagneE98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Larson98, author = {Kent D. Larson}, title = {The role of service level agreements in {IT} service delivery}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {128--132}, year = {1998}, url = {https://doi.org/10.1108/09685229810225029}, doi = {10.1108/09685229810225029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Larson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LiddyS98, author = {Carrie Liddy and Alice Sturgeon}, title = {Seamless secured transactions}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {21--27}, year = {1998}, url = {https://doi.org/10.1108/09685229810207416}, doi = {10.1108/09685229810207416}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LiddyS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/May98, author = {Thornton May}, title = {Strategic ignorance: the new competitive high ground}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {127--128}, year = {1998}, url = {https://doi.org/10.1108/09685229810225010}, doi = {10.1108/09685229810225010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/May98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Morwood98, author = {Gregory Morwood}, title = {Business continuity: awareness and training programmes}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {28--32}, year = {1998}, url = {https://doi.org/10.1108/09685229810207425}, doi = {10.1108/09685229810207425}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Morwood98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Moscato98, author = {Donald R. Moscato}, title = {Database gateway processor risk analysis using fuzzy logic}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {138--144}, year = {1998}, url = {https://doi.org/10.1108/09685229810225047}, doi = {10.1108/09685229810225047}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Moscato98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MutsaersZG98, author = {Ernest{-}Jan Mutsaers and Han T. M. van der Zee and Henrik Giertz}, title = {The evolution of information technology}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {115--126}, year = {1998}, url = {https://doi.org/10.1108/09685229810225001}, doi = {10.1108/09685229810225001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MutsaersZG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PortougalJ98, author = {Victor Portougal and Lech J. Janczewski}, title = {Industrial information-weight security models}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {205--211}, year = {1998}, url = {https://doi.org/10.1108/09685229810240112}, doi = {10.1108/09685229810240112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PortougalJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Puthli98, author = {R. K. R. P. Puthli}, title = {{METANET:} a five-year Internet strategy}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {3--14}, year = {1998}, url = {https://doi.org/10.1108/09685229810207399}, doi = {10.1108/09685229810207399}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Puthli98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ratnasingham98, author = {Pauline Ratnasingham}, title = {Internet-based {EDI} trust and security}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {33--39}, year = {1998}, url = {https://doi.org/10.1108/09685229810207434}, doi = {10.1108/09685229810207434}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ratnasingham98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ratnasingham98a, author = {Pauline Ratnasingham}, title = {Trust in Web-based electronic commerce security}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {162--166}, year = {1998}, url = {https://doi.org/10.1108/09685229810227667}, doi = {10.1108/09685229810227667}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ratnasingham98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Schneier98, author = {Bruce Schneier}, title = {Security pitfalls in cryptographic design}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {3}, pages = {133--137}, year = {1998}, url = {https://doi.org/10.1108/09685229810225038}, doi = {10.1108/09685229810225038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Schneier98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Solms98, author = {Rossouw von Solms}, title = {Information security management {(1):} why information security is so important}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {174--177}, year = {1998}, url = {https://doi.org/10.1108/EUM0000000004533}, doi = {10.1108/EUM0000000004533}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Solms98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Solms98a, author = {Rossouw von Solms}, title = {Information security management {(2):} guidelines to the management of information technology security {(GMITS)}}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {221--223}, year = {1998}, url = {https://doi.org/10.1108/EUM0000000004542}, doi = {10.1108/EUM0000000004542}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Solms98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Solms98b, author = {Rossouw von Solms}, title = {Information security management {(3):} the Code of Practice for Information Security Management {(BS} 7799)}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {224--225}, year = {1998}, url = {https://doi.org/10.1108/09685229810240158}, doi = {10.1108/09685229810240158}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Solms98b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Thompson98, author = {David Thompson}, title = {1997 computer crime and security survey}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {2}, pages = {78--101}, year = {1998}, url = {https://doi.org/10.1108/09685229810209414}, doi = {10.1108/09685229810209414}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Thompson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ThomsonS98, author = {M. E. Thomson and Rossouw von Solms}, title = {Information security awareness: educating your users effectively}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {167--173}, year = {1998}, url = {https://doi.org/10.1108/09685229810227649}, doi = {10.1108/09685229810227649}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ThomsonS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wen98, author = {H. Joseph Wen}, title = {From client/server to intranet}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {1}, pages = {15--20}, year = {1998}, url = {https://doi.org/10.1108/09685229810207407}, doi = {10.1108/09685229810207407}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wen98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wen98a, author = {H. Joseph Wen}, title = {Internet computer virus protection policy}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {2}, pages = {66--71}, year = {1998}, url = {https://doi.org/10.1108/09685229810209388}, doi = {10.1108/09685229810209388}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wen98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/WenT98, author = {H. Joseph Wen and Jyh{-}Horng Michael Tarn}, title = {Internet security: a case study of firewall selection}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {4}, pages = {178--184}, year = {1998}, url = {https://doi.org/10.1108/09685229810227658}, doi = {10.1108/09685229810227658}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/WenT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Wilson98, author = {Stephen Wilson}, title = {Some limitations of web of trust models}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {5}, pages = {218--220}, year = {1998}, url = {https://doi.org/10.1108/09685229810240130}, doi = {10.1108/09685229810240130}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Wilson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Zee98, author = {Han T. M. van der Zee}, title = {Rejuvenating the {IT} supply organization}, journal = {Inf. Manag. Comput. Secur.}, volume = {6}, number = {2}, pages = {55--65}, year = {1998}, url = {https://doi.org/10.1108/09685229810209379}, doi = {10.1108/09685229810209379}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Zee98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.