Journals in DBLP
Spyros Kokolakis , A. J. Demopoulos , Evangelos A. Kiountouzis The use of business process modelling in information systems security analysis and design. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:107-116 [Journal ] Marilyn M. Helms , Lawrence P. Ettkin , Daniel J. Morris Shielding your company against information compromise. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:117-130 [Journal ] Steve Hawkins , David C. Yen , David C. Chou Awareness and challenges of Internet security. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:131-143 [Journal ] Bowon Kim , Heungshik Oh An exploratory inquiry into the perceived effectiveness of a global information system. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:144-154 [Journal ] Les Labuschagne , Jan H. P. Eloff Electronic commerce: the information-security challenge. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:154-157 [Journal ]