Search dblp for Publications

export results for "toc:db/journals/imcs/imcs2.bht:"

 download as .bib file

@article{DBLP:journals/imcs/Anderson94,
  author       = {Ross J. Anderson},
  title        = {Whither Cryptography},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {13--20},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410792961},
  doi          = {10.1108/09685229410792961},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Anderson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BellK94,
  author       = {Graham P. Bell and
                  David Kavanagh},
  title        = {Minimizing Risk in Your Wide Area Network Design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {26--28},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410066183},
  doi          = {10.1108/09685229410066183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BellK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Berner94,
  author       = {Philip Berner},
  title        = {Software Auditing Means Better Business},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {32--34},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068208},
  doi          = {10.1108/09685229410068208},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Berner94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ButlerF94,
  author       = {James R. Butler and
                  Karen A. Forcht},
  title        = {The Clipper Chip and the Price of Security in America},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {9--12},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410072582},
  doi          = {10.1108/09685229410072582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ButlerF94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Caelli94,
  author       = {William J. Caelli},
  title        = {Security in Open and Distributed Systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {18--24},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058759},
  doi          = {10.1108/09685229410058759},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Caelli94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/EbbsR94,
  author       = {Geoffrey Ebbs and
                  Howard Rheingold},
  title        = {Censorship on the Information Highway},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {30--31},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068244},
  doi          = {10.1108/09685229410068244},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/EbbsR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Edwards94,
  author       = {Bruce Edwards},
  title        = {Developing a Successful Network Disaster Recovery Plan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {37--42},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410066200},
  doi          = {10.1108/09685229410066200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Edwards94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fink94,
  author       = {Dieter Fink},
  title        = {A Security Framework for Information Systems Outsourcing},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {3--8},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068235},
  doi          = {10.1108/09685229410068235},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fink94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald94,
  author       = {Kevin J. Fitzgerald},
  title        = {The Importance of a Network Disaster Recovery Plan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {41--43},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058786},
  doi          = {10.1108/09685229410058786},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Fitzgerald94a,
  author       = {Kevin J. Fitzgerald},
  title        = {Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide
                  {IT} Environment},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {9--15},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068226},
  doi          = {10.1108/09685229410068226},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Fitzgerald94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FletcherD94,
  author       = {Keith Fletcher and
                  Mark Donaghy},
  title        = {The Role of Competitor Information Systems},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {4--18},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410792952},
  doi          = {10.1108/09685229410792952},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FletcherD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtO94,
  author       = {Karen A. Forcht and
                  Morey Oare},
  title        = {The Information Highway: The Interstate Highway System for Computer
                  Networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {4--8},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410072573},
  doi          = {10.1108/09685229410072573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtT94,
  author       = {Karen A. Forcht and
                  Daphyne Saunders Thomas},
  title        = {Information Compilation and Disbursement: Moral, Legal and Ethical
                  Considerations},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {23--28},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059550},
  doi          = {10.1108/09685229410059550},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ForchtT94a,
  author       = {Karen A. Forcht and
                  Yuan{-}Wen Aven Tsai},
  title        = {Security and Network Management: Changes in the Way We Work},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {35--41},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068190},
  doi          = {10.1108/09685229410068190},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ForchtT94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Geary94,
  author       = {James M. Geary},
  title        = {Executive Liability for Computer Crime and How to Prevent It},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {29--31},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059569},
  doi          = {10.1108/09685229410059569},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Geary94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Gluck94,
  author       = {Fredric B. Gluck},
  title        = {Protection of Electronic Mail and Electronic Messages: Challenges
                  and Solutions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {28--40},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058777},
  doi          = {10.1108/09685229410058777},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Gluck94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hains94,
  author       = {David Hains},
  title        = {Authentication: {A} Prominent Issue for Data Communications},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {25--27},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058768},
  doi          = {10.1108/09685229410058768},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hains94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Hains94a,
  author       = {David Hains},
  title        = {{EDI} Security Issues Can Be Overcome},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {46},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410066219},
  doi          = {10.1108/09685229410066219},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Hains94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Johannessen94,
  author       = {Jon{-}Arild Johannessen},
  title        = {Information Technology and Innovation: Identifying Critical Innovation
                  Factors},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {4--9},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059532},
  doi          = {10.1108/09685229410059532},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Johannessen94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JohannessenK94,
  author       = {Jon{-}Arild Johannessen and
                  Lars Kolvereid},
  title        = {Information Search Behaviour during Business Gestation},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {31--41},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410072609},
  doi          = {10.1108/09685229410072609},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JohannessenK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Karake94,
  author       = {Zeinab A. Karake},
  title        = {A Study of Information Technology Structure: Firm Ownership and Managerial
                  Characteristics},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {5},
  pages        = {21--30},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410072591},
  doi          = {10.1108/09685229410072591},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Karake94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Macdonald94,
  author       = {K. Hugh Macdonald},
  title        = {Organisational Transformation and Alignment: Misalignment as an Impediment
                  to Progress in Organisational Development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {16--29},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410068217},
  doi          = {10.1108/09685229410068217},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Macdonald94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MaduK94,
  author       = {Christian N. Madu and
                  Chu{-}hua Kuei},
  title        = {Optimum Information Technology for Socioeconomic Development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {4--11},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058731},
  doi          = {10.1108/09685229410058731},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MaduK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RogersonF94,
  author       = {Simon Rogerson and
                  Christine Fidler},
  title        = {Strategic Information Systems Planning: Its Adoption and Use},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {12--17},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410058740},
  doi          = {10.1108/09685229410058740},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RogersonF94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SouthernM94,
  author       = {G. Southern and
                  Allistair U. Murray},
  title        = {Quality Information Management: The Way to a Better Company Culture},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {32--35},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059578},
  doi          = {10.1108/09685229410059578},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/SouthernM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Weiss94,
  author       = {Kenneth P. Weiss},
  title        = {To Serve and Protect: Reconciling Information Protection with {LAN}
                  Environments},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {19--25},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410792934},
  doi          = {10.1108/09685229410792934},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Weiss94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Weiss94a,
  author       = {Kenneth P. Weiss},
  title        = {New Initiatives which May Erode Your Privacy: Or George Orwell Was
                  Off by Only a Decade},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {43--45},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410792943},
  doi          = {10.1108/09685229410792943},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Weiss94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/White94,
  author       = {Stewart White},
  title        = {The Data Network Disaster Recovery Plan: Considerations and Concerns},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {29--36},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410066192},
  doi          = {10.1108/09685229410066192},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/White94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Zeffane94,
  author       = {Rachid M. Zeffane},
  title        = {Computer Usage and Job Satisfaction: An Empirical Exploration},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {10--22},
  year         = {1994},
  url          = {https://doi.org/10.1108/09685229410059541},
  doi          = {10.1108/09685229410059541},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Zeffane94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics