Search dblp for Publications

export results for "toc:db/journals/imcs/imcs8.bht:"

 download as .bib file

@article{DBLP:journals/imcs/Attaran00,
  author       = {Mohsen Attaran},
  title        = {Voice recognition software programs: are they right for you?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {42--44},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312524},
  doi          = {10.1108/09685220010312524},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Attaran00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Attaran00a,
  author       = {Mohsen Attaran},
  title        = {Managing legal liability of the Net: a ten step guide for {IT} managers},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {98--100},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010321335},
  doi          = {10.1108/09685220010321335},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Attaran00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Chow00,
  author       = {Wing S. Chow},
  title        = {Success factors for {IS} disaster recovery planning in Hong Kong},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {80--87},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010321326},
  doi          = {10.1108/09685220010321326},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Chow00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DhillonC00,
  author       = {Gurpreet Dhillon and
                  M{\'{a}}rio M. Caldeira},
  title        = {Interpreting the adoption and use of {EDI} in the Portuguese clothing
                  and textile industry},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {184--188},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010344934},
  doi          = {10.1108/09685220010344934},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DhillonC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FooH00,
  author       = {Schubert Foo and
                  Mark Hepworth},
  title        = {The implementation of an electronic survey tool to help determine
                  the information needs of a knowledge-based organization},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {53--64},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010694008},
  doi          = {10.1108/09685220010694008},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FooH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Forcht00,
  author       = {Karen A. Forcht},
  title        = {Security-related concerns with geographic information systems and
                  geographic mapping},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {218--221},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353141},
  doi          = {10.1108/09685220010353141},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Forcht00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FurnellD00,
  author       = {Steven Furnell and
                  Paul Dowland},
  title        = {A conceptual architecture for real-time intrusion monitoring},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {65--75},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010321317},
  doi          = {10.1108/09685220010321317},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FurnellD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GritzalisIO00,
  author       = {Stefanos Gritzalis and
                  John Iliadis and
                  Spyros Oikonomopoulos},
  title        = {Distributed component software security issues on deploying a secure
                  electronic marketplace},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {5--13},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312290},
  doi          = {10.1108/09685220010312290},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GritzalisIO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HawkinsYC00,
  author       = {Steve Hawkins and
                  David C. Yen and
                  David C. Chou},
  title        = {Awareness and challenges of Internet security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {131--143},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010372564},
  doi          = {10.1108/09685220010372564},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HawkinsYC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HawkinsYC00a,
  author       = {Steve M. Hawkins and
                  David C. Yen and
                  David C. Chou},
  title        = {Disaster recovery planning: a strategy for data security},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {222--230},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353150},
  doi          = {10.1108/09685220010353150},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HawkinsYC00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HelmsEM00,
  author       = {Marilyn M. Helms and
                  Lawrence P. Ettkin and
                  Daniel J. Morris},
  title        = {Shielding your company against information compromise},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {117--130},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010339228},
  doi          = {10.1108/09685220010339228},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HelmsEM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JanczewskiP00,
  author       = {Lech J. Janczewski and
                  Victor Portougal},
  title        = {"Need-to-know" principle and fuzzy security clearances modelling},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {210--217},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010356247},
  doi          = {10.1108/09685220010356247},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/JanczewskiP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KimO00,
  author       = {Bowon Kim and
                  Heungshik Oh},
  title        = {An exploratory inquiry into the perceived effectiveness of a global
                  information system},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {144--154},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010372573},
  doi          = {10.1108/09685220010372573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KimO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Kodama00,
  author       = {Mitsuru Kodama},
  title        = {New regional community creation through video-based information networks
                  - a case study of regional vitalization through the promotion of information
                  technology in Japan},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {87--97},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010324459},
  doi          = {10.1108/09685220010324459},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Kodama00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KokolakisDK00,
  author       = {Spyros Kokolakis and
                  A. J. Demopoulos and
                  Evangelos A. Kiountouzis},
  title        = {The use of business process modelling in information systems security
                  analysis and design},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {107--116},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010339192},
  doi          = {10.1108/09685220010339192},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KokolakisDK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LabuschagneE00,
  author       = {Les Labuschagne and
                  Jan H. P. Eloff},
  title        = {Electronic commerce: the information-security challenge},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {154--157},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010372582},
  doi          = {10.1108/09685220010372582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LabuschagneE00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Lambrinoudakis00,
  author       = {Costas Lambrinoudakis},
  title        = {Smart card technology for deploying a secure information management
                  framework},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {173--183},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010344925},
  doi          = {10.1108/09685220010344925},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Lambrinoudakis00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LankfordJ00,
  author       = {William M. Lankford and
                  Jack E. Johnson},
  title        = {{EDI} via the Internet},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {27--30},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312353},
  doi          = {10.1108/09685220010312353},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LankfordJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Maguire00,
  author       = {Stuart Maguire},
  title        = {Towards a "business-led" approach to information systems development},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {230--238},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353187},
  doi          = {10.1108/09685220010353187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Maguire00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MetaxiotisS00,
  author       = {Kostas S. Metaxiotis and
                  Emanuel Samouilidis},
  title        = {Expert systems in medicine: academic illusion or real power?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {75--79},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010694017},
  doi          = {10.1108/09685220010694017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MetaxiotisS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MorrisEH00,
  author       = {Daniel J. Morris and
                  Lawrence P. Ettkin and
                  Marilyn M. Helms},
  title        = {Issues in the illegal transference of {US} information technologies},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {164--173},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010344916},
  doi          = {10.1108/09685220010344916},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MorrisEH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PhukanD00,
  author       = {Sanjeev Phukan and
                  Gurpreet Dhillon},
  title        = {Ethics and information technology use: a survey of {US} based SMEs},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {239--243},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353907},
  doi          = {10.1108/09685220010353907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PhukanD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RahimRS00,
  author       = {Md. Mahbubur Rahim and
                  Mohd. Noah Abd. Rahman and
                  Afzaal H. Seyal},
  title        = {Software piracy among academics: an empirical study in Brunei Darussalam},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {14--26},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010312326},
  doi          = {10.1108/09685220010312326},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RahimRS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Siponen00,
  author       = {Mikko T. Siponen},
  title        = {A conceptual foundation for organizational information security awareness},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {31--41},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010371394},
  doi          = {10.1108/09685220010371394},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Siponen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Siponen00a,
  author       = {Mikko T. Siponen},
  title        = {Critical analysis of different approaches to minimizing user-related
                  faults in information systems security: implications for research
                  and practice},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {197--209},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353178},
  doi          = {10.1108/09685220010353178},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Siponen00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Turega00,
  author       = {Mike Turega},
  title        = {Issues with information dissemination on global networks},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {244--248},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353169},
  doi          = {10.1108/09685220010353169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Turega00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics