Ensuring court admissibility of computer-generated records
ACM Transactions on Information Systems (TOIS)
Hackers: computer heroes or electronic highwaymen?
ACM SIGCAS Computers and Society
Software Protection: Myth or Reality?
CRYPTO '85 Advances in Cryptology
Development of a measure for the information technology infrastructure construct
European Journal of Information Systems
Encyclopedia of Computer Science
Password security: an empirical study
Journal of Management Information Systems
The Dark Side of Computing: SRI International and the Study of Computer Crime
IEEE Annals of the History of Computing
Deterring internal information systems misuse
Communications of the ACM
Evaluation of Intrusion Detection Systems Under a Resource Constraint
ACM Transactions on Information and System Security (TISSEC)
Information Systems Research
Case study: Computer crime at CEFORMA: a case study
International Journal of Information Management: The Journal for Information Professionals
Protecting Organizational Information Resources
Information Resources Management Journal
Information security strategies: towards an organizational multi-strategy perspective
Journal of Intelligent Manufacturing
Hi-index | 0.02 |
From the Publisher:A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations.