Journals in DBLP
Jintae Lee , Younghwa Lee A holistic model of computer abuse within organizations. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:2, pp:57-63 [Journal ] Alan D. Smith , William T. Rupp Application service providers (ASP): moving downstream to enhance competitive advantage. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:2, pp:64-72 [Journal ] Huong Ngo Higgins Auditing disclosure risks of on-line broker-dealers. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:2, pp:73-76 [Journal ] S. E. Kruck , Danny Gottovi , Farideh Moghadami , Ralph Broom , Karen A. Forcht Protecting personal privacy on the Internet. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:2, pp:77-84 [Journal ] Someswar Kesh , Sridhar P. Nerur , Sam Ramanujan Quality of service - technology and implementation. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:2, pp:85-91 [Journal ]