Donn B. Parker
#10,877
Most Influential Person Now
American computer scientist
Donn B. Parker's AcademicInfluence.com Rankings
Donn B. Parkercomputer-science Degrees
Computer Science
#752
World Rank
#775
Historical Rank
Database
#7763
World Rank
#8071
Historical Rank
Donn B. Parkerpsychology Degrees
Psychology
#4241
World Rank
#4734
Historical Rank
Industrial And Organizational Psychology
#28
World Rank
#31
Historical Rank
Download Badge
Computer Science Psychology
Why Is Donn B. Parker Influential?
(Suggest an Edit or Addition)According to Wikipedia, Donn B. Parker was an information security researcher and consultant and a 2001 Fellow of the Association for Computing Machinery. Parker had over 50 years of experience in the computer field in computer programming, computer systems management, consulting, teaching, and research.
Donn B. Parker's Published Works
Published Works
- Fighting computer crime - a new framework for protecting information (1998) (292)
- Fighting computer crime (1983) (167)
- Crime by computer (1976) (161)
- Computer crime (1984) (121)
- Computer Security Management (1981) (103)
- Ethical conflicts in information and computer science, technology, and business (1990) (100)
- Toward a New Framework for Information Security (2015) (67)
- Rules of ethics in information processing (1968) (51)
- Restating the Foundation of Information Security (1991) (51)
- A New Framework for Information Security to Avoid Information Anarchy (1995) (41)
- Risks of risk-based security (2007) (38)
- The strategic values of information security in business (1997) (36)
- Computer Crime: Criminal Justice Resource Manual (Second Edition). (1989) (28)
- Ethics for Information Systems Personnel (1988) (16)
- Telemedicine in Alaska: The ATS-6 satellite biomedical demonstration (1976) (14)
- Information Security in a Nutshell (1997) (14)
- Managers guide to computer security (1981) (13)
- Overcoming the insider : reducing employee computer crime through situational crime prevention (2016) (12)
- The Dark Side of Computing: SRI International and the Study of Computer Crime (2007) (12)
- Why ROI and similar financial tools are not advisable for evaluating the merits of security projects (2004) (11)
- INTENTIONS TO VIOLATE (1991) (11)
- A Guide to Selecting and Implementing Security Controls (1994) (8)
- The many faces of data vulnerability: Information can be tapped when resident in memory. It can also be intercepted en route, on paper, and elsewhere (1984) (8)
- Vulnerabilities of EFTs to intentionally caused losses (1979) (8)
- Computer Related Crime (1974) (7)
- The Effectiveness of Motorway Matrix Signalling — A Police View (1981) (6)
- Threats to Computer Systems (1973) (6)
- Using threats to demonstrate the elements of information security (1995) (5)
- How Much Computer Abuse is There (1983) (4)
- A Note on Our Terrible Security Model (2001) (4)
- Computers, crime and privacy—a national dilemma: congressional testimony from the industry (1984) (4)
- Possession as an Element of Information Security (1995) (3)
- Security Accountability in Job Performance (1995) (3)
- Comparison of Risk-Based and Diligence-Based Idealized Security Reviews (2007) (3)
- Demonstrating the Elements of Information Security with Loss Scenarios (1994) (3)
- All in a Day's Work: Nine Provocative Examples in the Practice of Computing Professionals (1995) (3)
- Manual for investigation of computer-related incidents of intentionally caused losses, injuries, and damage (1973) (2)
- The Trojan horse virus and other crimoids (1991) (2)
- Computer Abuse (2011) (2)
- The strategic value of information in business (1997) (2)
- Computer and Data Abuse (1975) (2)
- MOTORWAY MATRIX SIGNALLING (1980) (2)
- Cryptographic Threat Analysis (1993) (2)
- Computer Abuse Research Update, 2 Computer L.J. 329 (1980) (1980) (1)
- THE APPLICATION AND CONTROL OF THE MOTORWAY MATRIX SIGNALLING SYSTEM (1978) (1)
- Teaching the Ethical Use of Information Assets (1992) (1)
- Automated crime and security (1997) (1)
- Safeguards selection principles (1984) (1)
- Information crime and security (1987) (1)
- Abstract from report on the invitational workshop—integrity policy (1987) (0)
- From the Editor (1995) (0)
- Technical Note for the Audit Profession, Benford’s Law (2017) (0)
- Software testing and certification (1972) (0)
- From The Editor (1992) (0)
- Testimony (1983) (0)
- Security as the Target of Criminals (1996) (0)
- A Comprehensive List of Threats To Information (1993) (0)
- From the Editor (1993) (0)
- From the Editor (1994) (0)
- The state of security in cyberspace (1993) (0)
- Engineers in Atomic Offense and Defense (1950) (0)
- Integrated test facility (ITF) (1979) (0)
- From the Editor (1995) (0)
- Compsec '97 paper abstract: Infosec folk art and beyond (1997) (0)
- Computer loss experience and predictions (1996) (0)
- From the Editor (1994) (0)
- From the Editor (1995) (0)
- Update on Cryptography: Who Will Keep the Keys? (1994) (0)
- Law, Investigation, and Ethics (2000) (0)
- From the Editor (1993) (0)
- The impact on computers on trust in business (1981) (0)
- Defining Automated Crime (1995) (0)
- Security requirements in banks (1992) (0)
- Confidentiality of Information and Personal Privacy (1993) (0)
- From the Editor (1993) (0)
- Oral history interview with Donn B. Parker (2003) (0)
- Take a strong stand (1991) (0)
- Ethical standards of accountability (1992) (0)
- Vulnerabilities of EFT Systems to Intentionally Caused Losses (1980) (0)
- From the Editor (1993) (0)
- From the Editor (1995) (0)
- Making computers safer (1975) (0)
- From the Editor (1994) (0)
- Certification of computing personnel: prospects and potential impact (1974) (0)
- Computer Abuse Methods and Detection (2000) (0)
- Putting Hacker Crime in Perspective (1993) (0)
This paper list is powered by the following services:
Other Resources About Donn B. Parker
What Schools Are Affiliated With Donn B. Parker?
Donn B. Parker is affiliated with the following schools: