default search action
David Davies
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j51]Jacqueline Tunnecliff, John Weiner, James E. Gaida, Jennifer L. Keating, Prue Morgan, Dragan Ilic, Lyn Clearihan, David Davies, Sivalal Sadasivan, Patitapaban Mohanty, Shankar Ganesh, John Reynolds, Stephen Maloney:
Translating evidence to practice in the health professions: a randomized trial of Twitter vs Facebook. J. Am. Medical Informatics Assoc. 24(2): 403-408 (2017) - 2015
- [c2]Sarah N. Lim Choi Keung, Bolanle Ola, David Davies, Martin Rowland, Theodoros N. Arvanitis:
West Midlands Health Informatics Network: A Perspective on Education and Training Needs. ICIMTH 2015: 103-106 - 2011
- [c1]Andrzej A. Kononowicz, Nabil Zary, David Davies, Jörn Heid, Luke Woodham, Inga Hege:
Push and Pull Models to Manage Patient Consent and Licensing of Multimedia Resources in Digital Repositories for Case-Based Reasoning. MIE 2011: 203-207
2000 – 2009
- 2005
- [j50]David Davies:
Crisis management: combating the denial syndrome. Comput. Law Secur. Rev. 21(1): 68-73 (2005) - 2002
- [j49]David Davies:
World Trade Center Lessons: Risk Management Lessons from the World Trade Center. Comput. Law Secur. Rev. 18(2): 117-119 (2002) - [j48]David Davies:
People Management - Corporate Bullying. Comput. Law Secur. Rev. 18(4): 269-271 (2002) - [j47]David Davies:
Risk Management - Protecting Reputation: Reputation Risk Management - The Holistic Approach. Comput. Law Secur. Rev. 18(6): 414-420 (2002) - 2001
- [j46]David Davies:
LSE - Corporate Governance: Turnbull - a year on. Comput. Law Secur. Rev. 17(4): 250-251 (2001) - 2000
- [j45]Sally Tweddle, Carolyn James, Harry Daniels, David Davies, Peter Harvey, Nicholas James, J. Mossman, E. Woolf:
Use of a Web site for learning about cancer. Comput. Educ. 35(4): 309-325 (2000)
1990 – 1999
- 1999
- [j44]David Davies:
Insurance and the Y2K risk. Comput. Law Secur. Rev. 15(4): 254-256 (1999) - 1997
- [j43]David Davies, Aon Bain Hogg:
Risk management: Holistic risk management. Comput. Law Secur. Rev. 13(5): 336-339 (1997) - 1994
- [j42]David Davies:
Managing crisis - a live simulation. Comput. Law Secur. Rev. 10(2): 108 (1994) - [j41]David Davies:
Computer insurance. Comput. Law Secur. Rev. 10(6): 313-316 (1994) - 1992
- [j40]David Davies:
Anatomy of a disaster: The sixth in a series by David Davies. Comput. Law Secur. Rev. 8(2): 84-85 (1992) - 1991
- [j39]David Davies:
A review of the new Lloyds electronic and computer crime policy. Comput. Law Secur. Rev. 7(2): 82 (1991) - [j38]David Davies:
The nature of computer dependency risks. Comput. Law Secur. Rev. 7(4): 161-164 (1991) - 1990
- [j37]David Davies:
Computer risk management. Comput. Law Secur. Rev. 5(6): 2-7 (1990) - [j36]David Davies:
Virus management. Comput. Law Secur. Rev. 5(6): 8-12 (1990) - [j35]David Davies:
The computer health risk. Comput. Law Secur. Rev. 6(4): 17-19 (1990) - [j34]David Davies:
Insuring computer virus. Comput. Law Secur. Rev. 6(4): 20-21 (1990)
1980 – 1989
- 1989
- [j33]David Davies:
Dramatic review: "The hacker and the malevolent employee"; performed at COMPSEC '88. Comput. Law Secur. Rev. 4(5): 8 (1989) - [j32]David Davies:
Continuing the series by David Davies Part IV: Why have a strategy. Comput. Law Secur. Rev. 4(5): 15-17 (1989) - [j31]David Davies:
Computer losses in 1988 - A review. Comput. Law Secur. Rev. 5(1): 2-5 (1989) - [j30]David Davies:
