-
2
-
-
0001156375
-
Managing computer crime: A research outlook
-
J. Backhouse, G. Dhillon, Managing computer crime: A research outlook, Computers & Security 14 (1995), pp. 645-651.
-
(1995)
Computers & Security
, vol.14
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
3
-
-
0347230581
-
Surveys by e-mail and Internet
-
J. Chisholm, Surveys by e-mail and Internet, UNIX Review 13 (1995), pp. 11-16.
-
(1995)
UNIX Review
, vol.13
, pp. 11-16
-
-
Chisholm, J.1
-
4
-
-
0030674941
-
Information system defences: A preliminary classification scheme
-
F. Cohen, Information system defences: A preliminary classification scheme, Computers & Security 16 (1997), pp. 94-114.
-
(1997)
Computers & Security
, vol.16
, pp. 94-114
-
-
Cohen, F.1
-
5
-
-
0041809969
-
Several products seek virus before users open their mail
-
November
-
B. Cole-Gomolski, Several products seek virus before users open their mail, ComputerWorld, 24, November 1997.
-
(1997)
ComputerWorld
, vol.24
-
-
Cole-Gomolski, B.1
-
6
-
-
33845945922
-
Coefficient alpha and the internal structure of tests
-
L.J. Cronbach, Coefficient alpha and the internal structure of tests, Psychometrica 16 (1951), pp. 297-334.
-
(1951)
Psychometrica
, vol.16
, pp. 297-334
-
-
Cronbach, L.J.1
-
7
-
-
0029776165
-
The new face of the virus threat
-
J. David, The new face of the virus threat, Computers & Security 15 (1996), pp. 13-16.
-
(1996)
Computers & Security
, vol.15
, pp. 13-16
-
-
David, J.1
-
8
-
-
85037497600
-
Networks need defense against hacker attacks
-
24 November
-
L. DiDio, Networks need defense against hacker attacks, Computerworld, 24 November 1997.
-
(1997)
Computerworld
-
-
Didio, L.1
-
9
-
-
0347882116
-
IBM Devises Technology to disinfect computer bugs
-
December 15
-
L. DiDio, IBM Devises Technology to disinfect computer bugs, Computerworld, December 15, 1997.
-
(1997)
Computerworld
-
-
Didio, L.1
-
11
-
-
0031361365
-
A history of computer viruses - Introduction
-
H.J. Highland, A history of computer viruses - Introduction, Computers & Security 16 (1997), pp. 412-415.
-
(1997)
Computers & Security
, vol.16
, pp. 412-415
-
-
Highland, H.J.1
-
12
-
-
0032289222
-
Electronic Internet business and security
-
G. Kovacich, Electronic Internet business and security, Computers & Security 17 (1998), pp. 129-135.
-
(1998)
Computers & Security
, vol.17
, pp. 129-135
-
-
Kovacich, G.1
-
13
-
-
0032305248
-
The ten commandments of security
-
O. Lau, The ten commandments of security, Computers & Security 17 (1998), pp. 119-123.
-
(1998)
Computers & Security
, vol.17
, pp. 119-123
-
-
Lau, O.1
-
14
-
-
0040421671
-
The link between information strategy and electronic commerce
-
A.L. Lederer, D.A. Mirchandani, K. Sims, The link between information strategy and electronic commerce, Journal of Organizational Computing and Electronic Commerce 7 (1997), pp. 17-34.
-
(1997)
Journal of Organizational Computing and Electronic Commerce
, vol.7
, pp. 17-34
-
-
Lederer, A.L.1
Mirchandani, D.A.2
Sims, K.3
-
16
-
-
0008562678
-
Self-mutilating viruses create strain
-
9 September
-
S. Machlis, Self-mutilating viruses create strain, Computer-world, 9 September 1997.
-
(1997)
Computer-world
-
-
Machlis, S.1
-
17
-
-
0028423601
-
High-level language computer viruses - A new threat?
-
S. Magruder, High-level language computer viruses - A new threat?, Computers & Security 13 (1994), pp. 263-269.
-
(1994)
Computers & Security
, vol.13
, pp. 263-269
-
-
Magruder, S.1
-
18
-
-
0041809970
-
Viruses Growing out of Control
-
Canada, July
-
G. Meckbach, Viruses Growing out of Control, Computing Canada, July 1997.
-
(1997)
Computing
-
-
Meckbach, G.1
-
19
-
-
0041309303
-
Build your own immunity to viruses over the Net
-
4 September
-
G. Moody, Build your own immunity to viruses over the Net, Computer Weekly, 4 September 1997.
-
(1997)
Computer Weekly
-
-
Moody, G.1
-
20
-
-
0030736223
-
Computer virus-antivirus coevolution
-
C. Nachenberg, Computer virus-antivirus coevolution, Communications of the ACM 40(1) (1997), pp. 46-51.
-
(1997)
Communications of the ACM
, vol.40
, Issue.1
, pp. 46-51
-
-
Nachenberg, C.1
-
21
-
-
0002912291
-
E-Mail surveys potentials and pitfalls
-
M. Opperman, E-Mail surveys potentials and pitfalls, Marketing Research 7(3) (1995), pp. 29-33.
-
(1995)
Marketing Research
, vol.7
, Issue.3
, pp. 29-33
-
-
Opperman, M.1
-
22
-
-
0031332150
-
The strategic values of information security in business
-
D.B. Parker, The strategic values of information security in business, Computers & Security 16 (1997), pp. 572-582.
-
(1997)
Computers & Security
, vol.16
, pp. 572-582
-
-
Parker, D.B.1
-
23
-
-
0002344077
-
Reliability: A review of psychometric basics and recent marketing practices
-
J.P. Peter, Reliability: A review of psychometric basics and recent marketing practices, Journal of Marketing Research 16 (1979), pp. 6-17.
-
(1979)
Journal of Marketing Research
, vol.16
, pp. 6-17
-
-
Peter, J.P.1
-
24
-
-
0042811867
-
Hackers prey on AOL users with array of dirty tricks
-
5 January
-
J. Sandberg, Hackers prey on AOL users with array of dirty tricks, Wall Street Journal, 5 January 1998.
-
(1998)
Wall Street Journal
-
-
Sandberg, J.1
-
25
-
-
0041809967
-
The virus authors strike back
-
A. Solomon, The virus authors strike back, Computers & Security 11 (1992), pp. 602-606.
-
(1992)
Computers & Security
, vol.11
, pp. 602-606
-
-
Solomon, A.1
-
26
-
-
0030684254
-
A management view of Internet electronic commerce security
-
C.C. Wood, A management view of Internet electronic commerce security, Computers & Security 16 (1997), pp. 316-320.
-
(1997)
Computers & Security
, vol.16
, pp. 316-320
-
-
Wood, C.C.1
-
27
-
-
0026834810
-
Computer viral risks - How bad is the threat?
-
B.P. Zajac, Computer viral risks - How bad is the threat?, Computers & Security 11 (1992), pp. 29-34.
-
(1992)
Computers & Security
, vol.11
, pp. 29-34
-
-
Zajac, B.P.1
|