default search action
Information Management & Computer Security, Volume 11
Volume 11, Number 1, 2003
- Joseph S. Sherif, David P. Gilliam:
Deployment of anti-virus software: a case study. 5-10 - Alan D. Smith, William T. Rupp:
Application service providers: an application of the transaction cost model. 11-18 - Mayur S. Desai, Thomas C. Richards, Kiran J. Desai:
E-commerce policies and customer privacy. 19-27 - Fritz H. Grupe:
Information systems professionals and conflict of interest. 28-32 - Nasser Salem Abouzakhar, Gordon A. Manson:
Networks security measures using neuro-fuzzy agents. 33-38 - Yun E. Zeng, H. Joseph Wen, David C. Yen:
Customer relationship management (CRM) in business-to-business (B2B) e-commerce. 39-44
Volume 11, Number 2, 2003
- Kostas S. Metaxiotis, John E. Psarras, Emanuel Samouilidis:
Integrating fuzzy logic into decision suppport systems: current research and future prospects. 53-59 - Vidya Moghe:
Privacy management - a new era in the Australian business environment. 60-66 - Luisa Focacci, Robert J. Mockler, Marc E. Gartenfeld, Dorothy G. Dologite:
How to choose an ASP: selection guidelines. 67-73 - Ashish Garg, Jeffrey Curtis, Hilary Halper:
Quantifying the financial impact of IT security breaches. 74-83 - Victoria Skoularidou, Diomidis Spinellis:
Security architectures for network clients. 84-91 - Alan D. Smith:
Exploring potential strategic impacts of XML-related technologies. 92-100
Volume 11, Number 3, 2003
- Heather Fulford, Neil F. Doherty:
The application of information security policies in large UK-based organizations: an exploratory investigation. 106-114 - Yun E. Zeng, Roger H. L. Chiang, David C. Yen:
Enterprise integration with advanced information technologies: ERP and data warehousing. 115-122 - H. J. A. (Rens) de Wolf, Marcel E. M. Spruit:
Stealth tracing: Subliminal Traceroute. 123-129 - Hassan Aljifri, Alexander Perez-Pons, Daniel Collins:
Global e-commerce: a framework for understanding and overcoming the trust barrier. 130-138 - Alexandr Seleznyov, Seppo Puuronen:
Using continuous user authentication to detect masqueraders. 139-145 - Konstantinos Nikolopoulos, Kostas S. Metaxiotis, Vassilis Assimakopoulos, Eleni Tavanidou:
A first approach to e-forecasting: a survey of forecasting Web services. 146-152
Volume 11, Number 4, 2003
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study. 161-166 - Jimmy J. M. Ng, K. X. Li:
Implications of ICT for knowledge management in globalization. 167-174 - Joseph S. Sherif, Rod Ayers, Tommy G. Dearmond:
Intrusion detection: the art and the practice. Part I. 175-186 - Raju Ramaswamy:
A novel approach to solve DSL network data rate problems. 187-194 - Simeon Xenitellis:
Identifying security vulnerabilities through input flow tracing and analysis. 195-199
Volume 11, Number 5, 2003
- Helen L. Armstrong, Patrick J. Forde:
Internet anonymity practices in computer crime. 209-215 - Kostas S. Metaxiotis, Konstantinos Ergazakis, Emanuel Samouilidis, John E. Psarras:
Decision support through knowledge management: the role of the artificial intelligence. 216-221 - Joseph S. Sherif, Rod Ayers:
Intrusion detection: methods and systems. Part II. 222-229 - Z. T. Temtime, S. V. Chinyoka, J. P. W. Shunda:
Toward strategic use of IT in SMEs: a developing country perspective. 230-237 - Matthew J. Warren, William Hutchinson:
A security risk management approach for e-commerce. 238-242 - Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang:
An integrated system theory of information security management. 243-248 - Cungang Yang, Chang N. Zhang:
An XML-based administration method on role-based access control in the enterprise environment. 249-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.