The SCEAS System
Navigation Menu

Journals in DBLP

Inf. Manag. Comput. Security
1993, volume: 1, number: 4

  1. Mark Gabbott, Ewan Sutherland
    Studying Potential Customers: The Applications of Marketing Information Systems in University Recruitment. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
  2. David Hains
    Computer Security as a Liability Control Tool. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
  3. H. James, Roger A. Coldwell
    Corporate Security: An Australian Ostrich. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
  4. Jon-Arild Johannessen, Johan Olaisen
    Information, Communication and Innovation: Identifying Critical Innovation Factors (CIF). [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
  5. Tom Newman
    Information Loss Rarely Recovered. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
  6. Pat Williams Moore
    BMS CAT in Action: Electronic/Communications Recovery at the World Trade Centre, New York. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
  7. Kenneth P. Weiss
    Data Integrity and Security: Who's in Charge Here Anyway? [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:4, pp:- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002