default search action
Information Management & Computer Security, Volume 16
Volume 16, Number 1, 2008
- Allen C. Johnston, Merrill Warkentin:
Information privacy compliance in the healthcare industry. 5-19 - Mayur S. Desai, Thomas von der Embse:
Managing electronic information: an ethics perspective. 20-27 - B. S. Sahay, Jayanthi Ranjan:
Real time business intelligence in supply chain analytics. 28-48 - Jason Bellone, Segolene de Basquiat, Juan Rodriguez:
Reaching escape velocity: A practiced approach to information security management system implementation. 49-57 - Patricia A. H. Williams:
A practical application of CMM to medical security capability. 58-73 - Vasilios Katos, Ahmed Patel:
A partial equilibrium view on security and privacy. 74-83
Volume 16, Number 2, 2008
- Mohamad Noorman Masrek, Nor Shahriza Abdul Karim, Ramlah Hussein:
The effect of organizational and individual characteristics on corporate intranet utilizations. 89-112 - Jitesh Thakkar, Arun Kanda, S. G. Deshmukh:
Interpretive structural modeling (ISM) of IT-enablers for Indian manufacturing SMEs. 113-136 - Mohamad Noorman Masrek, Norhayati Hussin, Norashimawati Tarmuchi:
An exploratory study on systems development methodologies for web-based applications. 137-149 - Edson dos Santos Moreira, Luciana Andréia Fondazzi Martimiano, Antonio José dos Santos Brandão, Mauro César Bernardes:
Ontologies for information security management and governance. 150-165 - Lihong Zhou, Ana Vasconcelos, José Miguel Baptista Nunes:
Supporting decision making in risk management through an evidence-based information systems project risk checklist. 166-186 - Haralambos Mouratidis, Hamid Jahankhani, Mathews Z. Nkhoma:
Management versus security specialists: an empirical study on security related perceptions. 187-205
Volume 16, Number 3, 2008
- Selçuk Perçin:
Fuzzy multi-criteria risk-benefit analysis of business process outsourcing (BPO). 213-234 - Stephen M. Mutula:
Comparison of sub-Saharan Africa's e-government status with developed and transitional nations. 235-250 - Qingxiong Ma, Allen C. Johnston, J. Michael Pearson:
Information security management objectives and practices: a parsimonious framework. 251-270 - Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
Process-variance models in information security awareness research. 271-287 - Yoones Asgharzadeh Sekhavat, Mohammad Fathian:
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer. 288-304 - Hsu-Hui Lee, Mark Stamp:
An agent-based privacy-enhancing model. 305-319
Volume 16, Number 4, 2008
- Dmitriy V. Chulkov, Mayur S. Desai:
Escalation and premature termination in MIS projects: the role of real options. 324-335 - Narayanan Kumbakara:
Managed IT services: the role of IT standards. 336-359 - Charlie C. Chen, B. Dawn Medlin, R. S. Shaw:
A cross-cultural investigation of situational information security awareness programs. 360-376 - Janne Merete Hagen, Eirik Albrechtsen, Jan Hovden:
Implementation and effectiveness of organizational information security measures. 377-397 - Sandip C. Patel, Pritimoy Sanyal:
Securing SCADA systems. 398-414 - Sitalakshmi Venkatraman, Indika Delpachitra:
Biometrics in banking security: a case study. 415-430
Volume 16, Number 5, 2008
- Eli Winjum, Bjørn Kjetil Mølmann:
A multidimensional approach to multilevel security. 436-448 - Barry Wray, Richard Mathieu:
Evaluating the performance of open source software projects using data envelopment analysis. 449-462 - Michael Workman:
A test of interventions for security threats from social engineering. 463-483 - Namjoo Choi, Dan Jong Kim, Jahyun Goo, Andrew Whitmore:
Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action. 484-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.