Search dblp for Publications

export results for "toc:db/journals/imcs/imcs6.bht:"

 download as .bib file

@article{DBLP:journals/imcs/BarnardS98,
  author       = {Lynette Barnard and
                  Rossouw von Solms},
  title        = {The evaluation and certification of information security against {BS}
                  7799},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {72--77},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810209397},
  doi          = {10.1108/09685229810209397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BarnardS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BrockwayH98,
  author       = {Douglas Brockway and
                  Margaret A. Hurley},
  title        = {Achieving {IT} success},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {199--204},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240103},
  doi          = {10.1108/09685229810240103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BrockwayH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/CrammM98,
  author       = {Susan Cramm and
                  Thornton May},
  title        = {Accelerating executive development: hey coach ..},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {196--198},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240095},
  doi          = {10.1108/09685229810240095},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/CrammM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GrupeHY98,
  author       = {Fritz H. Grupe and
                  James M. Hensley and
                  Jeanne H. Yamamura},
  title        = {Watching systems in action: security at the periphery},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {155--159},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810232418},
  doi          = {10.1108/09685229810232418},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GrupeHY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hurley98,
  author       = {Margaret A. Hurley},
  title        = {Features and functions overload},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {160--161},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810232427},
  doi          = {10.1108/09685229810232427},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hurley98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LabuschagneE98,
  author       = {Les Labuschagne and
                  Jan H. P. Eloff},
  title        = {Real-time risk analysis using Java concepts},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {212--217},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240121},
  doi          = {10.1108/09685229810240121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LabuschagneE98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Larson98,
  author       = {Kent D. Larson},
  title        = {The role of service level agreements in {IT} service delivery},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {128--132},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225029},
  doi          = {10.1108/09685229810225029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Larson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LiddyS98,
  author       = {Carrie Liddy and
                  Alice Sturgeon},
  title        = {Seamless secured transactions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {21--27},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207416},
  doi          = {10.1108/09685229810207416},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LiddyS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/May98,
  author       = {Thornton May},
  title        = {Strategic ignorance: the new competitive high ground},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {127--128},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225010},
  doi          = {10.1108/09685229810225010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/May98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Morwood98,
  author       = {Gregory Morwood},
  title        = {Business continuity: awareness and training programmes},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {28--32},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207425},
  doi          = {10.1108/09685229810207425},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Morwood98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Moscato98,
  author       = {Donald R. Moscato},
  title        = {Database gateway processor risk analysis using fuzzy logic},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {138--144},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225047},
  doi          = {10.1108/09685229810225047},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Moscato98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MutsaersZG98,
  author       = {Ernest{-}Jan Mutsaers and
                  Han T. M. van der Zee and
                  Henrik Giertz},
  title        = {The evolution of information technology},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {115--126},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225001},
  doi          = {10.1108/09685229810225001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MutsaersZG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PortougalJ98,
  author       = {Victor Portougal and
                  Lech J. Janczewski},
  title        = {Industrial information-weight security models},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {205--211},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240112},
  doi          = {10.1108/09685229810240112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PortougalJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Puthli98,
  author       = {R. K. R. P. Puthli},
  title        = {{METANET:} a five-year Internet strategy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {3--14},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207399},
  doi          = {10.1108/09685229810207399},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Puthli98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ratnasingham98,
  author       = {Pauline Ratnasingham},
  title        = {Internet-based {EDI} trust and security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {33--39},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207434},
  doi          = {10.1108/09685229810207434},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ratnasingham98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ratnasingham98a,
  author       = {Pauline Ratnasingham},
  title        = {Trust in Web-based electronic commerce security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {162--166},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810227667},
  doi          = {10.1108/09685229810227667},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ratnasingham98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Schneier98,
  author       = {Bruce Schneier},
  title        = {Security pitfalls in cryptographic design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {133--137},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810225038},
  doi          = {10.1108/09685229810225038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Schneier98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Solms98,
  author       = {Rossouw von Solms},
  title        = {Information security management {(1):} why information security is
                  so important},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {174--177},
  year         = {1998},
  url          = {https://doi.org/10.1108/EUM0000000004533},
  doi          = {10.1108/EUM0000000004533},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Solms98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Solms98a,
  author       = {Rossouw von Solms},
  title        = {Information security management {(2):} guidelines to the management
                  of information technology security {(GMITS)}},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {221--223},
  year         = {1998},
  url          = {https://doi.org/10.1108/EUM0000000004542},
  doi          = {10.1108/EUM0000000004542},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Solms98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Solms98b,
  author       = {Rossouw von Solms},
  title        = {Information security management {(3):} the Code of Practice for Information
                  Security Management {(BS} 7799)},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {224--225},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240158},
  doi          = {10.1108/09685229810240158},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Solms98b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Thompson98,
  author       = {David Thompson},
  title        = {1997 computer crime and security survey},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {78--101},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810209414},
  doi          = {10.1108/09685229810209414},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Thompson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ThomsonS98,
  author       = {M. E. Thomson and
                  Rossouw von Solms},
  title        = {Information security awareness: educating your users effectively},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {167--173},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810227649},
  doi          = {10.1108/09685229810227649},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ThomsonS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wen98,
  author       = {H. Joseph Wen},
  title        = {From client/server to intranet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {15--20},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810207407},
  doi          = {10.1108/09685229810207407},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wen98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wen98a,
  author       = {H. Joseph Wen},
  title        = {Internet computer virus protection policy},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {66--71},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810209388},
  doi          = {10.1108/09685229810209388},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wen98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/WenT98,
  author       = {H. Joseph Wen and
                  Jyh{-}Horng Michael Tarn},
  title        = {Internet security: a case study of firewall selection},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {178--184},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810227658},
  doi          = {10.1108/09685229810227658},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/WenT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Wilson98,
  author       = {Stephen Wilson},
  title        = {Some limitations of web of trust models},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {5},
  pages        = {218--220},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810240130},
  doi          = {10.1108/09685229810240130},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Wilson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Zee98,
  author       = {Han T. M. van der Zee},
  title        = {Rejuvenating the {IT} supply organization},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {55--65},
  year         = {1998},
  url          = {https://doi.org/10.1108/09685229810209379},
  doi          = {10.1108/09685229810209379},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Zee98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics