Computer crime - Risk management and computer security. Wong, K. Computers & Security, 4(4):287--295, 1985.  ![link Computer crime - Risk management and computer security [link]](https://bibbase.org/img/filetypes/link.svg) Paper  doi  bibtex
Paper  doi  bibtex   @article{DBLP:journals/compsec/Wong85,
  author    = {Ken Wong},
  title     = {Computer crime - Risk management and computer security},
  journal   = {Computers {\&} Security},
  volume    = {4},
  number    = {4},
  pages     = {287--295},
  year      = {1985},
  url       = {http://dx.doi.org/10.1016/0167-4048(85)90047-1},
  doi       = {10.1016/0167-4048(85)90047-1},
  timestamp = {Fri, 17 Jun 2016 01:00:00 +0200},
  biburl    = {http://dblp.dagstuhl.de/rec/bib/journals/compsec/Wong85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
} 
Downloads: 0
{"_id":"LzZgA2X6cZMsvAbgo","bibbaseid":"wong-computercrimeriskmanagementandcomputersecurity-1985","downloads":0,"creationDate":"2016-12-18T19:29:32.250Z","title":"Computer crime - Risk management and computer security","author_short":["Wong, K."],"year":1985,"bibtype":"article","biburl":"https://github.com/ualberta-se/ualberta-se.github.io/blob/master/data/publications.bib?raw=true","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Ken"],"propositions":[],"lastnames":["Wong"],"suffixes":[]}],"title":"Computer crime - Risk management and computer security","journal":"Computers & Security","volume":"4","number":"4","pages":"287--295","year":"1985","url":"http://dx.doi.org/10.1016/0167-4048(85)90047-1","doi":"10.1016/0167-4048(85)90047-1","timestamp":"Fri, 17 Jun 2016 01:00:00 +0200","biburl":"http://dblp.dagstuhl.de/rec/bib/journals/compsec/Wong85","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@article{DBLP:journals/compsec/Wong85,\n  author    = {Ken Wong},\n  title     = {Computer crime - Risk management and computer security},\n  journal   = {Computers {\\&} Security},\n  volume    = {4},\n  number    = {4},\n  pages     = {287--295},\n  year      = {1985},\n  url       = {http://dx.doi.org/10.1016/0167-4048(85)90047-1},\n  doi       = {10.1016/0167-4048(85)90047-1},\n  timestamp = {Fri, 17 Jun 2016 01:00:00 +0200},\n  biburl    = {http://dblp.dagstuhl.de/rec/bib/journals/compsec/Wong85},\n  bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n\n\n\n\n\n\n","author_short":["Wong, K."],"key":"DBLP:journals/compsec/Wong85","id":"DBLP:journals/compsec/Wong85","bibbaseid":"wong-computercrimeriskmanagementandcomputersecurity-1985","role":"author","urls":{"Paper":"http://dx.doi.org/10.1016/0167-4048(85)90047-1"},"downloads":0},"search_terms":["computer","crime","risk","management","computer","security","wong"],"keywords":[],"authorIDs":[],"dataSources":["EABqXspjDr5xZ3jfL"]}