default search action
Information Management & Computer Security, Volume 10
Volume 10, Number 1, 2002
- Martin Botha, Rossouw von Solms:
The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. 5-11 - Austin Jay Harris, David C. Yen:
Biometric authentication: assuring access to information. 12-19 - Mark Lunn:
Using business models and revenue streams for digital marketplace success. 20-27 - Farrokh Mamaghani:
Evaluation and selection of an antivirus and content filtering software. 28-32 - Billy B. L. Lim, H. Joseph Wen:
The impact of next generation XML. 33-40 - Ranjan B. Kini:
IT in manufacturing for performance: the challenge for Thai manufacturers. 41-48
Volume 10, Number 2, 2002
- Jintae Lee, Younghwa Lee:
A holistic model of computer abuse within organizations. 57-63 - Alan D. Smith, William T. Rupp:
Application service providers (ASP): moving downstream to enhance competitive advantage. 64-72 - Huong Ngo Higgins:
Auditing disclosure risks of on-line broker-dealers. 73-76 - S. E. Kruck, Danny Gottovi, Farideh Moghadami, Ralph Broom, Karen A. Forcht:
Protecting personal privacy on the Internet. 77-84 - Someswar Kesh, Sridhar P. Nerur, Sam Ramanujan:
Quality of service - technology and implementation. 85-91
Volume 10, Number 3, 2002
- I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki:
An experimental comparison of secret-based user authentication technologies. 100-108 - Alan D. Smith, O. Felix Offodile:
Information management of automatic data capture: an overview of technical developments. 109-118 - Clive Vermeulen, Rossouw von Solms:
The information security management toolbox - taking the pain out of security management. 119-125 - Stuart Maguire:
Identifying risks during information system development: managing the process. 126-134 - Mayur S. Desai, Thomas C. Richards, Thomas von der Embse:
System insecurity - firewalls. 135-139
Volume 10, Number 4, 2002
- Someswar Kesh, Sam Ramanujan, Sridhar P. Nerur:
A framework for analyzing e-commerce security. 149-158 - Feng Hao, Chan Choong Wah:
Private key generation from on-line handwritten signatures. 159-164 - Kostas S. Metaxiotis, John E. Psarras, Stefanos Papastefanatos:
Knowledge and information management in e-learning environments; the user agent architecture. 165-170 - Gaurav Jain, Deepali Singh, Shekhar Verma:
Service level agreements in IP networks. 171-177 - Alan D. Smith, William T. Rupp:
Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. 178-183 - John A. Rodgers, David C. Yen, David C. Chou:
Developing e-business; a strategic approach. 184-192 - Kevin Fitzgerald:
Steven Furnell: Cybercrime - vandalizing the information society (Review). 196
Volume 10, Number 5, 2002
- Nasser Salem Abouzakhar, Gordon A. Manson:
An intelligent approach to prevent distributed systems attacks. 203-209 - Mikko T. Siponen:
Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria. 210-224 - Chang N. Zhang, Cungang Yang:
Information flow analysis on role-based access control model. 225-236 - Elizabeth Tran, MaryAnne Atkinson:
Security of personal data across national borders. 237-241 - Tim France, Dave Yen, Jyun-Cheng Wang, Chia-Ming Chang:
Integrating search engines with data mining for customer-oriented information search. 242-254 - Pauline Ratnasingam:
The importance of technology trust in Web services security. 255-260
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.