메뉴 건너뛰기




Volumn 7, Issue 3-4, 1999, Pages 171-175

Managing and controlling computer misuse

Author keywords

Computer fraud; Computer security; Loss prevention

Indexed keywords


EID: 0007551808     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685229910292664     Document Type: Article
Times cited : (80)

References (17)
  • 3
    • 5844393611 scopus 로고    scopus 로고
    • Dial F for Fraud
    • 7 March
    • Computing (1996), "Dial F for Fraud", Computing, 7 March.
    • (1996) Computing
  • 5
    • 5844331504 scopus 로고    scopus 로고
    • Computer crime: Interpreting violation of safeguards by trusted personnel
    • Khosrowpour, M. (Ed), Idea Group Publishing, Hershey
    • Dhillon, G. (1999), "Computer crime: interpreting violation of safeguards by trusted personnel", in Khosrowpour, M. (Ed), Managing Information Technology Resources in Organizations in the Next Millennium, Idea Group Publishing, Hershey, pp. 602-6.
    • (1999) Managing Information Technology Resources in Organizations in the next Millennium , pp. 602-606
    • Dhillon, G.1
  • 7
    • 5844402139 scopus 로고    scopus 로고
    • 4 accused in high-tech gas pump scam
    • 9 October
    • Ismael, K. (1998), "4 accused in high-tech gas pump scam", Los Angeles Times, 9 October.
    • (1998) Los Angeles Times
    • Ismael, K.1
  • 8
    • 0042565724 scopus 로고
    • Local area network operations: A security, control and audit perspective
    • Jamieson, R. and Low, G. (1990), "Local area network operations: a security, control and audit perspective", Journal of Information Technology, Vol. 5, pp. 63-2.
    • (1990) Journal of Information Technology , vol.5 , pp. 63-72
    • Jamieson, R.1    Low, G.2
  • 9
    • 5844419589 scopus 로고    scopus 로고
    • Scots health records at risk following CSC systems fiasco
    • 25 July
    • Jones, R. (1996), "Scots health records at risk following CSC systems fiasco", Computing, 25 July, p. 1.
    • (1996) Computing , pp. 1
    • Jones, R.1
  • 10
    • 5844402421 scopus 로고    scopus 로고
    • The enemy within
    • 15 June
    • Knowles, A. (1996), "The enemy within", CIO Magazine, 15 June.
    • (1996) CIO Magazine
    • Knowles, A.1
  • 11
    • 5844402337 scopus 로고    scopus 로고
    • Threat to corporate computers is often enemy within
    • 2 March
    • Lewis, P. (1998), "Threat to corporate computers is often enemy within", New York Times, 2 March.
    • (1998) New York Times
    • Lewis, P.1
  • 12
    • 84937311421 scopus 로고
    • Wiseguys: Smarter criminals and smarter crime in the 21st century
    • Moore, R.H. Jr (1994), "Wiseguys: smarter criminals and smarter crime in the 21st century", Futurist, Vol. 28 No. 5, pp. 33-7.
    • (1994) Futurist , vol.28 , Issue.5 , pp. 33-37
    • Moore Jr., R.H.1
  • 13
    • 5844374508 scopus 로고
    • A treatise on hacker-busting
    • Open Computing (1995), "A treatise on hacker-busting", Open Computing, May, p. 104.
    • (1995) Open Computing , vol.MAY , pp. 104
  • 14
    • 0007473365 scopus 로고
    • Seventeen information security myths debunked
    • Dittrich, K. et al. (Eds), Elsevier Science Publishers, Amsterdam
    • Parker, D. (1991), "Seventeen information security myths debunked", in Dittrich, K. et al. (Eds), Computer Security and Information Integrity, Elsevier Science Publishers, Amsterdam, pp. 363-70.
    • (1991) Computer Security and Information Integrity , pp. 363-370
    • Parker, D.1
  • 16
    • 5844421389 scopus 로고
    • Asean - Computer Crime and Corrective Action: A Status Report
    • Gable, G.G. and Caelli, W.J. (Eds) Singapore, 27-29 May, Elsevier Science Publishers B.V., North Holland, Amsterdam
    • Soon, C.T. (1992), Asean - Computer Crime and Corrective Action: A Status Report, Eighth IFIP International Symposium on Computer Security, IFIP Sec'92, Gable, G.G. and Caelli, W.J. (Eds) Singapore, 27-29 May, Elsevier Science Publishers B.V., North Holland, Amsterdam, pp. 23-33.
    • (1992) Eighth IFIP International Symposium on Computer Security, IFIP Sec'92 , pp. 23-33
    • Soon, C.T.1
  • 17
    • 5844402140 scopus 로고
    • The high price of insecurity
    • 21 April
    • Yazel, L. (1994), "The high price of insecurity", Computing, 21 April, p. 23.
    • (1994) Computing , pp. 23
    • Yazel, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.