Donn B. Parker

According to our database1, Donn B. Parker authored at least 32 papers between 1968 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 2001, "For contributions to information security and professional ethics.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Computer Abuse.
Proceedings of the Encyclopedia of Information Assurance, 2011

2007
Risks of risk-based security.
Commun. ACM, 2007

The Dark Side of Computing: SRI International and the Study of Computer Crime.
IEEE Annals of the History of Computing, 2007

1998
Fighting computer crime - a new framework for protecting information.
Wiley, ISBN: 978-0-471-16378-7, 1998

1997
Information Security in a Nutshell.
Information Systems Security, 1997

The strategic values of information security in business.
Computers & Security, 1997

1996
Security as the Target of Criminals.
Information Systems Security, 1996

All in a Day's Work: Nine Provocative Examples in the Practice of Computing Professionals.
Proceedings of the Computerization and Controversy, 2nd Ed., 1996

1995
Security Accountability in Job Performance.
Information Systems Security, 1995

Defining Automated Crime.
Information Systems Security, 1995

Possession as an Element of Information Security.
Information Systems Security, 1995

Computer Loss Experience and Predictions.
Information Systems Security, 1995

1994
Update on Cryptography: Who Will Keep the Keys?
Information Systems Security, 1994

A Guide to Selecting and Implementing Security Controls.
Information Systems Security, 1994

Demonstrating the Elements of Information Security with Loss Scenarios.
Information Systems Security, 1994

1993
Cryptographic Threat Analysis.
Information Systems Security, 1993

A Comprehensive List of Threats To Information.
Information Systems Security, 1993

Confidentiality of Information and Personal Privacy.
Information Systems Security, 1993

Putting Hacker Crime in Perspective.
Information Systems Security, 1993

From the Editor.
Information Systems Security, 1993

1992
Teaching the Ethical Use of Information Assets.
Information Systems Security, 1992

Restating the Foundation of Information Security.
Proceedings of the IT Security: The Need for International Cooperation, 1992

1984
Safeguards selection principles.
Computers & Security, 1984

Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry.
Commun. ACM, 1984

1981
The impact on computers on trust in business.
SIGCAS Computers and Society, 1981

1979
Vulnerabilities of EFTs to Intentionally Caused Losses.
Commun. ACM, 1979

1978
Computer security differences for accidental and intentionally caused losses.
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978

1976
Computer abuse perpetrators and vulnerabilities of computer systems.
Proceedings of the American Federation of Information Processing Societies: 1976 National Computer Conference, 1976

1975
Computer and Data Abuse.
Proceedings of the Data: Its Use, 1975

Making computers safer.
Proceedings of the American Federation of Information Processing Societies: 1975 National Computer Conference, 1975

1974
Certification of computing personnel: prospects and potential impact.
Proceedings of the American Federation of Information Processing Societies: 1974 National Computer Conference, 1974

1968
Rules of ethics in information processing.
Commun. ACM, 1968


  Loading...