


default search action
Information Management & Computer Security, Volume 10
Volume 10, Number 1, 2002
- Martin Botha, Rossouw von Solms:

The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. 5-11 - Austin Jay Harris, David C. Yen

:
Biometric authentication: assuring access to information. 12-19 - Mark Lunn:

Using business models and revenue streams for digital marketplace success. 20-27 - Farrokh Mamaghani:

Evaluation and selection of an antivirus and content filtering software. 28-32 - Billy B. L. Lim, H. Joseph Wen:

The impact of next generation XML. 33-40 - Ranjan B. Kini:

IT in manufacturing for performance: the challenge for Thai manufacturers. 41-48
Volume 10, Number 2, 2002
- Jintae Lee, Younghwa Lee:

A holistic model of computer abuse within organizations. 57-63 - Alan D. Smith, William T. Rupp:

Application service providers (ASP): moving downstream to enhance competitive advantage. 64-72 - Huong Ngo Higgins:

Auditing disclosure risks of on-line broker-dealers. 73-76 - S. E. Kruck, Danny Gottovi, Farideh Moghadami, Ralph Broom, Karen A. Forcht:

Protecting personal privacy on the Internet. 77-84 - Someswar Kesh, Sridhar P. Nerur, Sam Ramanujan:

Quality of service - technology and implementation. 85-91
Volume 10, Number 3, 2002
- I. Irakleous, Steven Furnell, Paul Dowland

, Maria Papadaki
:
An experimental comparison of secret-based user authentication technologies. 100-108 - Alan D. Smith, O. Felix Offodile:

Information management of automatic data capture: an overview of technical developments. 109-118 - Clive Vermeulen, Rossouw von Solms:

The information security management toolbox - taking the pain out of security management. 119-125 - Stuart Maguire:

Identifying risks during information system development: managing the process. 126-134 - Mayur S. Desai, Thomas C. Richards, Thomas von der Embse:

System insecurity - firewalls. 135-139
Volume 10, Number 4, 2002
- Someswar Kesh, Sam Ramanujan, Sridhar P. Nerur:

A framework for analyzing e-commerce security. 149-158 - Feng Hao

, Chan Choong Wah:
Private key generation from on-line handwritten signatures. 159-164 - Kostas S. Metaxiotis, John E. Psarras, Stefanos Papastefanatos:

Knowledge and information management in e-learning environments; the user agent architecture. 165-170 - Gaurav Jain, Deepali Singh, Shekhar Verma

:
Service level agreements in IP networks. 171-177 - Alan D. Smith, William T. Rupp:

Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. 178-183 - John A. Rodgers, David C. Yen

, David C. Chou:
Developing e-business; a strategic approach. 184-192 - Kevin Fitzgerald:

Steven Furnell: Cybercrime - vandalizing the information society (Review). 196
Volume 10, Number 5, 2002
- Nasser Salem Abouzakhar, Gordon A. Manson:

An intelligent approach to prevent distributed systems attacks. 203-209 - Mikko T. Siponen:

Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria. 210-224 - Chang N. Zhang, Cungang Yang:

Information flow analysis on role-based access control model. 225-236 - Elizabeth Tran, MaryAnne Atkinson:

Security of personal data across national borders. 237-241 - Tim France, Dave Yen, Jyun-Cheng Wang, Chia-Ming Chang:

Integrating search engines with data mining for customer-oriented information search. 242-254 - Pauline Ratnasingam:

The importance of technology trust in Web services security. 255-260

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














