David Davies

Orcid: 0000-0002-7573-2762

According to our database1, David Davies authored at least 50 papers between 1985 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Translating evidence to practice in the health professions: a randomized trial of Twitter vs Facebook.
J. Am. Medical Informatics Assoc., 2017

2015
West Midlands Health Informatics Network: A Perspective on Education and Training Needs.
Proceedings of the Enabling Health Informatics Applications [ICIMTH 2015, 2015

2011
Push and Pull Models to Manage Patient Consent and Licensing of Multimedia Resources in Digital Repositories for Case-Based Reasoning.
Proceedings of the User Centered Networked Health Care - Proceedings of MIE 2011, 2011

2005
Crisis management: combating the denial syndrome.
Comput. Law Secur. Rev., 2005

2002
Risk Management - Protecting Reputation: Reputation Risk Management - The Holistic Approach.
Comput. Law Secur. Rev., 2002

People Management - Corporate Bullying.
Comput. Law Secur. Rev., 2002

World Trade Center Lessons: Risk Management Lessons from the World Trade Center.
Comput. Law Secur. Rev., 2002

2001
LSE - Corporate Governance: Turnbull - a year on.
Comput. Law Secur. Rev., 2001

2000
Use of a Web site for learning about cancer.
Comput. Educ., 2000

1999
Insurance and the Y2K risk.
Comput. Law Secur. Rev., 1999

1997
Risk management: Holistic risk management.
Comput. Law Secur. Rev., 1997

1994
Computer insurance.
Comput. Law Secur. Rev., 1994

Managing crisis - a live simulation.
Comput. Law Secur. Rev., 1994

1992
Anatomy of a disaster: The sixth in a series by David Davies.
Comput. Law Secur. Rev., 1992

1991
The nature of computer dependency risks.
Comput. Law Secur. Rev., 1991

A review of the new Lloyds electronic and computer crime policy.
Comput. Law Secur. Rev., 1991

1990
Virus management.
Comput. Law Secur. Rev., 1990

Computer risk management.
Comput. Law Secur. Rev., 1990

Insuring computer virus.
Comput. Law Secur. Rev., 1990

The computer health risk.
Comput. Law Secur. Rev., 1990

1989
The people risks the creation of a corporate security policy.
Comput. Law Secur. Rev., 1989

The people risks, RAF Brampton 24th May 1989.
Comput. Law Secur. Rev., 1989

The computer virus crisis: written by Philip Fites, Peter Johnston and Martin Kratz. (Published by Van Nostrand Reinhold inc. Available through Chapman and Hall Publishers, London. pp. 171). £13.95. ISBN 0-442-28532-9.
Comput. Law Secur. Rev., 1989

Computer losses in 1988 - A review.
Comput. Law Secur. Rev., 1989

Continuing the series by David Davies Part IV: Why have a strategy.
Comput. Law Secur. Rev., 1989

Dramatic review: "The hacker and the malevolent employee"; performed at COMPSEC '88.
Comput. Law Secur. Rev., 1989

1988
High technology risks - The limitations of insurance.
Comput. Law Secur. Rev., 1988

The fourth in a series of reports by David Davies analysing the experiences of those involved in a computer disaster.
Comput. Law Secur. Rev., 1988

Successful uses of technology in business.
Comput. Law Secur. Rev., 1988

Lloyds Cash Management Systems (CMS) cover.
Comput. Law Secur. Rev., 1988

"The computer" - The changing risk.
Comput. Law Secur. Rev., 1988

Risk management.
Comput. Law Secur. Rev., 1988

Computer abuse.
Comput. Law Secur. Rev., 1988

1987
The consumer protection act British computer society, 24 September 1987.
Comput. Law Secur. Rev., 1987

Protection against director's failure.
Comput. Law Secur. Rev., 1987

It can't happen to us: A selection of recent computing losses.
Comput. Law Secur. Rev., 1987

Security focus.
Comput. Law Secur. Rev., 1987

Anatomy of a disaster.
Comput. Law Secur. Rev., 1987

1986
Conference report.
Comput. Law Secur. Rev., 1986

Computer insurance: - Its contribution to risk management.
Comput. Law Secur. Rev., 1986

Special report on ATM fraud down under.
Comput. Law Secur. Rev., 1986

It won't happen to us.
Comput. Law Secur. Rev., 1986

Data protection corner.
Comput. Law Secur. Rev., 1986

The Wigglesworth press conference: Much ADO about nothing.
Comput. Law Secur. Rev., 1986

New highlights.
Comput. Law Secur. Rev., 1986

The Nature of computer crime - a risk management perspective.
Comput. Law Secur. Rev., 1986

Computer insurance: Part III - Consequential loss.
Comput. Law Secur. Rev., 1986

Professional indemnity insurance: A new nightmare for the professions.
Comput. Law Secur. Rev., 1986

1985
Report on consumer products.
Comput. Law Secur. Rev., 1985

How to recognise the risks and avoid the ten most common mistakes.
Comput. Law Secur. Rev., 1985


  Loading...