2003 | ||
---|---|---|
46 | Stephen Hinde: Time cost$ money. Computers & Security 22(1): 14-21 (2003) | |
45 | Stephen Hinde: The law, cybercrime, risk assessment and cyber protection. Computers & Security 22(2): 90-95 (2003) | |
44 | EE | Stephen Hinde: Cyber-terrorism in context. Computers & Security 22(3): 188-192 (2003) |
43 | EE | Stephen Hinde: Careless about privacy. Computers & Security 22(4): 284-288 (2003) |
42 | EE | Stephen Hinde: Privacy legislation: a comparison of the US and European approaches. Computers & Security 22(5): 378-387 (2003) |
41 | EE | Stephen Hinde: Spam: the evolution of a nuisance. Computers & Security 22(6): 474-478 (2003) |
40 | EE | Stephen Hinde: Nimbyism, dominoes and creaking infrastructure. Computers & Security 22(7): 570-576 (2003) |
39 | EE | Stephen Hinde: Computer security: Mapping the future. Computers & Security 22(8): 664-669 (2003) |
2002 | ||
38 | Stephen Hinde: 2001: A Privacy Odyssey Revisited. Computers & Security 21(1): 16-34 (2002) | |
37 | Stephen Hinde: It Was Déjá vu all Over Again. Computers & Security 21(3): 212-21 (2002) | |
36 | Stephen Hinde: Security surveys spring crop. Computers & Security 21(4): 310-321 (2002) | |
35 | Stephen Hinde: The perils of privacy. Computers & Security 21(5): 424-432 (2002) | |
34 | Stephen Hinde: The Blue Screen of Death and other deadly bugs. Computers & Security 21(6): 491-496 (2002) | |
33 | Stephen Hinde: Spam, scams, chains, hoaxes and other junk mail. Computers & Security 21(7): 592-606 (2002) | |
32 | Stephen Hinde: Compsec 2002: the complete security circle. Computers & Security 21(8): 689-693 (2002) | |
2001 | ||
31 | Stephen Hinde: 2001: A Privacy Odyssey. Computers & Security 20(1): 21-27 (2001) | |
30 | Stephen Hinde: The Search For Privacy. Computers & Security 20(2): 127-131 (2001) | |
29 | Stephen Hinde: The Times They Are A-Changin'. Computers & Security 20(3): 202-206 (2001) | |
28 | Stephen Hinde: The Weakest Link. Computers & Security 20(4): 295-301 (2001) | |
27 | Stephen Hinde: Cyberthreats: Perceptions, Reality and Protection. Computers & Security 20(5): 364-371 (2001) | |
26 | Stephen Hinde: Omnia te adversum spectantia, nulla retorsum*. Computers & Security 20(6): 468-474 (2001) | |
25 | Stephen Hinde: Lessons Learned. Computers & Security 20(7): 561-567 (2001) | |
24 | Stephen Hinde: Incalculable potential for damage by cyber-terrorism. Computers & Security 20(7): 568-572 (2001) | |
23 | Stephen Hinde: If you can meet with triumph and disaster and treat those two impostors just the same.... Computers & Security 20(8): 657-666 (2001) | |
2000 | ||
22 | Stephen Hinde: New Millennium, Old Failures. Computers & Security 19(2): 119-127 (2000) | |
21 | Stephen Hinde: Life Was Simple Then. Computers & Security 19(3): 222-229 (2000) | |
20 | Stephen Hinde: Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing, Scamming and Other Mischiefs of the World Wide Web. Computers & Security 19(4): 312-320 (2000) | |
19 | Stephen Hinde: Love Conquers All? Computers & Security 19(5): 408-420 (2000) | |
18 | Stephen Hinde: Fireworks, Beer and Old Halfpennies - The Risks of Assumption. Computers & Security 19(6): 499-504 (2000) | |
17 | Stephen Hinde: Do You Know Your Organization's Achilles Heel? Computers & Security 19(7): 585-590 (2000) | |
16 | Stephen Hinde: New Names For Old - A Personal Surf Through Compsec 200. Computers & Security 19(8): 679-687 (2000) | |
1999 | ||
15 | EE | Stephen Hinde: One down, one to go. Computers & Security 18(1): 19-22 (1999) |
14 | EE | Stephen Hinde: Year 2000 update. Computers & Security 18(2): 113-119 (1999) |
13 | EE | Stephen Hinde: Are you in control? Computers & Security 18(3): 199-203 (1999) |
12 | EE | Stephen Hinde: E for exponential growth. Computers & Security 18(4): 295-299 (1999) |
11 | EE | Stephen Hinde: E-mail can seriously damage your health. Computers & Security 18(5): 396-406 (1999) |
10 | EE | Stephen Hinde: The bell tolls for the bell-shaped curve: or how hot magnets, species distribution and things that go bump in the air will change our view of risk. Computers & Security 18(7): 565-572 (1999) |
9 | EE | Stephen Hinde: Step into a secure new world - Compsec '99 report. Computers & Security 18(8): 660-669 (1999) |
1998 | ||
8 | EE | Stephen Hinde: Hot water, icebergs and other disasters. Computers & Security 17(1): 31-33 (1998) |
7 | EE | Stephen Hinde: Cyber Wars and other threats. Computers & Security 17(2): 115-118 (1998) |
6 | EE | Stephen Hinde: Recent security surveys. Computers & Security 17(3): 207-210 (1998) |
5 | EE | Stephen Hinde: Contingency planning for the millenium. Computers & Security 17(4): 299-302 (1998) |
4 | EE | Stephen Hinde: Solar radiation is bad for you. Computers & Security 17(5): 385-388 (1998) |
3 | EE | Stephen Hinde: Privacy and security - The drivers for growth of E-Commerce. Computers & Security 17(6): 475-478 (1998) |
2 | EE | Stephen Hinde: Corporate governance and disasters. Computers & Security 17(7): 583-585 (1998) |
1 | EE | Stephen Hinde: Time, history and war: A personal voyage through Compsec '98. Computers & Security 17(8): 671-681 (1998) |