Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Accountability in Job Performance.. Information Systems Security, 3 (4): 16-20 (1995)Update on Cryptography: Who Will Keep the Keys?. Information Systems Security, 3 (3): 16-22 (1994)Possession as an Element of Information Security.. Information Systems Security, 4 (2): 19-26 (1995)Fighting computer crime - a new framework for protecting information.. Wiley, (1998)Computer abuse perpetrators and vulnerabilities of computer systems.. AFIPS National Computer Conference, volume 45 of AFIPS Conference Proceedings, page 65-73. AFIPS Press, (1976)Demonstrating the Elements of Information Security with Loss Scenarios.. Information Systems Security, 3 (1): 17-22 (1994)From the Editor.. Information Systems Security, 2 (3): 1-4 (1993)A Guide to Selecting and Implementing Security Controls.. Information Systems Security, 3 (2): 75-86 (1994)From The Editor.. Information Systems Security, 1 (1): 3 (1992)Confidentiality of Information and Personal Privacy.. Information Systems Security, 2 (1): 13-17 (1993)