Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs8.bht:"
@article{DBLP:journals/imcs/Attaran00, author = {Mohsen Attaran}, title = {Voice recognition software programs: are they right for you?}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {42--44}, year = {2000}, url = {https://doi.org/10.1108/09685220010312524}, doi = {10.1108/09685220010312524}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Attaran00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Attaran00a, author = {Mohsen Attaran}, title = {Managing legal liability of the Net: a ten step guide for {IT} managers}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {98--100}, year = {2000}, url = {https://doi.org/10.1108/09685220010321335}, doi = {10.1108/09685220010321335}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Attaran00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Chow00, author = {Wing S. Chow}, title = {Success factors for {IS} disaster recovery planning in Hong Kong}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {80--87}, year = {2000}, url = {https://doi.org/10.1108/09685220010321326}, doi = {10.1108/09685220010321326}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Chow00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DhillonC00, author = {Gurpreet Dhillon and M{\'{a}}rio M. Caldeira}, title = {Interpreting the adoption and use of {EDI} in the Portuguese clothing and textile industry}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {4}, pages = {184--188}, year = {2000}, url = {https://doi.org/10.1108/09685220010344934}, doi = {10.1108/09685220010344934}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DhillonC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FooH00, author = {Schubert Foo and Mark Hepworth}, title = {The implementation of an electronic survey tool to help determine the information needs of a knowledge-based organization}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {53--64}, year = {2000}, url = {https://doi.org/10.1108/09685220010694008}, doi = {10.1108/09685220010694008}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FooH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Forcht00, author = {Karen A. Forcht}, title = {Security-related concerns with geographic information systems and geographic mapping}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {218--221}, year = {2000}, url = {https://doi.org/10.1108/09685220010353141}, doi = {10.1108/09685220010353141}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Forcht00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FurnellD00, author = {Steven Furnell and Paul Dowland}, title = {A conceptual architecture for real-time intrusion monitoring}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {65--75}, year = {2000}, url = {https://doi.org/10.1108/09685220010321317}, doi = {10.1108/09685220010321317}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FurnellD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GritzalisIO00, author = {Stefanos Gritzalis and John Iliadis and Spyros Oikonomopoulos}, title = {Distributed component software security issues on deploying a secure electronic marketplace}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {5--13}, year = {2000}, url = {https://doi.org/10.1108/09685220010312290}, doi = {10.1108/09685220010312290}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GritzalisIO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HawkinsYC00, author = {Steve Hawkins and David C. Yen and David C. Chou}, title = {Awareness and challenges of Internet security}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {131--143}, year = {2000}, url = {https://doi.org/10.1108/09685220010372564}, doi = {10.1108/09685220010372564}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HawkinsYC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HawkinsYC00a, author = {Steve M. Hawkins and David C. Yen and David C. Chou}, title = {Disaster recovery planning: a strategy for data security}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {222--230}, year = {2000}, url = {https://doi.org/10.1108/09685220010353150}, doi = {10.1108/09685220010353150}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HawkinsYC00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HelmsEM00, author = {Marilyn M. Helms and Lawrence P. Ettkin and Daniel J. Morris}, title = {Shielding your company against information compromise}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {117--130}, year = {2000}, url = {https://doi.org/10.1108/09685220010339228}, doi = {10.1108/09685220010339228}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HelmsEM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/JanczewskiP00, author = {Lech J. Janczewski and Victor Portougal}, title = {"Need-to-know" principle and fuzzy security clearances modelling}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {210--217}, year = {2000}, url = {https://doi.org/10.1108/09685220010356247}, doi = {10.1108/09685220010356247}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/JanczewskiP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KimO00, author = {Bowon Kim and Heungshik Oh}, title = {An exploratory inquiry into the perceived effectiveness of a global information system}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {144--154}, year = {2000}, url = {https://doi.org/10.1108/09685220010372573}, doi = {10.1108/09685220010372573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KimO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Kodama00, author = {Mitsuru Kodama}, title = {New regional community creation through video-based information networks - a case study of regional vitalization through the promotion of information technology in Japan}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {87--97}, year = {2000}, url = {https://doi.org/10.1108/09685220010324459}, doi = {10.1108/09685220010324459}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Kodama00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KokolakisDK00, author = {Spyros Kokolakis and A. J. Demopoulos and Evangelos A. Kiountouzis}, title = {The use of business process modelling in information systems security analysis and design}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {107--116}, year = {2000}, url = {https://doi.org/10.1108/09685220010339192}, doi = {10.1108/09685220010339192}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KokolakisDK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LabuschagneE00, author = {Les Labuschagne and Jan H. P. Eloff}, title = {Electronic commerce: the information-security challenge}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {3}, pages = {154--157}, year = {2000}, url = {https://doi.org/10.1108/09685220010372582}, doi = {10.1108/09685220010372582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LabuschagneE00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Lambrinoudakis00, author = {Costas Lambrinoudakis}, title = {Smart card technology for deploying a secure information management framework}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {4}, pages = {173--183}, year = {2000}, url = {https://doi.org/10.1108/09685220010344925}, doi = {10.1108/09685220010344925}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Lambrinoudakis00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LankfordJ00, author = {William M. Lankford and Jack E. Johnson}, title = {{EDI} via the Internet}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {27--30}, year = {2000}, url = {https://doi.org/10.1108/09685220010312353}, doi = {10.1108/09685220010312353}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LankfordJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Maguire00, author = {Stuart Maguire}, title = {Towards a "business-led" approach to information systems development}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {230--238}, year = {2000}, url = {https://doi.org/10.1108/09685220010353187}, doi = {10.1108/09685220010353187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Maguire00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MetaxiotisS00, author = {Kostas S. Metaxiotis and Emanuel Samouilidis}, title = {Expert systems in medicine: academic illusion or real power?}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {2}, pages = {75--79}, year = {2000}, url = {https://doi.org/10.1108/09685220010694017}, doi = {10.1108/09685220010694017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MetaxiotisS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MorrisEH00, author = {Daniel J. Morris and Lawrence P. Ettkin and Marilyn M. Helms}, title = {Issues in the illegal transference of {US} information technologies}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {4}, pages = {164--173}, year = {2000}, url = {https://doi.org/10.1108/09685220010344916}, doi = {10.1108/09685220010344916}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MorrisEH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PhukanD00, author = {Sanjeev Phukan and Gurpreet Dhillon}, title = {Ethics and information technology use: a survey of {US} based SMEs}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {239--243}, year = {2000}, url = {https://doi.org/10.1108/09685220010353907}, doi = {10.1108/09685220010353907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PhukanD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RahimRS00, author = {Md. Mahbubur Rahim and Mohd. Noah Abd. Rahman and Afzaal H. Seyal}, title = {Software piracy among academics: an empirical study in Brunei Darussalam}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {14--26}, year = {2000}, url = {https://doi.org/10.1108/09685220010312326}, doi = {10.1108/09685220010312326}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RahimRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Siponen00, author = {Mikko T. Siponen}, title = {A conceptual foundation for organizational information security awareness}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {31--41}, year = {2000}, url = {https://doi.org/10.1108/09685220010371394}, doi = {10.1108/09685220010371394}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Siponen00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Siponen00a, author = {Mikko T. Siponen}, title = {Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {197--209}, year = {2000}, url = {https://doi.org/10.1108/09685220010353178}, doi = {10.1108/09685220010353178}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Siponen00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Turega00, author = {Mike Turega}, title = {Issues with information dissemination on global networks}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {244--248}, year = {2000}, url = {https://doi.org/10.1108/09685220010353169}, doi = {10.1108/09685220010353169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Turega00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.