The SCEAS System
Navigation Menu

Journals in DBLP

Inf. Manag. Comput. Security
2000, volume: 8, number: 5

  1. Mikko T. Siponen
    Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:197-209 [Journal]
  2. Lech J. Janczewski, Victor Portougal
    "Need-to-know" principle and fuzzy security clearances modelling. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:210-217 [Journal]
  3. Karen A. Forcht
    Security-related concerns with geographic information systems and geographic mapping. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:218-221 [Journal]
  4. Steve M. Hawkins, David C. Yen, David C. Chou
    Disaster recovery planning: a strategy for data security. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:222-230 [Journal]
  5. Stuart Maguire
    Towards a "business-led" approach to information systems development. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:230-238 [Journal]
  6. Sanjeev Phukan, Gurpreet Dhillon
    Ethics and information technology use: a survey of US based SMEs. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:239-243 [Journal]
  7. Mike Turega
    Issues with information dissemination on global networks. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:244-248 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002