𝔖 Bobbio Scriptorium
✦   LIBER   ✦

The psychology of computer crime — Part 2

✍ Scribed by Kathy Buckner; Guy Fielding


Publisher
Elsevier Science
Year
1992
Weight
405 KB
Volume
1992
Category
Article
ISSN
0960-2593

No coin nor oath required. For personal study only.

✦ Synopsis


It is the responsibility of each employee or other person (e.g. an outside consultant) authorized to use a password, to maintain strict confidentiality. It is a management responsibility to be sure these security guidelines are followed.


📜 SIMILAR VOLUMES


Measuring the utility of journals in the
✍ Glenn D. Walters 📂 Article 📅 2006 🏛 John Wiley and Sons 🌐 English ⚖ 109 KB 👁 2 views

## Abstract A measure of formal journal utility designed to offset some of the more noteworthy limitations of the impact factor (IF)—i.e., short follow‐up, citations to items in the numerator that are not included in the denominator, self‐citations, and the greater citation rate of review articles—