BibTeX records: Stephen Hinde

download as .bib file

@article{DBLP:journals/compsec/Hinde03,
  author       = {Stephen Hinde},
  title        = {Time cost{\textdollar} money},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {14--21},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00103-2},
  doi          = {10.1016/S0167-4048(03)00103-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde03a,
  author       = {Stephen Hinde},
  title        = {The law, cybercrime, risk assessment and cyber protection},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {90--95},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00203-7},
  doi          = {10.1016/S0167-4048(03)00203-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde03b,
  author       = {Stephen Hinde},
  title        = {Cyber-terrorism in context},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {188--192},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00303-1},
  doi          = {10.1016/S0167-4048(03)00303-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde03c,
  author       = {Stephen Hinde},
  title        = {Careless about privacy},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {284--288},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00403-6},
  doi          = {10.1016/S0167-4048(03)00403-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde03d,
  author       = {Stephen Hinde},
  title        = {Privacy legislation: a comparison of the {US} and European approaches},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {378--387},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00503-0},
  doi          = {10.1016/S0167-4048(03)00503-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde03e,
  author       = {Stephen Hinde},
  title        = {Spam: the evolution of a nuisance},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {6},
  pages        = {474--478},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00603-5},
  doi          = {10.1016/S0167-4048(03)00603-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde03e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde03f,
  author       = {Stephen Hinde},
  title        = {Nimbyism, dominoes and creaking infrastructure},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {7},
  pages        = {570--576},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00703-X},
  doi          = {10.1016/S0167-4048(03)00703-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde03f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde03g,
  author       = {Stephen Hinde},
  title        = {Computer security: Mapping the future},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {8},
  pages        = {664--669},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00003-8},
  doi          = {10.1016/S0167-4048(03)00003-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde03g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde02,
  author       = {Stephen Hinde},
  title        = {2001: {A} Privacy Odyssey Revisited},
  journal      = {Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {16--34},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-4048(02)00103-7},
  doi          = {10.1016/S0167-4048(02)00103-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde02a,
  author       = {Stephen Hinde},
  title        = {It Was D{\'{e}}j{\'{a}} vu all Over Again},
  journal      = {Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {212--21},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-4048(02)00303-6},
  doi          = {10.1016/S0167-4048(02)00303-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde02b,
  author       = {Stephen Hinde},
  title        = {Security surveys spring crop},
  journal      = {Comput. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {310--321},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-4048(02)00404-2},
  doi          = {10.1016/S0167-4048(02)00404-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde02c,
  author       = {Stephen Hinde},
  title        = {The perils of privacy},
  journal      = {Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {424--432},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-4048(02)00508-4},
  doi          = {10.1016/S0167-4048(02)00508-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde02d,
  author       = {Stephen Hinde},
  title        = {The Blue Screen of Death and other deadly bugs},
  journal      = {Comput. Secur.},
  volume       = {21},
  number       = {6},
  pages        = {491--496},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-4048(02)01003-9},
  doi          = {10.1016/S0167-4048(02)01003-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde02d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde02e,
  author       = {Stephen Hinde},
  title        = {Spam, scams, chains, hoaxes and other junk mail},
  journal      = {Comput. Secur.},
  volume       = {21},
  number       = {7},
  pages        = {592--606},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-4048(02)01104-5},
  doi          = {10.1016/S0167-4048(02)01104-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde02e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde02f,
  author       = {Stephen Hinde},
  title        = {Compsec 2002: the complete security circle},
  journal      = {Comput. Secur.},
  volume       = {21},
  number       = {8},
  pages        = {689--693},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-4048(02)00803-9},
  doi          = {10.1016/S0167-4048(02)00803-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde02f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01,
  author       = {Stephen Hinde},
  title        = {2001: {A} Privacy Odyssey},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {21--27},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)01016-1},
  doi          = {10.1016/S0167-4048(01)01016-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01a,
  author       = {Stephen Hinde},
  title        = {The Search For Privacy},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {127--131},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00203-6},
  doi          = {10.1016/S0167-4048(01)00203-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01b,
  author       = {Stephen Hinde},
  title        = {The Times They Are A-Changin'},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {202--206},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00303-0},
  doi          = {10.1016/S0167-4048(01)00303-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01c,
  author       = {Stephen Hinde},
  title        = {The Weakest Link},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {295--301},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00403-5},
  doi          = {10.1016/S0167-4048(01)00403-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01d,
  author       = {Stephen Hinde},
  title        = {Cyberthreats: Perceptions, Reality and Protection},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {364--371},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00503-X},
  doi          = {10.1016/S0167-4048(01)00503-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01e,
  author       = {Stephen Hinde},
  title        = {Omnia te adversum spectantia, nulla retorsum\({}^{\mbox{*}}\)},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {468--474},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00603-4},
  doi          = {10.1016/S0167-4048(01)00603-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01f,
  author       = {Stephen Hinde},
  title        = {Lessons Learned},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {7},
  pages        = {561--567},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00703-9},
  doi          = {10.1016/S0167-4048(01)00703-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01g,
  author       = {Stephen Hinde},
  title        = {Incalculable potential for damage by cyber-terrorism},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {7},
  pages        = {568--572},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00704-0},
  doi          = {10.1016/S0167-4048(01)00704-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde01h,
  author       = {Stephen Hinde},
  title        = {If you can meet with triumph and disaster and treat those two impostors
                  just the same...},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {8},
  pages        = {657--666},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00803-3},
