


default search action
Information Management & Computer Security, Volume 14
Volume 14, Number 1, 2006
- Dan Eigeles:
Intelligent authentication, authorization, and administration (I3A). 5-23 - Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford:
Information security: management's effect on culture and policy. 24-36 - J. Arthur Gowan, Richard G. Mathieu, Mark B. Hey:
Earned value management in a data warehouse project. 37-50 - Fotis Draganidis, Gregoris Mentzas
:
Competency based management: a review of systems and approaches. 51-64 - Kevin Curran
, Sheila McKinney:
Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures. 65-74 - Jin Cong:
A novel watermarking algorithm for resistant geometric attacks using feature points matching. 75-98
Volume 14, Number 2, 2006
- Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang:
An empirical study of information security policy on information security elevation in Taiwan. 104-115 - Yanjun Zuo, Brajendra Panda:
Distributed database damage assessment paradigm. 116-139 - William C. Brown:
Vasa.">IT governance, architectural competency, and the Vasa. 140-154 - David Luthy, Karen A. Forcht:
Laws and regulations affecting information management and frameworks for assessing compliance. 155-166 - Sean Lancaster, David C. Yen
, Cheng-Yuan Ku:
E-supply chain management: an evaluation of current web initiatives. 167-184 - Panos Fitsilis
:
Practices and problems in managing electronic services using SLAs. 185-195
Volume 14, Number 3, 2006
- Aggeliki Tsohou, Maria Karyda
, Spyros Kokolakis, Evangelos A. Kiountouzis:
Formulating information systems risk management strategies through cultural theory. 198-217 - Kim-Kwang Raymond Choo
:
Issue report on business adoption of Microsoft Passport. 218-234 - Maria Papadaki
, Steven Furnell
:
Achieving automated intrusion response: a prototype implementation. 235-251 - William Brown, Mezbahur Rahman, Travis Hacker:
Home page usability and credibility: A comparison of the fastest growing companies to the Fortune 30 and the implications to IT governance. 252-269 - Zeinab Karake Shalhoub:
Trust, privacy, and security in electronic business: the case of the GCC countries. 270-283 - Richard Mou, Brian Kleiner:
Duty of care involving outsourced payroll. 284-293
Volume 14, Number 4, 2006
- Hafid Agourram, Bill Robson:
Defining information systems success in Canada. 300-311 - Reyes-G. Gonzalez
, Jose Gasco
, Juan Llopis
:
Information systems managers' view about outsourcing in Spain. 312-326 - Michael Pilgermann, Andrew Blyth, Stilianos Vidalis:
Inter-organisational intrusion detection using knowledge grid technology. 327-342 - Arthur Jung-Ting Chang
, Quey-Jen Yeh:
On security preparations against possible IS threats across industries. 343-360 - George Magklaras
, Steven Furnell
, Phillip J. Brooke:
Towards an insider threat prediction specification language. 361-381 - Geoff Skinner
, Song Han, Elizabeth Chang
:
An information privacy taxonomy for collaborative environments. 382-394
Volume 14, Number 5, 2006
- Maria Karyda
, Evangelia Mitrou, Gerald Quirchmayr:
A framework for outsourcing IS/IT security services. 402-415 - Hervé Debar
, Jouni Viinikka:
Security information management as an outsourced service. 417-435 - Dimitrios Lekkas, Costas Lambrinoudakis
:
Outsourcing digital signatures: a solution to key management burden. 436-449 - Nijaz Bajgoric:
Information technologies for business continuity: an implementation framework. 450-466 - Sajjad ur Rehman:
IT applications in Kuwaiti financial companies: an analysis. 467-484 - Mohsen Ziaee, Mohammad Fathian, Seyed Jafar Sadjadi
:
A modular approach to ERP system selection: A case study. 485-495 - Olusegun Folorunso, Shawn Oluwafemi Ogunseye, Sushil K. Sharma:
An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities. 496-505

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.