Jack Bologna A framework for the ethical analysis of information technologies. [Citation Graph (0, 0)][DBLP] Computers & Security, 1991, v:10, n:4, pp:303-307 [Journal]
Avi Rushinek, Sara F. Rushinek Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security. [Citation Graph (0, 0)][DBLP] Computers & Security, 1991, v:10, n:4, pp:345-357 [Journal]