  doi          = {10.1016/S0167-4048(01)00803-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde01h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde00,
  author       = {Stephen Hinde},
  title        = {New Millennium, Old Failures},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {119--127},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)87821-9},
  doi          = {10.1016/S0167-4048(00)87821-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde00a,
  author       = {Stephen Hinde},
  title        = {Life Was Simple Then},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {222--229},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)88610-1},
  doi          = {10.1016/S0167-4048(00)88610-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde00b,
  author       = {Stephen Hinde},
  title        = {Smurfing, Swamping, Spamming, Spoofing, Squatting, Slandering, Surfing,
                  Scamming and Other Mischiefs of the World Wide Web},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {312--320},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)04018-9},
  doi          = {10.1016/S0167-4048(00)04018-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde00b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde00c,
  author       = {Stephen Hinde},
  title        = {Love Conquers All?},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {408--420},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)05027-6},
  doi          = {10.1016/S0167-4048(00)05027-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde00c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde00d,
  author       = {Stephen Hinde},
  title        = {Fireworks, Beer and Old Halfpennies - The Risks of Assumption},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {499--504},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)06024-7},
  doi          = {10.1016/S0167-4048(00)06024-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde00d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde00e,
  author       = {Stephen Hinde},
  title        = {Do You Know Your Organization's Achilles Heel?},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {7},
  pages        = {585--590},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)07018-8},
  doi          = {10.1016/S0167-4048(00)07018-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde00e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde00f,
  author       = {Stephen Hinde},
  title        = {New Names For Old - {A} Personal Surf Through Compsec 200},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {8},
  pages        = {679--687},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)08016-0},
  doi          = {10.1016/S0167-4048(00)08016-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde00f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99,
  author       = {Stephen Hinde},
  title        = {One down, one to go},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {19--22},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80004-2},
  doi          = {10.1016/S0167-4048(99)80004-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99a,
  author       = {Stephen Hinde},
  title        = {Year 2000 update},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {113--119},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80029-7},
  doi          = {10.1016/S0167-4048(99)80029-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99b,
  author       = {Stephen Hinde},
  title        = {Are you in control?},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {199--203},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80064-9},
  doi          = {10.1016/S0167-4048(99)80064-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99c,
  author       = {Stephen Hinde},
  title        = {E for exponential growth},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {295--299},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80072-8},
  doi          = {10.1016/S0167-4048(99)80072-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99d,
  author       = {Stephen Hinde},
  title        = {E-mail can seriously damage your health},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {396--406},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80085-6},
  doi          = {10.1016/S0167-4048(99)80085-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99e,
  author       = {Stephen Hinde},
  title        = {The bell tolls for the bell-shaped curve: or how hot magnets, species
                  distribution and things that go bump in the air will change our view
                  of risk},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {7},
  pages        = {565--572},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)82002-1},
  doi          = {10.1016/S0167-4048(99)82002-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde99f,
  author       = {Stephen Hinde},
  title        = {Step into a secure new world - Compsec '99 report},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {8},
  pages        = {660--669},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80130-8},
  doi          = {10.1016/S0167-4048(99)80130-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde99f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde98,
  author       = {Stephen Hinde},
  title        = {Hot water, icebergs and other disasters},
  journal      = {Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {31--33},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-4048(97)80247-7},
  doi          = {10.1016/S0167-4048(97)80247-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde98a,
  author       = {Stephen Hinde},
  title        = {Cyber Wars and other threats},
  journal      = {Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {115--118},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-4048(97)81979-7},
  doi          = {10.1016/S0167-4048(97)81979-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde98b,
  author       = {Stephen Hinde},
  title        = {Recent security surveys},
  journal      = {Comput. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {207--210},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-4048(98)80311-8},
  doi          = {10.1016/S0167-4048(98)80311-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde98b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde98c,
  author       = {Stephen Hinde},
  title        = {Contingency planning for the millenium},
  journal      = {Comput. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {299--302},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-4048(98)80009-6},
  doi          = {10.1016/S0167-4048(98)80009-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde98c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde98d,
  author       = {Stephen Hinde},
  title        = {Solar radiation is bad for you},
  journal      = {Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {385--388},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-4048(98)80004-7},
  doi          = {10.1016/S0167-4048(98)80004-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde98d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde98e,
  author       = {Stephen Hinde},
  title        = {Privacy and security - The drivers for growth of E-Commerce},
  journal      = {Comput. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {475--478},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-4048(98)80069-2},
  doi          = {10.1016/S0167-4048(98)80069-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde98e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde98f,
  author       = {Stephen Hinde},
  title        = {Corporate governance and disasters},
  journal      = {Comput. Secur.},
  volume       = {17},
  number       = {7},
  pages        = {583--585},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-4048(99)80057-1},
  doi          = {10.1016/S0167-4048(99)80057-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde98f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hinde98g,
  author       = {Stephen Hinde},
  title        = {Time, history and war: {A} personal voyage through Compsec '98},
  journal      = {Comput. Secur.},
  volume       = {17},
  number       = {8},
  pages        = {671--681},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0167-4048(98)80098-9},
  doi          = {10.1016/S0167-4048(98)80098-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hinde98g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics