Journals in DBLP
Joseph S. Sherif , David P. Gilliam Deployment of anti-virus software: a case study. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:5-10 [Journal ] Alan D. Smith , William T. Rupp Application service providers: an application of the transaction cost model. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:11-18 [Journal ] Mayur S. Desai , Thomas C. Richards , Kiran J. Desai E-commerce policies and customer privacy. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:19-27 [Journal ] Fritz H. Grupe Information systems professionals and conflict of interest. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:28-32 [Journal ] Nasser Abouzakhar , Gordon A. Manson Networks security measures using neuro-fuzzy agents. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:33-38 [Journal ] Yun E. Zeng , H. Joseph Wen , David C. Yen Customer relationship management (CRM) in business-to-business (B2B) e-commerce. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:39-44 [Journal ]