The SCEAS System
Navigation Menu

Search the dblp DataBase


Donn B. Parker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Donn B. Parker
    Computer and Data Abuse. [Citation Graph (0, 0)][DBLP]
    ACM Pacific, 1975, pp:185-187 [Conf]
  2. Donn B. Parker
    Restating the Foundation of Information Security. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:139-151 [Conf]
  3. Peter J. Denning, Donn B. Parker, Susan H. Nycum, Willis H. Ware
    Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1984, v:27, n:4, pp:312-321 [Journal]
  4. Donn B. Parker
    Rules of ethics in information processing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1968, v:11, n:3, pp:198-201 [Journal]
  5. Donn B. Parker
    Vulnerabilities of EFTs to Intentionally Caused Losses. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1979, v:22, n:12, pp:654-660 [Journal]
  6. Donn B. Parker
    Risks of risk-based security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:3, pp:120- [Journal]
  7. Donn B. Parker
    The strategic values of information security in business. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:7, pp:572-582 [Journal]

  8. Making computers safer. [Citation Graph (, )][DBLP]

  9. Computer abuse perpetrators and vulnerabilities of computer systems. [Citation Graph (, )][DBLP]

  10. Certification of computing personnel: prospects and potential impact. [Citation Graph (, )][DBLP]

  11. The Dark Side of Computing: SRI International and the Study of Computer Crime. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002