The computer virus crisis: written by Philip Fites, Peter Johnston and Martin Kratz. (Published by Van Nostrand Reinhold inc. Available through Chapman and Hall Publishers, London. pp. 171). £13.95. ISBN 0-442-28532-9. Comput. Law Secur. Rev. 5(2): 8 (1989) - [j29]David Davies:
The people risks, RAF Brampton 24th May 1989. Comput. Law Secur. Rev. 5(3): 22-25 (1989) - [j28]David Davies:
The people risks the creation of a corporate security policy. Comput. Law Secur. Rev. 5(4): 24-25 (1989) - 1988
- [j27]David Davies:
Risk management. Comput. Law Secur. Rev. 3(6): 35-36 (1988) - [j26]David Davies:
Computer abuse. Comput. Law Secur. Rev. 4(1): 2-4 (1988) - [j25]David Davies:
Risk management. Comput. Law Secur. Rev. 4(1): 13-18 (1988) - [j24]David Davies:
"The computer" - The changing risk. Comput. Law Secur. Rev. 4(2): 27-28 (1988) - [j23]David Davies:
Anatomy of a disaster. Comput. Law Secur. Rev. 4(2): 28 (1988) - [j22]David Davies:
Lloyds Cash Management Systems (CMS) cover. Comput. Law Secur. Rev. 4(2): 37 (1988) - [j21]David Davies:
Successful uses of technology in business. Comput. Law Secur. Rev. 4(2): 41-43 (1988) - [j20]David Davies:
The fourth in a series of reports by David Davies analysing the experiences of those involved in a computer disaster. Comput. Law Secur. Rev. 4(4): 2-4 (1988) - [j19]David Davies:
High technology risks - The limitations of insurance. Comput. Law Secur. Rev. 4(4): 32-33 (1988) - 1987
- [j18]David Davies:
Risk management. Comput. Law Secur. Rev. 2(6): 14-16 (1987) - [j17]David Davies:
Anatomy of a disaster. Comput. Law Secur. Rev. 3(3): 13-14 (1987) - [j16]David Davies:
Security focus. Comput. Law Secur. Rev. 3(3): 35-36 (1987) - [j15]David Davies:
It can't happen to us: A selection of recent computing losses. Comput. Law Secur. Rev. 3(3): 36-37 (1987) - [j14]David Davies:
Protection against director's failure. Comput. Law Secur. Rev. 3(4): 37 (1987) - [j13]David Davies:
The consumer protection act British computer society, 24 September 1987. Comput. Law Secur. Rev. 3(4): 38-40 (1987) - 1986
- [j12]David Davies:
The Wigglesworth press conference: Much ADO about nothing. Comput. Law Secur. Rev. 1(5): 7-8 (1986) - [j11]David Davies:
Data protection corner. Comput. Law Secur. Rev. 1(5): 9-11 (1986) - [j10]David Davies:
It won't happen to us. Comput. Law Secur. Rev. 1(5): 11-12 (1986) - [j9]David Davies:
Special report on ATM fraud down under. Comput. Law Secur. Rev. 1(5): 19-24 (1986) - [j8]David Davies:
Computer insurance: - Its contribution to risk management. Comput. Law Secur. Rev. 1(6): 13-15 (1986) - [j7]David Davies:
Conference report. Comput. Law Secur. Rev. 1(6): 22 (1986) - [j6]David Davies:
Professional indemnity insurance: A new nightmare for the professions. Comput. Law Secur. Rev. 2(2): 8-10 (1986) - [j5]David Davies:
Computer insurance: Part III - Consequential loss. Comput. Law Secur. Rev. 2(2): 10-12 (1986) - [j4]David Davies:
The Nature of computer crime - a risk management perspective. Comput. Law Secur. Rev. 2(3): 20-21 (1986) - [j3]David Davies:
New highlights. Comput. Law Secur. Rev. 2(3): 26-32 (1986) - 1985
- [j2]David Davies:
How to recognise the risks and avoid the ten most common mistakes. Comput. Law Secur. Rev. 1(1): 8-10 (1985) - [j1]David Davies:
Report on consumer products. Comput. Law Secur. Rev. 1(4): 19-21 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint