default search action
2. AISM 2004: Perth, Australia
- Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004. School of Computer and Information Science, Edith Cowan University, Western Australia 2004, ISBN 0-7298-0572-7
- Emiko Terado, Patricia A. H. Williams:
Securing PDAs in the Healthcare Environment. AISM 2004: 4-10 - Paul Ashley:
Enforcement of a P3P Privacy Policy. AISM 2004: 11-26 - Gim Hiong Soh, Timo Vuori:
New Form of Identity (ID) Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers. AISM 2004: 27-36 - C. C. Terence Tan:
Developing a framework for understanding Security Governance. AISM 2004: 37-48 - Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells:
Graphical Authentication: Justifications and Objectives. AISM 2004: 49-63 - G. Murphy:
An Examination of the Security of Routing Protocol Updates. AISM 2004: 56-63 - Malcolm R. Pattinson:
Risk Homeostasis as a Factor of Information Security. AISM 2004: 64-72 - Vassilis Dimopoulos, Steven Furnell, Murray E. Jennex, Ioannis Kritharas:
Approaches to IT Security in Small and Medium Enterprises. AISM 2004: 73-82 - Omar Zakaria:
Understanding Challenges of Information Security Culture: A Methodological Issue. AISM 2004: 83-93 - Michael Wynne, Peter James:
Securing Data at Rest. AISM 2004: 94-103 - A. Jancic, Matthew J. Warren:
PKI - Advantages and Obstacles. AISM 2004: 104-114 - Christopher Bolan, Daniel Mende:
Computer Security Research: Approaches and Assumptions. AISM 2004: 115-124 - Christopher Bolan:
Need to Know: Security or Liability? AISM 2004: 125-128 - Sabbir Ahmed, Leisa J. Armstrong:
Securing Web Services with XML aware Digital Signatures. AISM 2004: 129-134 - Warren Brooks, Matthew J. Warren:
Health Information Security Evaluation: Continued Development of an Object-Oriented Method. AISM 2004: 135-150 - Peter Wolski:
SOHO Wireless Intrusion Detection Systems - Cure or Placebo. AISM 2004: 151-158 - Jill Slay, Gerald Quirchmayr:
A Formal Model for the Relationship between Culture and Trust within is Security Management. AISM 2004: 159-166 - Mathew Hannan, Basil Tucker:
Risk Management and Organisational Culture: The Implications of Computer Network Attacks and Malware Incidents on Organizational Risk Management. AISM 2004: 167-177 - Girish Bhagwan Gokhale, David A. Banks:
Organisational Information Security: A Viable System Perspective. AISM 2004: 178-184
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.