Mark Gabbott, Ewan Sutherland Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
David Hains Computer Security as a Liability Control Tool. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
Pat Williams Moore BMS CAT in Action: Electronic/Communications Recovery at the World Trade Centre, New York. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
Kenneth P. Weiss Data Integrity and Security: Who's in Charge Here Anyway? [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP