


default search action
Information Management & Computer Security, Volume 11
Volume 11, Number 1, 2003
- Joseph S. Sherif, David P. Gilliam:

Deployment of anti-virus software: a case study. 5-10 - Alan D. Smith, William T. Rupp:

Application service providers: an application of the transaction cost model. 11-18 - Mayur S. Desai, Thomas C. Richards, Kiran J. Desai:

E-commerce policies and customer privacy. 19-27 - Fritz H. Grupe:

Information systems professionals and conflict of interest. 28-32 - Nasser Salem Abouzakhar, Gordon A. Manson:

Networks security measures using neuro-fuzzy agents. 33-38 - Yun E. Zeng, H. Joseph Wen, David C. Yen

:
Customer relationship management (CRM) in business-to-business (B2B) e-commerce. 39-44
Volume 11, Number 2, 2003
- Kostas S. Metaxiotis, John E. Psarras, Emanuel Samouilidis:

Integrating fuzzy logic into decision suppport systems: current research and future prospects. 53-59 - Vidya Moghe:

Privacy management - a new era in the Australian business environment. 60-66 - Luisa Focacci, Robert J. Mockler, Marc E. Gartenfeld, Dorothy G. Dologite:

How to choose an ASP: selection guidelines. 67-73 - Ashish Garg, Jeffrey Curtis, Hilary Halper:

Quantifying the financial impact of IT security breaches. 74-83 - Victoria Skoularidou, Diomidis Spinellis:

Security architectures for network clients. 84-91 - Alan D. Smith:

Exploring potential strategic impacts of XML-related technologies. 92-100
Volume 11, Number 3, 2003
- Heather Fulford

, Neil F. Doherty:
The application of information security policies in large UK-based organizations: an exploratory investigation. 106-114 - Yun E. Zeng, Roger H. L. Chiang, David C. Yen:

Enterprise integration with advanced information technologies: ERP and data warehousing. 115-122 - H. J. A. (Rens) de Wolf, Marcel E. M. Spruit:

Stealth tracing: Subliminal Traceroute. 123-129 - Hassan Aljifri, Alexander Perez-Pons

, Daniel Collins:
Global e-commerce: a framework for understanding and overcoming the trust barrier. 130-138 - Alexandr Seleznyov, Seppo Puuronen:

Using continuous user authentication to detect masqueraders. 139-145 - Konstantinos Nikolopoulos, Kostas S. Metaxiotis, Vassilis Assimakopoulos, Eleni Tavanidou:

A first approach to e-forecasting: a survey of forecasting Web services. 146-152
Volume 11, Number 4, 2003
- Nathan L. Clarke

, Steven Furnell
, Benn Lines, Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study. 161-166 - Jimmy J. M. Ng, K. X. Li:

Implications of ICT for knowledge management in globalization. 167-174 - Joseph S. Sherif, Rod Ayers, Tommy G. Dearmond:

Intrusion detection: the art and the practice. Part I. 175-186 - Raju Ramaswamy:

A novel approach to solve DSL network data rate problems. 187-194 - Simeon Xenitellis:

Identifying security vulnerabilities through input flow tracing and analysis. 195-199
Volume 11, Number 5, 2003
- Helen L. Armstrong, Patrick J. Forde:

Internet anonymity practices in computer crime. 209-215 - Kostas S. Metaxiotis, Konstantinos Ergazakis, Emanuel Samouilidis, John E. Psarras:

Decision support through knowledge management: the role of the artificial intelligence. 216-221 - Joseph S. Sherif, Rod Ayers:

Intrusion detection: methods and systems. Part II. 222-229 - Z. T. Temtime, S. V. Chinyoka, J. P. W. Shunda:

Toward strategic use of IT in SMEs: a developing country perspective. 230-237 - Matthew J. Warren

, William Hutchinson:
A security risk management approach for e-commerce. 238-242 - Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang

:
An integrated system theory of information security management. 243-248 - Cungang Yang, Chang N. Zhang:

An XML-based administration method on role-based access control in the enterprise environment. 249-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














