Computer crime - Risk management and computer security. Wong, K. Computers & Security, 4(4):287--295, 1985. Paper doi bibtex @article{DBLP:journals/compsec/Wong85,
author = {Ken Wong},
title = {Computer crime - Risk management and computer security},
journal = {Computers {\&} Security},
volume = {4},
number = {4},
pages = {287--295},
year = {1985},
url = {http://dx.doi.org/10.1016/0167-4048(85)90047-1},
doi = {10.1016/0167-4048(85)90047-1},
timestamp = {Fri, 17 Jun 2016 01:00:00 +0200},
biburl = {http://dblp.dagstuhl.de/rec/bib/journals/compsec/Wong85},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"LzZgA2X6cZMsvAbgo","bibbaseid":"wong-computercrimeriskmanagementandcomputersecurity-1985","downloads":0,"creationDate":"2016-12-18T19:29:32.250Z","title":"Computer crime - Risk management and computer security","author_short":["Wong, K."],"year":1985,"bibtype":"article","biburl":"https://github.com/ualberta-se/ualberta-se.github.io/blob/master/data/publications.bib?raw=true","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Ken"],"propositions":[],"lastnames":["Wong"],"suffixes":[]}],"title":"Computer crime - Risk management and computer security","journal":"Computers & Security","volume":"4","number":"4","pages":"287--295","year":"1985","url":"http://dx.doi.org/10.1016/0167-4048(85)90047-1","doi":"10.1016/0167-4048(85)90047-1","timestamp":"Fri, 17 Jun 2016 01:00:00 +0200","biburl":"http://dblp.dagstuhl.de/rec/bib/journals/compsec/Wong85","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@article{DBLP:journals/compsec/Wong85,\n author = {Ken Wong},\n title = {Computer crime - Risk management and computer security},\n journal = {Computers {\\&} Security},\n volume = {4},\n number = {4},\n pages = {287--295},\n year = {1985},\n url = {http://dx.doi.org/10.1016/0167-4048(85)90047-1},\n doi = {10.1016/0167-4048(85)90047-1},\n timestamp = {Fri, 17 Jun 2016 01:00:00 +0200},\n biburl = {http://dblp.dagstuhl.de/rec/bib/journals/compsec/Wong85},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n\n\n\n\n\n\n","author_short":["Wong, K."],"key":"DBLP:journals/compsec/Wong85","id":"DBLP:journals/compsec/Wong85","bibbaseid":"wong-computercrimeriskmanagementandcomputersecurity-1985","role":"author","urls":{"Paper":"http://dx.doi.org/10.1016/0167-4048(85)90047-1"},"downloads":0},"search_terms":["computer","crime","risk","management","computer","security","wong"],"keywords":[],"authorIDs":[],"dataSources":["EABqXspjDr5xZ3jfL"]}