default search action
Information Management & Computer Security, Volume 15
Volume 15, Number 1, 2007
- Sean Lancaster, David C. Yen, Albert H. Huang, Shin-Yuan Hung:
The selection of instant messaging or e-mail: College students' perspective for computer communication. 5-22 - Olusegun Folorunso, Olufunke R. Vincent, B. M. Dansu:
Image edge detection: A knowledge management technique for visual scene analysis. 23-32 - E. John Sebes, Mark Stamp:
Solvable problems in enterprise digital rights management. 33-45 - Ahmad A. Abu-Musa:
Evaluating the security controls of CAIS in developing countries: An examination of current research. 46-63 - Subhas C. Misra, Vinod Kumar, Uma Kumar:
A strategic modeling technique for information security risk assessment. 64-77
Volume 15, Number 2, 2007
- Adil Fathelrahamn, Mathew Shafaghi:
Analyzing bloggers data on software design patterns and applications integration; methodology and implementation. 84-101 - ThuyUyen H. Nguyen, Joseph S. Sherif, Michael Newby:
Strategies for successful CRM implementation. 102-115 - Klaus Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell:
Analysis of security-relevant semantics of BPEL in cross-domain defined business processes. 116-127 - Ahmad A. Abu-Musa:
Evaluating the security controls of CAIS in developing countries: an empirical investigation. 128-148 - Pauline Ratnasingam:
A risk-control framework for e-marketplace participation: the findings of seven cases. 149-166
Volume 15, Number 3, 2007
- Mohamad Noorman Masrek, Nor Shahriza Abdul Karim, Ramlah Hussein:
Investigating corporate intranet effectiveness: a conceptual framework. 168-183 - Chris Tseng, Patrick Ng:
Precisiated information retrieval for RSS feeds. 184-200 - D. P. Goyal:
Information systems planning practices in Indian public enterprises. 201-213 - Nathan L. Clarke, A. R. Mekala:
The application of signature recognition to transparent handwriting verification for mobile devices. 214-225 - Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris:
Incident response requirements for distributed security information management systems. 226-240 - Oge Marques, Pierre Baillargeon:
Design of a multimedia traffic classifier for Snort. 241-256
Volume 15, Number 4, 2007
- Hanudin Amin:
An analysis of mobile credit card usage intentions. 260-269 - Princely Ifinedo:
An empirical study of ERP success evaluations by business and IT managers. 270-282 - Mohamed Saad Saleh, Abdullah Alrabiah, Saad Haj Bakry:
A STOPE model for the investigation of compliance with ISO 17799-2005. 283-294 - Vasileios Vlachos, Diomidis Spinellis:
A PRoactive malware identification system based on the computer hygiene principles. 295-312 - Thian Song Ong, Andrew Teoh Beng Jin, Tee Connie:
Personalized biometric key using fingerprint biometrics. 313-328
Volume 15, Number 5, 2007
- Themistokles Lazarides:
Comply! Resistance is futile. 339-349 - Ranjan B. Kini:
Vendor availability: a key factor for outsourcing in Chilean ICT sector. 350-361 - Malcolm R. Pattinson, Grantley Anderson:
How well are information risks being communicated to your computer end-users? 362-371 - Marcus Nohlberg, Johannes Bäckström:
User-centred security applied to the development of a management information system. 372-381 - Shirley Atkinson, Chris A. Johnson, Andrew D. Phippen:
Improving protection mechanisms by understanding online risk. 382-393 - Almut Herzog, Nahid Shahmehri:
Usable set-up of runtime security policies. 394-407 - Finn Olav Sveen, Jose M. Sarriegi, Eliot H. Rich, Jose J. Gonzalez:
Toward viable information security reporting systems. 408-419 - Konstantin Beznosov, Olga Beznosova:
On the imbalance of the security problem space and its expected consequences. 420-431
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.