default search action
Information Management & Computer Security, Volume 7
Volume 7, Number 1, 1999
- Jon-Arild Johannessen, Johan Olaisen, Bjørn Olsen:
Strategic use of information technology for increased innovation and performance. 5-22 - Brenda Whittaker:
What went wrong? Unsuccessful information technology projects. 23-30 - Lam-for Kwok, Dennis Longley:
Information security management and modelling. 30-40 - Schubert Foo, Peng-Chor Leong, Siu Cheung Hui, Shigong Liu:
Security considerations in the delivery of Web-based applications: a case study. 40-50 - Rossouw von Solms:
Information security management: why standards are important. 50-58
Volume 7, Number 2, 1999
- Steven Furnell, Paul Dowland, Peter W. Sanders:
Dissecting the "Hacker Manifesto". 69-75 - Rod Hart, Darren Morgan, Hai Tran:
An introduction to automated intrusion detection approaches. 76-82 - Stephen Wilson:
Digital signatures and the future of documentation. 83-87 - Eng Huat Ng:
Step-by-step guideline for designing and documenting the navigation structure of multimedia hypertext systems. 88-98 - Carrie Liddy, Alice Sturgeon:
The evolution of certificate model architecture. 95-100
Volume 7, Number 3, 1999
- Garry Dinnie:
The Second Annual Global Information Security Survey. 112-120 - Diomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis:
Security requirements, risks and recommendations for small enterprise and home-office environments. 121-128 - Valerie Mosley, Margaret A. Hurley:
IT skill retention. 129-132 - Philip Catania:
Year 2000 legal and regulatory environment. 133-139 - Mitsuru Kodama:
Community management support through community-based information networks. 140-150
Volume 7, Number 4, 1999
- Stephen Wilson:
New models for the management of public key infrastructure and root certification authorities. 166-170 - Gurpreet Dhillon:
Managing and controlling computer misuse. 171-175 - Mohsen Attaran:
Internet-based business opportunities: buyers beware of scams. 176-178 - Brian W. Smith, Andrew J. Morris:
Avoiding securities class actions arising from Y2K issues. 178-185 - Mitsuru Kodama:
Strategic business applications and new virtual knowledge-based businesses through community-based information networks. 186-199
Volume 7, Number 5, 1999
- Huong Ngo Higgins:
Corporate system security: towards an integrated management approach. 217-222 - David Kreltszheim:
Identifying the proceeds of electronic money fraud. 223-231 - Ernest Jordan:
IT contingency planning: management roles. 232-238 - Carolyn Oddie:
Copyright protection in the digital age. 239-240 - Mohsen Attaran, Ilja VanLaar:
Privacy and security on the Internet: how to secure your personal information and company data. 241-247 - John E. Psarras, Athanassios P. Papakonstantinou, Kostas S. Metaxiotis:
Towards the integrated monitoring and evaluation system IMES: a real power. 247-254 - Martin Hans Knahl, Holger D. Hofmann, Andrew D. Phippen:
A distributed component framework for integrated network and systems management. 254-260
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.