Journals in DBLP
Eddie W. L. Cheng , Heng Li Information priority-setting for better resource allocation using analytic hierarchy process (AHP). [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:61-70 [Journal ] Stefanos Gritzalis , Dimitris Gritzalis A digital seal solution for deploying trust on commercial transactions. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:71-79 [Journal ] David C. Yen , David C. Chou Intranets for organizational innovation. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:80-87 [Journal ] Gayle Webb White , Sheila J. Pearson Controlling corporate e-mail, PC use and computer security. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:88-92 [Journal ] Steven Furnell , Pelagia Chiliarchaki , Paul Dowland Security analysers: administrator assistants or hacker helpers? [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:93-101 [Journal ]