Donn B. Parker

According to our database1, Donn B. Parker authored at least 36 papers between 1959 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 2001, "For contributions to information security and professional ethics.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Computer Abuse.
Proceedings of the Encyclopedia of Information Assurance, 2011

2007
Risks of risk-based security.
Commun. ACM, 2007

The Dark Side of Computing: SRI International and the Study of Computer Crime.
IEEE Ann. Hist. Comput., 2007

1998
Fighting computer crime - a new framework for protecting information.
Wiley, ISBN: 978-0-471-16378-7, 1998

1997
Information Security in a Nutshell.
Inf. Secur. J. A Glob. Perspect., 1997

The strategic values of information security in business.
Comput. Secur., 1997

1996
Security as the Target of Criminals.
Inf. Secur. J. A Glob. Perspect., 1996

All in a Day's Work: Nine Provocative Examples in the Practice of Computing Professionals.
Proceedings of the Computerization and Controversy, 2nd Ed., 1996

1995
Security Accountability in Job Performance.
Inf. Secur. J. A Glob. Perspect., 1995

From the Editor.
Inf. Secur. J. A Glob. Perspect., 1995

Defining Automated Crime.
Inf. Secur. J. A Glob. Perspect., 1995

Possession as an Element of Information Security.
Inf. Secur. J. A Glob. Perspect., 1995

Computer Loss Experience and Predictions.
Inf. Secur. J. A Glob. Perspect., 1995

1994
Update on Cryptography: Who Will Keep the Keys?
Inf. Secur. J. A Glob. Perspect., 1994

A Guide to Selecting and Implementing Security Controls.
Inf. Secur. J. A Glob. Perspect., 1994

Demonstrating the Elements of Information Security with Loss Scenarios.
Inf. Secur. J. A Glob. Perspect., 1994

1993
Cryptographic Threat Analysis.
Inf. Secur. J. A Glob. Perspect., 1993

A Comprehensive List of Threats To Information.
Inf. Secur. J. A Glob. Perspect., 1993

Confidentiality of Information and Personal Privacy.
Inf. Secur. J. A Glob. Perspect., 1993

Putting Hacker Crime in Perspective.
Inf. Secur. J. A Glob. Perspect., 1993

1992
Teaching the Ethical Use of Information Assets.
Inf. Secur. J. A Glob. Perspect., 1992

Security requirements in banks.
Comput. Law Secur. Rev., 1992

Restating the Foundation of Information Security.
Proceedings of the IT Security: The Need for International Cooperation, 1992

1984
Safeguards selection principles.
Comput. Secur., 1984

Computers, Crime and Privacy - A National Dilema, Congressional Testimony from the Industry.
Commun. ACM, 1984

1983
Testimony.
ACM SIGSOFT Softw. Eng. Notes, 1983

1981
The impact on computers on trust in business.
SIGCAS Comput. Soc., 1981

1979
Vulnerabilities of EFTs to Intentionally Caused Losses.
Commun. ACM, 1979

1978
Computer security differences for accidental and intentionally caused losses.
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978

1976
Computer abuse perpetrators and vulnerabilities of computer systems.
Proceedings of the American Federation of Information Processing Societies: 1976 National Computer Conference, 1976

1975
Computer and Data Abuse.
Proceedings of the Data: Its Use, 1975

Making computers safer.
Proceedings of the American Federation of Information Processing Societies: 1975 National Computer Conference, 1975

1974
Certification of computing personnel: prospects and potential impact.
Proceedings of the American Federation of Information Processing Societies: 1974 National Computer Conference, 1974

1972
Software testing and certification.
SIGMETRICS Perform. Evaluation Rev., 1972

1968
Rules of ethics in information processing.
Commun. ACM, 1968

1959
A compiler with an analog-oriented input language.
Proceedings of the Papers presented at the the 1959 western joint computer conference, 1959


  Loading...