Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs2.bht:"
@article{DBLP:journals/imcs/Anderson94, author = {Ross J. Anderson}, title = {Whither Cryptography}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {13--20}, year = {1994}, url = {https://doi.org/10.1108/09685229410792961}, doi = {10.1108/09685229410792961}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Anderson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BellK94, author = {Graham P. Bell and David Kavanagh}, title = {Minimizing Risk in Your Wide Area Network Design}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {26--28}, year = {1994}, url = {https://doi.org/10.1108/09685229410066183}, doi = {10.1108/09685229410066183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BellK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Berner94, author = {Philip Berner}, title = {Software Auditing Means Better Business}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {32--34}, year = {1994}, url = {https://doi.org/10.1108/09685229410068208}, doi = {10.1108/09685229410068208}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Berner94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ButlerF94, author = {James R. Butler and Karen A. Forcht}, title = {The Clipper Chip and the Price of Security in America}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {9--12}, year = {1994}, url = {https://doi.org/10.1108/09685229410072582}, doi = {10.1108/09685229410072582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ButlerF94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Caelli94, author = {William J. Caelli}, title = {Security in Open and Distributed Systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {18--24}, year = {1994}, url = {https://doi.org/10.1108/09685229410058759}, doi = {10.1108/09685229410058759}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Caelli94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/EbbsR94, author = {Geoffrey Ebbs and Howard Rheingold}, title = {Censorship on the Information Highway}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {30--31}, year = {1994}, url = {https://doi.org/10.1108/09685229410068244}, doi = {10.1108/09685229410068244}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/EbbsR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Edwards94, author = {Bruce Edwards}, title = {Developing a Successful Network Disaster Recovery Plan}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {37--42}, year = {1994}, url = {https://doi.org/10.1108/09685229410066200}, doi = {10.1108/09685229410066200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Edwards94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fink94, author = {Dieter Fink}, title = {A Security Framework for Information Systems Outsourcing}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {3--8}, year = {1994}, url = {https://doi.org/10.1108/09685229410068235}, doi = {10.1108/09685229410068235}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fink94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald94, author = {Kevin J. Fitzgerald}, title = {The Importance of a Network Disaster Recovery Plan}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {41--43}, year = {1994}, url = {https://doi.org/10.1108/09685229410058786}, doi = {10.1108/09685229410058786}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Fitzgerald94a, author = {Kevin J. Fitzgerald}, title = {Establishing Security in a Multi-platform, Multi-vendor Enterprise-wide {IT} Environment}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {9--15}, year = {1994}, url = {https://doi.org/10.1108/09685229410068226}, doi = {10.1108/09685229410068226}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Fitzgerald94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FletcherD94, author = {Keith Fletcher and Mark Donaghy}, title = {The Role of Competitor Information Systems}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {4--18}, year = {1994}, url = {https://doi.org/10.1108/09685229410792952}, doi = {10.1108/09685229410792952}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FletcherD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtO94, author = {Karen A. Forcht and Morey Oare}, title = {The Information Highway: The Interstate Highway System for Computer Networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {4--8}, year = {1994}, url = {https://doi.org/10.1108/09685229410072573}, doi = {10.1108/09685229410072573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtT94, author = {Karen A. Forcht and Daphyne Saunders Thomas}, title = {Information Compilation and Disbursement: Moral, Legal and Ethical Considerations}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {23--28}, year = {1994}, url = {https://doi.org/10.1108/09685229410059550}, doi = {10.1108/09685229410059550}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ForchtT94a, author = {Karen A. Forcht and Yuan{-}Wen Aven Tsai}, title = {Security and Network Management: Changes in the Way We Work}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {35--41}, year = {1994}, url = {https://doi.org/10.1108/09685229410068190}, doi = {10.1108/09685229410068190}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ForchtT94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Geary94, author = {James M. Geary}, title = {Executive Liability for Computer Crime and How to Prevent It}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {29--31}, year = {1994}, url = {https://doi.org/10.1108/09685229410059569}, doi = {10.1108/09685229410059569}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Geary94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Gluck94, author = {Fredric B. Gluck}, title = {Protection of Electronic Mail and Electronic Messages: Challenges and Solutions}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {28--40}, year = {1994}, url = {https://doi.org/10.1108/09685229410058777}, doi = {10.1108/09685229410058777}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Gluck94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hains94, author = {David Hains}, title = {Authentication: {A} Prominent Issue for Data Communications}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {25--27}, year = {1994}, url = {https://doi.org/10.1108/09685229410058768}, doi = {10.1108/09685229410058768}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hains94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Hains94a, author = {David Hains}, title = {{EDI} Security Issues Can Be Overcome}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {46}, year = {1994}, url = {https://doi.org/10.1108/09685229410066219}, doi = {10.1108/09685229410066219}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Hains94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Johannessen94, author = {Jon{-}Arild Johannessen}, title = {Information Technology and Innovation: Identifying Critical Innovation Factors}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {4--9}, year = {1994}, url = {https://doi.org/10.1108/09685229410059532}, doi = {10.1108/09685229410059532}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Johannessen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JohannessenK94, author = {Jon{-}Arild Johannessen and Lars Kolvereid}, title = {Information Search Behaviour during Business Gestation}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {31--41}, year = {1994}, url = {https://doi.org/10.1108/09685229410072609}, doi = {10.1108/09685229410072609}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JohannessenK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Karake94, author = {Zeinab A. Karake}, title = {A Study of Information Technology Structure: Firm Ownership and Managerial Characteristics}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {5}, pages = {21--30}, year = {1994}, url = {https://doi.org/10.1108/09685229410072591}, doi = {10.1108/09685229410072591}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Karake94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Macdonald94, author = {K. Hugh Macdonald}, title = {Organisational Transformation and Alignment: Misalignment as an Impediment to Progress in Organisational Development}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {4}, pages = {16--29}, year = {1994}, url = {https://doi.org/10.1108/09685229410068217}, doi = {10.1108/09685229410068217}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Macdonald94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MaduK94, author = {Christian N. Madu and Chu{-}hua Kuei}, title = {Optimum Information Technology for Socioeconomic Development}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {4--11}, year = {1994}, url = {https://doi.org/10.1108/09685229410058731}, doi = {10.1108/09685229410058731}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MaduK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RogersonF94, author = {Simon Rogerson and Christine Fidler}, title = {Strategic Information Systems Planning: Its Adoption and Use}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {1}, pages = {12--17}, year = {1994}, url = {https://doi.org/10.1108/09685229410058740}, doi = {10.1108/09685229410058740}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RogersonF94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SouthernM94, author = {G. Southern and Allistair U. Murray}, title = {Quality Information Management: The Way to a Better Company Culture}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {32--35}, year = {1994}, url = {https://doi.org/10.1108/09685229410059578}, doi = {10.1108/09685229410059578}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SouthernM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Weiss94, author = {Kenneth P. Weiss}, title = {To Serve and Protect: Reconciling Information Protection with {LAN} Environments}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {19--25}, year = {1994}, url = {https://doi.org/10.1108/09685229410792934}, doi = {10.1108/09685229410792934}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Weiss94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Weiss94a, author = {Kenneth P. Weiss}, title = {New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {43--45}, year = {1994}, url = {https://doi.org/10.1108/09685229410792943}, doi = {10.1108/09685229410792943}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Weiss94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/White94, author = {Stewart White}, title = {The Data Network Disaster Recovery Plan: Considerations and Concerns}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {3}, pages = {29--36}, year = {1994}, url = {https://doi.org/10.1108/09685229410066192}, doi = {10.1108/09685229410066192}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/White94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Zeffane94, author = {Rachid M. Zeffane}, title = {Computer Usage and Job Satisfaction: An Empirical Exploration}, journal = {Inf. Manag. Comput. Secur.}, volume = {2}, number = {2}, pages = {10--22}, year = {1994}, url = {https://doi.org/10.1108/09685229410059541}, doi = {10.1108/09685229410059541}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Zeffane94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.